Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8R2YjBA8nI.exe

Overview

General Information

Sample name:8R2YjBA8nI.exe
renamed because original name is a hash value
Original sample name:15D3E848E744AA25B6EDBAEFDF57BF3F.exe
Analysis ID:1583412
MD5:15d3e848e744aa25b6edbaefdf57bf3f
SHA1:d6c429733e1f23b522b908aeb8a47d644f27d3b3
SHA256:27aaa78d661532a8c2702640a43496f1fa3f19b3af31d2f3d8110860ff2a9a01
Tags:exeValleyRATuser-abuse_ch
Infos:

Detection

GhostRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GhostRat
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Loading BitLocker PowerShell Module
Sigma detected: Execution from Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Suspicious Program Location with Network Connections
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
Installs a global mouse hook
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sleep loop found (likely to delay execution)
Stores large binary data to the registry
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 8R2YjBA8nI.exe (PID: 7564 cmdline: "C:\Users\user\Desktop\8R2YjBA8nI.exe" MD5: 15D3E848E744AA25B6EDBAEFDF57BF3F)
    • cmd.exe (PID: 7700 cmdline: "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7708 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Update.exe (PID: 7756 cmdline: C:\Users\Public\Bilite\Axialis\Update.exe MD5: FB325C945A08D06FE91681179BDCCC66)
        • cmd.exe (PID: 4268 cmdline: cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 4592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tasklist.exe (PID: 1216 cmdline: tasklist /FI "IMAGENAME eq Update.exe" MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 1220 cmdline: findstr /I "Update.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • timeout.exe (PID: 7632 cmdline: timeout /t 30 /nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • tasklist.exe (PID: 7804 cmdline: tasklist /FI "IMAGENAME eq Update.exe" MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 7800 cmdline: findstr /I "Update.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • timeout.exe (PID: 7940 cmdline: timeout /t 30 /nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • tasklist.exe (PID: 3796 cmdline: tasklist /FI "IMAGENAME eq Update.exe" MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 6988 cmdline: findstr /I "Update.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • timeout.exe (PID: 4088 cmdline: timeout /t 30 /nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • tasklist.exe (PID: 5376 cmdline: tasklist /FI "IMAGENAME eq Update.exe" MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 1284 cmdline: findstr /I "Update.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • timeout.exe (PID: 2176 cmdline: timeout /t 30 /nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
        • cmd.exe (PID: 7260 cmdline: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 4144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 4624 cmdline: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • cmd.exe (PID: 1060 cmdline: cmd.exe /C powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 2936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 2472 cmdline: powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1 MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cleanup
{"C2 url": ["156.251.17.243:17093", "156.251.17.243:17094"]}
SourceRuleDescriptionAuthorStrings
00000003.00000003.3067908639.0000000004D51000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_GhostRatYara detected GhostRatJoe Security
    00000003.00000003.2612748611.0000000000FEA000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_GhostRatYara detected GhostRatJoe Security
      00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GhostRatYara detected GhostRatJoe Security
        00000003.00000003.3235606389.0000000004D51000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_GhostRatYara detected GhostRatJoe Security
          00000003.00000003.3396873224.0000000004D51000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_GhostRatYara detected GhostRatJoe Security
            Click to see the 13 entries
            SourceRuleDescriptionAuthorStrings
            3.2.Update.exe.3bb05bf.5.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
              3.3.Update.exe.4d52603.8.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
                3.2.Update.exe.3ab1053.4.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
                  3.2.Update.exe.4d52603.7.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
                    3.3.Update.exe.4d52603.13.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
                      Click to see the 31 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Bilite\Axialis\Update.exe, CommandLine: C:\Users\Public\Bilite\Axialis\Update.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Bilite\Axialis\Update.exe, NewProcessName: C:\Users\Public\Bilite\Axialis\Update.exe, OriginalFileName: C:\Users\Public\Bilite\Axialis\Update.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7700, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Users\Public\Bilite\Axialis\Update.exe, ProcessId: 7756, ProcessName: Update.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Users\Public\Bilite\Axialis\Update.exe, ParentImage: C:\Users\Public\Bilite\Axialis\Update.exe, ParentProcessId: 7756, ParentProcessName: Update.exe, ProcessCommandLine: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ProcessId: 7260, ProcessName: cmd.exe
                      Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 156.251.17.243, DestinationIsIpv6: false, DestinationPort: 18852, EventID: 3, Image: C:\Users\Public\Bilite\Axialis\Update.exe, Initiated: true, ProcessId: 7756, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49890
                      Source: Process startedAuthor: frack113: Data: Command: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7260, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ProcessId: 4624, ProcessName: powershell.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7260, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ProcessId: 4624, ProcessName: powershell.exe
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-02T17:35:05.903264+010020528751A Network Trojan was detected192.168.2.449916156.251.17.24317093TCP
                      2025-01-02T17:36:15.375847+010020528751A Network Trojan was detected192.168.2.449936156.251.17.24317093TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: Update.exe.7756.3.memstrminMalware Configuration Extractor: GhostRat {"C2 url": ["156.251.17.243:17093", "156.251.17.243:17094"]}
                      Source: 8R2YjBA8nI.exeReversingLabs: Detection: 34%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.7% probability
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C356EB0 CryptAcquireContextW,CryptImportKey,CryptSetKeyParam,CryptSetKeyParam,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,___std_exception_copy,3_2_6C356EB0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C356720 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,CryptReleaseContext,___std_exception_copy,CryptDestroyHash,CryptReleaseContext,___std_exception_copy,CryptDestroyHash,CryptReleaseContext,___std_exception_copy,CryptReleaseContext,___std_exception_copy,CryptDestroyHash,CryptReleaseContext,___std_exception_copy,___std_exception_copy,3_2_6C356720
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C356520 CryptStringToBinaryA,CryptStringToBinaryA,___std_exception_copy,3_2_6C356520
                      Source: 8R2YjBA8nI.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.2620733147.000000000797B000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: H:\trunk_download\downloader_cn\downloader\bin\ldplayerinst.pdb source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.dr
                      Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.2621978231.0000000007A0F000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\Administrator\Desktop\MFCLibrary_YSS\Release\Update.pdb source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmp
                      Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.3556319323.0000000000E02000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000000.1792139291.0000000000E02000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
                      Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb,X source: powershell.exe, 00000012.00000002.2621978231.0000000007A0F000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.2612322077.00000000032D1000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\System.Management.Automation.pdbpdbion.pdb source: powershell.exe, 00000012.00000002.2626859991.00000000089F0000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.2626581119.0000000008990000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb((& source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.3556319323.0000000000E02000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000000.1792139291.0000000000E02000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
                      Source: Binary string: H:\trunk_download\downloader_cn\downloader\bin\ldplayerinst.pdbo source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.dr
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: z:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: x:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: v:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: t:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: r:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: p:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: n:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: l:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: j:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: h:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: f:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: b:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: y:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: w:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: u:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: s:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: q:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: o:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: m:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: k:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: i:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: g:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: e:Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: c:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: [:Jump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_0040301A
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402B79
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C37F888 FindFirstFileExW,RevokeDragDrop,FindNextFileW,FindClose,FindClose,3_2_6C37F888
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C37F7D7 FindFirstFileExW,3_2_6C37F7D7
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D380F0 wsprintfW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,__wcsnicmp,lstrcpyW,lstrcpyW,lstrcatW,3_2_03D380F0

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49916 -> 156.251.17.243:17093
                      Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49936 -> 156.251.17.243:17093
                      Source: Malware configuration extractorURLs: 156.251.17.243:17093
                      Source: Malware configuration extractorURLs: 156.251.17.243:17094
                      Source: global trafficTCP traffic: 156.251.17.243 ports 18852,17093,1,2,5,8
                      Source: global trafficTCP traffic: 192.168.2.4:49890 -> 156.251.17.243:18852
                      Source: Joe Sandbox ViewASN Name: POWERLINE-AS-APPOWERLINEDATACENTERHK POWERLINE-AS-APPOWERLINEDATACENTERHK
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: unknownTCP traffic detected without corresponding DNS query: 156.251.17.243
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D33360 recv,timeGetTime,_memmove,3_2_03D33360
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1789791701.00000000071F0000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000003.2495893999.0000000000F7B000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1789791701.00000000071F0000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000003.2495893999.0000000000F7B000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1789791701.00000000071F0000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000003.2495893999.0000000000F7B000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                      Source: powershell.exe, 00000011.00000002.2611684461.00000000004E9000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2612322077.0000000003335000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                      Source: powershell.exe, 00000012.00000002.2612322077.000000000335E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                      Source: powershell.exe, 00000012.00000002.2622101039.0000000007A2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1789791701.00000000071F0000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1789791701.00000000071F0000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000003.2495893999.0000000000F7B000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1789791701.00000000071F0000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000003.2495893999.0000000000F7B000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                      Source: ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000003.2495893999.0000000000F7B000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1789791701.00000000071F0000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
                      Source: powershell.exe, 00000011.00000002.2617183189.0000000005547000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2617271788.0000000005F67000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1789791701.00000000071F0000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000003.2495893999.0000000000F7B000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1789791701.00000000071F0000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000003.2495893999.0000000000F7B000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1789791701.00000000071F0000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1789791701.00000000071F0000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000003.2495893999.0000000000F7B000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                      Source: powershell.exe, 00000012.00000002.2613530425.0000000005056000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                      Source: powershell.exe, 00000011.00000002.2612360240.0000000004C8A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.2612360240.0000000004636000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2613530425.0000000005056000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                      Source: powershell.exe, 00000011.00000002.2612360240.00000000044E1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2613530425.0000000004F01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: powershell.exe, 00000011.00000002.2612360240.0000000004C8A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.2612360240.0000000004636000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2613530425.0000000005056000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                      Source: powershell.exe, 00000012.00000002.2613530425.0000000005056000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1789791701.00000000071F0000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000003.2495893999.0000000000F7B000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://www.ijg.org
                      Source: powershell.exe, 00000011.00000002.2612360240.00000000044E1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2613530425.0000000004F01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBkq
                      Source: powershell.exe, 00000012.00000002.2613530425.0000000005056000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2620733147.000000000797B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                      Source: powershell.exe, 00000012.00000002.2617271788.0000000005F67000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                      Source: powershell.exe, 00000012.00000002.2617271788.0000000005F67000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                      Source: powershell.exe, 00000012.00000002.2617271788.0000000005F67000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
                      Source: powershell.exe, 00000012.00000002.2613530425.0000000005056000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://ldapi.ldmnq.com/common/baidu/ocpc
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://ldapi.ldmnq.com/common/baidu/ocpcbaidu
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://ldapi.ldmnq.com/mnq/properties?openid=&packageName=https://encdn.ldmnq.com/player_files/open
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://middledata.ldmnq.com/collection/biz/upload
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://middledata.ldmnq.com/collection/biz/uploadreport
                      Source: powershell.exe, 00000011.00000002.2617183189.0000000005547000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2617271788.0000000005F67000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://res.ldmnq.com/ld/leidianexhttps://res.ldmnq.com/download/release/ldinst4.0.exehttps://res.ld
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://www.ldmnq.com/?n=6120&bd_vid=logidUrlnewTypepost
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://www.ldmnq.com/ldy/xukeXieyi.htmldownloader_jumplink_addresshttps://wpa1.qq.com/V7XjWRDy?_typ

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: [esc]3_2_03D3E850
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: [esc]3_2_03D3E850
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: [esc]3_2_03D3E850
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: [esc]3_2_03D3E850
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D3E850 Sleep,CreateMutexW,GetLastError,_memset,Sleep,GetTickCount,GetTickCount,GetTickCount,InterlockedExchange,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,_memset,GlobalUnlock,CloseClipboard,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,GetKeyState,lstrlenW,wsprintfW,lstrlenW,lstrlenW,wsprintfW,wsprintfW,wsprintfW,lstrlenW,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,3_2_03D3E850
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D3E850 Sleep,CreateMutexW,GetLastError,_memset,Sleep,GetTickCount,GetTickCount,GetTickCount,InterlockedExchange,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,_memset,GlobalUnlock,CloseClipboard,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,GetKeyState,lstrlenW,wsprintfW,lstrlenW,lstrlenW,wsprintfW,wsprintfW,wsprintfW,lstrlenW,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,3_2_03D3E850
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D3BC70 GetDesktopWindow,GetDC,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,_memset,GetDIBits,_memset,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,3_2_03D3BC70
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D3E4F0 Sleep,CreateMutexW,GetLastError,SHGetFolderPathW,lstrcatW,CreateMutexW,WaitForSingleObject,CreateFileW,GetFileSize,CloseHandle,DeleteFileW,ReleaseMutex,DirectInput8Create,GetTickCount,GetKeyState,3_2_03D3E4F0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeWindows user hook set: 0 mouse low level C:\Windows\SYSTEM32\DINPUT8.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C356EB0 CryptAcquireContextW,CryptImportKey,CryptSetKeyParam,CryptSetKeyParam,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,___std_exception_copy,3_2_6C356EB0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D3B463 ExitWindowsEx,3_2_03D3B463
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D3B41B ExitWindowsEx,3_2_03D3B41B
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D3B43F ExitWindowsEx,3_2_03D3B43F
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00404FAA0_2_00404FAA
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_0041206B0_2_0041206B
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_0041022D0_2_0041022D
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00411F910_2_00411F91
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D36EE03_2_03D36EE0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D36C503_2_03D36C50
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D483813_2_03D48381
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D4E3413_2_03D4E341
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D4EA1D3_2_03D4EA1D
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D4F9FF3_2_03D4F9FF
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D389003_2_03D38900
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D4D89F3_2_03D4D89F
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D4DDF03_2_03D4DDF0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D324B03_2_03D324B0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C357E803_2_6C357E80
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C3625763_2_6C362576
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C370D623_2_6C370D62
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C382ED33_2_6C382ED3
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C3628703_2_6C362870
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C3758B03_2_6C3758B0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C362A4B3_2_6C362A4B
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C36DBA03_2_6C36DBA0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C362BC63_2_6C362BC6
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C36C5153_2_6C36C515
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C3875023_2_6C387502
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C3626383_2_6C362638
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C3576403_2_6C357640
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C3627713_2_6C362771
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C3657A03_2_6C3657A0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C3762343_2_6C376234
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_1001122F3_2_1001122F
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_100024B03_2_100024B0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_10010CDE3_2_10010CDE
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_10012D913_2_10012D91
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_10011E5C3_2_10011E5C
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_1000B66A3_2_1000B66A
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_100117803_2_10011780
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_02EB00323_2_02EB0032
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_02EC12063_2_02EC1206
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_02EBB6413_2_02EBB641
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_02EC17573_2_02EC1757
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_02EC0CB53_2_02EC0CB5
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_02EB24873_2_02EB2487
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_02EC2D683_2_02EC2D68
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03BCF3BE3_2_03BCF3BE
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03BB82BF3_2_03BB82BF
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03BCD25E3_2_03BCD25E
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03BB689F3_2_03BB689F
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03BCD7AF3_2_03BCD7AF
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03BB660F3_2_03BB660F
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03BB1E6F3_2_03BB1E6F
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03BCDD003_2_03BCDD00
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03BC7D403_2_03BC7D40
                      Source: Joe Sandbox ViewDropped File: C:\Users\Public\Bilite\Axialis\Update.exe 0C2CC4513EC9101A28A7988C72A46175EFD82F387BB3BCFB2612E808804282B5
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: String function: 0040243B appears 37 times
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6C36C970 appears 53 times
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 03D44300 appears 32 times
                      Source: 8R2YjBA8nI.exeStatic PE information: invalid certificate
                      Source: ldplayer9_ld_6000_ld.exe.0.drStatic PE information: Resource name: ZIPRES type: 7-zip archive data, version 0.4
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1698216304.00000000024DD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs 8R2YjBA8nI.exe
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1698216304.00000000024DD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7zSfxNew.exe< vs 8R2YjBA8nI.exe
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAxII> vs 8R2YjBA8nI.exe
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUpdate.exe vs 8R2YjBA8nI.exe
                      Source: 8R2YjBA8nI.exe, 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs 8R2YjBA8nI.exe
                      Source: 8R2YjBA8nI.exe, 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7zSfxNew.exe< vs 8R2YjBA8nI.exe
                      Source: 8R2YjBA8nI.exeBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs 8R2YjBA8nI.exe
                      Source: 8R2YjBA8nI.exeBinary or memory string: OriginalFilename7zSfxNew.exe< vs 8R2YjBA8nI.exe
                      Source: 8R2YjBA8nI.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@43/29@0/1
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00407776 wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,0_2_00407776
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D37B70 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,3_2_03D37B70
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D37740 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,3_2_03D37740
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D37620 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,3_2_03D37620
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_0040118A GetDiskFreeSpaceExW,SendMessageW,0_2_0040118A
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D36050 _memset,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,CloseHandle,3_2_03D36050
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_004034C1 _wtol,_wtol,SHGetSpecialFolderPathW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,CoCreateInstance,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_004034C1
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00401BDF GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,wsprintfW,LoadLibraryA,GetProcAddress,0_2_00401BDF
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeFile created: C:\Users\Public\BiliteJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7708:120:WilError_03
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4144:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2936:120:WilError_03
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeMutant created: \Sessions\1\BaseNamedObjects\2024.12. 8
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4592:120:WilError_03
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile created: C:\Users\user\AppData\Local\Temp\monitor.batJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat"
                      Source: 8R2YjBA8nI.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;UPDATE.EXE&apos;
                      Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;UPDATE.EXE&apos;
                      Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;UPDATE.EXE&apos;
                      Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;UPDATE.EXE&apos;
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: 8R2YjBA8nI.exeReversingLabs: Detection: 34%
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeFile read: C:\Users\user\Desktop\8R2YjBA8nI.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\8R2YjBA8nI.exe "C:\Users\user\Desktop\8R2YjBA8nI.exe"
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bilite\Axialis\Update.exe C:\Users\Public\Bilite\Axialis\Update.exe
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe"
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreak
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreak
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreak
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreak
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bilite\Axialis\Update.exe C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat"Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1Jump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: update.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: vcruntime140.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: linkinfo.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: ntshrui.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: napinsp.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: pnrpnsp.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: wshbth.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: nlaapi.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: winrnr.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: dxgi.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: dinput8.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: inputhost.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: resourcepolicyclient.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: devenum.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: devobj.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: msdmo.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: avicap32.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: msvfw32.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dll
                      Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dll
                      Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dll
                      Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00021401-0000-0000-C000-000000000046}\InProcServer32Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe"
                      Source: ldplayer9_ld_6000_ld.exe.lnk.3.drLNK file: ..\..\Public\Bilite\ldplayer9_ld_6000_ld.exe
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: 8R2YjBA8nI.exeStatic file information: File size 77302708 > 1048576
                      Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.2620733147.000000000797B000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: H:\trunk_download\downloader_cn\downloader\bin\ldplayerinst.pdb source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.dr
                      Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.2621978231.0000000007A0F000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\Administrator\Desktop\MFCLibrary_YSS\Release\Update.pdb source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmp
                      Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.3556319323.0000000000E02000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000000.1792139291.0000000000E02000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
                      Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb,X source: powershell.exe, 00000012.00000002.2621978231.0000000007A0F000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.2612322077.00000000032D1000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\System.Management.Automation.pdbpdbion.pdb source: powershell.exe, 00000012.00000002.2626859991.00000000089F0000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.2626581119.0000000008990000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb((& source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.3556319323.0000000000E02000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000000.1792139291.0000000000E02000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
                      Source: Binary string: H:\trunk_download\downloader_cn\downloader\bin\ldplayerinst.pdbo source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.dr
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,0_2_00406D5D
                      Source: Update.dll.0.drStatic PE information: section name: .00cfg
                      Source: backup.dll.3.drStatic PE information: section name: .00cfg
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00411C20 push eax; ret 0_2_00411C4E
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D44345 push ecx; ret 3_2_03D44358
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D5A168 push eax; ret 3_2_03D5A119
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D5A0B8 push eax; ret 3_2_03D5A119
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D52450 push ebp; retf 3_2_03D52474
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D52471 push ebp; retf 3_2_03D52474
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D52470 push ebp; retf 3_2_03D52474
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C36CAF7 push ecx; ret 3_2_6C36CB0A
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_10009DF5 push ecx; ret 3_2_10009E08
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_1001FE9A push ecx; ret 3_2_1001FEBF
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_02EBCAFF push eax; retf 3_2_02EBCB00
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_02EBCB61 pushfd ; retf 3_2_02EBCB64
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_02EBCB0B push 701000CBh; retf 3_2_02EBCB10
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_02EBCB07 pushad ; retf 3_2_02EBCB08
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_02EB9DCC push ecx; ret 3_2_02EB9DDF
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03BC3D04 push ecx; ret 3_2_03BC3D17
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile created: C:\Users\user\AppData\Local\Temp\backup.exeJump to dropped file
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeFile created: C:\Users\Public\Bilite\Axialis\Update.dllJump to dropped file
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeFile created: C:\Users\Public\Bilite\Axialis\Update.exeJump to dropped file
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeFile created: C:\Users\Public\Bilite\ldplayer9_ld_6000_ld.exeJump to dropped file
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile created: C:\Users\user\AppData\Local\Temp\backup.dllJump to dropped file

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D3B3C0 OpenEventLogW,OpenEventLogW,ClearEventLogW,CloseEventLog,3_2_03D3B3C0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeKey value created or modified: HKEY_CURRENT_USER\Console\0 9e9e85e05ee16fc372a0c7df6549fbd4Jump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeWindow / User API: threadDelayed 5755Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3378Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8652Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 898Jump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeDropped PE file which has not been started: C:\Users\Public\Bilite\ldplayer9_ld_6000_ld.exeJump to dropped file
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\backup.dllJump to dropped file
                      Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 7784Thread sleep time: -73000s >= -30000sJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 7780Thread sleep time: -63000s >= -30000sJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 3320Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 7564Thread sleep count: 286 > 30Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 5232Thread sleep count: 5755 > 30Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 5232Thread sleep time: -57550s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2336Thread sleep count: 3378 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7332Thread sleep count: 171 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7724Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4296Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7316Thread sleep count: 8652 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7320Thread sleep count: 898 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7700Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\timeout.exe TID: 7636Thread sleep count: 255 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\timeout.exe TID: 2284Thread sleep count: 266 > 30
                      Source: C:\Windows\SysWOW64\timeout.exe TID: 7016Thread sleep count: 267 > 30
                      Source: C:\Windows\SysWOW64\timeout.exe TID: 1784Thread sleep count: 134 > 30
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeLast function: Thread delayed
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\timeout.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\timeout.exeLast function: Thread delayed
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeThread sleep count: Count: 5755 delay: -10Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_0040301A
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402B79
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C37F888 FindFirstFileExW,RevokeDragDrop,FindNextFileW,FindClose,FindClose,3_2_6C37F888
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C37F7D7 FindFirstFileExW,3_2_6C37F7D7
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D380F0 wsprintfW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,__wcsnicmp,lstrcpyW,lstrcpyW,lstrcatW,3_2_03D380F0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D37410 GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,3_2_03D37410
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeThread delayed: delay time: 73000Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeThread delayed: delay time: 30000Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: powershell.exe, 00000012.00000002.2613530425.0000000005056000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                      Source: powershell.exe, 00000012.00000002.2613530425.0000000005056000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                      Source: powershell.exe, 00000012.00000002.2613530425.0000000005056000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                      Source: Update.exe, 00000003.00000003.2907131651.0000000000F6B000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.3556603652.0000000000F6C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeAPI call chain: ExitProcess graph end nodegraph_3-70668
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00E015D0 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00E015D0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D4054D VirtualProtect ?,-00000001,00000104,?3_2_03D4054D
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,0_2_00406D5D
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_02EB0AE4 mov eax, dword ptr fs:[00000030h]3_2_02EB0AE4
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03BB00CD mov eax, dword ptr fs:[00000030h]3_2_03BB00CD
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D36790 wsprintfW,GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,LookupAccountSidW,GetLastError,GetProcessHeap,HeapFree,3_2_03D36790
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: Debug
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: Debug
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: Debug
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00E01764 SetUnhandledExceptionFilter,3_2_00E01764
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00E015D0 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00E015D0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00E01A8F SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00E01A8F
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D3DF10 Sleep,CloseHandle,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,EnumWindows,EnumWindows,Sleep,EnumWindows,Sleep,CreateEventA,Sleep,RegOpenKeyExW,RegQueryValueExW,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,3_2_03D3DF10
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D3F00A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_03D3F00A
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D41F67 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_03D41F67
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C36C85A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6C36C85A
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C373AAF IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6C373AAF
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C36C4ED SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_6C36C4ED
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_10006815 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_10006815
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_10008587 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_10008587
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_02EB67EC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_02EB67EC

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D377E0 Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread,3_2_03D377E0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D377E0 Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread,3_2_03D377E0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\SysWOW64\svchost.exe3_2_03D377E0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe3_2_03D377E0
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bilite\Axialis\Update.exe C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1Jump to behavior
                      Source: Update.exe, 00000003.00000003.3235533822.0000000004DC3000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000003.3235606389.0000000004DC3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0 minProgram Manager
                      Source: Update.exe, 00000003.00000002.3557849730.0000000004DC3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: inProgram Manager
                      Source: Update.exe, 00000003.00000003.2907446964.0000000004DC3000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000003.3396747004.0000000004DC3000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000003.3067978820.0000000004DC3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0 minProgram Managery-
                      Source: 8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drBinary or memory string: .lnkutility::usystem::resolveShortcutFromFileresolveShortcutFromFile buffer is too smallShell_TrayWndnot traywndutility::usystem::getSystBarHeightit is pcutility::usystem::isNoteBookPCit is notebookutility::usystem::isNoteBookPCShcore.dllGetDpiForMonitorldenvAccept: */*
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_0040D72E cpuid 0_2_0040D72E
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,0_2_00401F9D
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: _memset,_memset,_memset,gethostname,gethostbyname,inet_ntoa,_strcat_s,_strcat_s,inet_ntoa,_strcat_s,_strcat_s,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,GetSystemInfo,wsprintfW,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,CloseHandle,GetTickCount,__time64,__localtime64,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,3_2_03D35430
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6C37CEBE
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6C38682C
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_6C3868D3
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6C3869D9
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6C37C9C3
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_6C38645A
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6C3866AD
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6C38670C
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6C3867E1
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_6C38616E
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6C3863BF
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00401626 ??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLocalTime,SystemTimeToFileTime,??2@YAPAXI@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00401626
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03D45D22 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,3_2_03D45D22
                      Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00404FAA GetVersionExW,GetCommandLineW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,??2@YAPAXI@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,memset,ShellExecuteExW,WaitForSingleObject,CloseHandle,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,0_2_00404FAA
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: Update.exeBinary or memory string: acs.exe
                      Source: Update.exeBinary or memory string: vsserv.exe
                      Source: Update.exeBinary or memory string: kxetray.exe
                      Source: Update.exeBinary or memory string: avcenter.exe
                      Source: Update.exeBinary or memory string: KSafeTray.exe
                      Source: Update.exeBinary or memory string: cfp.exe
                      Source: Update.exeBinary or memory string: avp.exe
                      Source: Update.exeBinary or memory string: 360Safe.exe
                      Source: Update.exeBinary or memory string: rtvscan.exe
                      Source: Update.exeBinary or memory string: 360tray.exe
                      Source: Update.exeBinary or memory string: ashDisp.exe
                      Source: Update.exeBinary or memory string: TMBMSRV.exe
                      Source: Update.exeBinary or memory string: 360Tray.exe
                      Source: Update.exeBinary or memory string: avgwdsvc.exe
                      Source: Update.exeBinary or memory string: AYAgent.aye
                      Source: Update.exeBinary or memory string: RavMonD.exe
                      Source: Update.exeBinary or memory string: QUHLPSVC.EXE
                      Source: Update.exeBinary or memory string: Mcshield.exe
                      Source: Update.exeBinary or memory string: K7TSecurity.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 3.2.Update.exe.3bb05bf.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.3ab1053.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.4d52603.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.13.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.febc3b.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.febc3b.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.15.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.fb9fd3.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.13.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.3221004.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.febc3b.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.4d52603.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.3d30000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.11.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.fb9fd3.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.14.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.3221004.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.15.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.3ab1053.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.3bb05bf.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.3d30000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.14.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.febc3b.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000003.3067908639.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2612748611.0000000000FEA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3235606389.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3396873224.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3557271908.0000000003AB0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3557007107.0000000003220000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2744056117.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3067978820.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2907446964.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3557849730.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2907514560.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2571536188.0000000000FB9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3557383262.0000000003BB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3235533822.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3396747004.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2744000452.0000000004D2D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Update.exe PID: 7756, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 3.2.Update.exe.3bb05bf.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.3ab1053.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.4d52603.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.13.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.febc3b.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.febc3b.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.15.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.fb9fd3.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.13.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.3221004.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.febc3b.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.4d52603.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.3d30000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.11.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.fb9fd3.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.14.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.3221004.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.15.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.3ab1053.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.3bb05bf.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.3d30000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.14.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.4d52603.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.febc3b.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000003.3067908639.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2612748611.0000000000FEA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3235606389.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3396873224.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3557271908.0000000003AB0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3557007107.0000000003220000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2744056117.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3067978820.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2907446964.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3557849730.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2907514560.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2571536188.0000000000FB9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3557383262.0000000003BB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3235533822.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3396747004.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2744000452.0000000004D2D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Update.exe PID: 7756, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information1
                      Scripting
                      1
                      Replication Through Removable Media
                      1
                      Windows Management Instrumentation
                      1
                      Scripting
                      1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      121
                      Input Capture
                      2
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      Exfiltration Over Other Network Medium1
                      Data Encrypted for Impact
                      CredentialsDomainsDefault Accounts1
                      Native API
                      1
                      DLL Side-Loading
                      1
                      Access Token Manipulation
                      1
                      Deobfuscate/Decode Files or Information
                      LSASS Memory11
                      Peripheral Device Discovery
                      Remote Desktop Protocol1
                      Screen Capture
                      2
                      Encrypted Channel
                      Exfiltration Over Bluetooth1
                      System Shutdown/Reboot
                      Email AddressesDNS ServerDomain Accounts1
                      PowerShell
                      Logon Script (Windows)222
                      Process Injection
                      2
                      Obfuscated Files or Information
                      Security Account Manager3
                      File and Directory Discovery
                      SMB/Windows Admin Shares121
                      Input Capture
                      1
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      DLL Side-Loading
                      NTDS38
                      System Information Discovery
                      Distributed Component Object Model2
                      Clipboard Data
                      1
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Masquerading
                      LSA Secrets31
                      Security Software Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Modify Registry
                      Cached Domain Credentials31
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
                      Virtualization/Sandbox Evasion
                      DCSync4
                      Process Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      Access Token Manipulation
                      Proc Filesystem1
                      Application Window Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt222
                      Process Injection
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                      Indicator Removal
                      Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1583412 Sample: 8R2YjBA8nI.exe Startdate: 02/01/2025 Architecture: WINDOWS Score: 100 65 Suricata IDS alerts for network traffic 2->65 67 Found malware configuration 2->67 69 Multi AV Scanner detection for submitted file 2->69 71 7 other signatures 2->71 9 8R2YjBA8nI.exe 10 2->9         started        process3 file4 51 C:\Users\Public\Bilite\Axialis\Update.exe, PE32 9->51 dropped 53 C:\Users\Public\...\ldplayer9_ld_6000_ld.exe, PE32 9->53 dropped 55 C:\Users\Public\Bilite\Axialis\Update.dll, PE32 9->55 dropped 12 cmd.exe 1 9->12         started        process5 signatures6 73 Bypasses PowerShell execution policy 12->73 15 Update.exe 3 8 12->15         started        20 conhost.exe 12->20         started        process7 dnsIp8 57 156.251.17.243, 17093, 18852, 49890 POWERLINE-AS-APPOWERLINEDATACENTERHK Seychelles 15->57 45 C:\Users\user\AppData\Local\updated.ps1, ASCII 15->45 dropped 47 C:\Users\user\AppData\Local\Temp\backup.exe, PE32 15->47 dropped 49 C:\Users\user\AppData\Local\Temp\backup.dll, PE32 15->49 dropped 59 Contains functionality to inject threads in other processes 15->59 61 Contains functionality to capture and log keystrokes 15->61 63 Contains functionality to inject code into remote processes 15->63 22 cmd.exe 1 15->22         started        24 cmd.exe 1 15->24         started        26 cmd.exe 1 15->26         started        file9 signatures10 process11 process12 28 powershell.exe 1 23 22->28         started        31 conhost.exe 22->31         started        33 powershell.exe 37 24->33         started        35 conhost.exe 24->35         started        37 conhost.exe 26->37         started        39 tasklist.exe 1 26->39         started        41 timeout.exe 1 26->41         started        43 10 other processes 26->43 signatures13 75 Loading BitLocker PowerShell Module 33->75

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      8R2YjBA8nI.exe34%ReversingLabsWin32.Trojan.Generic
                      SourceDetectionScannerLabelLink
                      C:\Users\Public\Bilite\Axialis\Update.exe0%ReversingLabs
                      C:\Users\Public\Bilite\ldplayer9_ld_6000_ld.exe4%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\backup.exe0%ReversingLabs
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://www.ldmnq.com/?n=6120&bd_vid=logidUrlnewTypepost0%Avira URL Cloudsafe
                      https://www.ldmnq.com/ldy/xukeXieyi.htmldownloader_jumplink_addresshttps://wpa1.qq.com/V7XjWRDy?_typ0%Avira URL Cloudsafe
                      156.251.17.243:170940%Avira URL Cloudsafe
                      156.251.17.243:170930%Avira URL Cloudsafe
                      http://www.ijg.org0%Avira URL Cloudsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      156.251.17.243:17093true
                      • Avira URL Cloud: safe
                      unknown
                      156.251.17.243:17094true
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://nuget.org/NuGet.exepowershell.exe, 00000011.00000002.2617183189.0000000005547000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2617271788.0000000005F67000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000012.00000002.2613530425.0000000005056000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2620733147.000000000797B000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://ldapi.ldmnq.com/common/baidu/ocpcbaidu8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                            high
                            https://sectigo.com/CPS08R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl08R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://ocsp.sectigo.com08R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000012.00000002.2613530425.0000000005056000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000011.00000002.2612360240.0000000004C8A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.2612360240.0000000004636000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2613530425.0000000005056000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://crl.microsoftpowershell.exe, 00000012.00000002.2622101039.0000000007A2C000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000012.00000002.2613530425.0000000005056000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://contoso.com/Licensepowershell.exe, 00000012.00000002.2617271788.0000000005F67000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://contoso.com/Iconpowershell.exe, 00000012.00000002.2617271788.0000000005F67000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://middledata.ldmnq.com/collection/biz/uploadreport8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                                  high
                                                  https://aka.ms/pscore6lBkqpowershell.exe, 00000011.00000002.2612360240.00000000044E1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2613530425.0000000004F01000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://www.ldmnq.com/?n=6120&bd_vid=logidUrlnewTypepost8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://middledata.ldmnq.com/collection/biz/upload8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                                        high
                                                        https://github.com/Pester/Pesterpowershell.exe, 00000012.00000002.2613530425.0000000005056000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://curl.haxx.se/docs/http-cookies.html8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                                            high
                                                            https://res.ldmnq.com/ld/leidianexhttps://res.ldmnq.com/download/release/ldinst4.0.exehttps://res.ld8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                                              high
                                                              http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                http://crl.micropowershell.exe, 00000012.00000002.2612322077.000000000335E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://www.ldmnq.com/ldy/xukeXieyi.htmldownloader_jumplink_addresshttps://wpa1.qq.com/V7XjWRDy?_typ8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002B10000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000011.00000002.2612360240.0000000004C8A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.2612360240.0000000004636000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2613530425.0000000005056000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://contoso.com/powershell.exe, 00000012.00000002.2617271788.0000000005F67000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://nuget.org/nuget.exepowershell.exe, 00000011.00000002.2617183189.0000000005547000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2617271788.0000000005F67000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://ldapi.ldmnq.com/common/baidu/ocpc8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                                                              high
                                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000011.00000002.2612360240.00000000044E1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2613530425.0000000004F01000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://www.ijg.org8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://ldapi.ldmnq.com/mnq/properties?openid=&packageName=https://encdn.ldmnq.com/player_files/open8R2YjBA8nI.exe, 00000000.00000003.1787810492.0000000002BA1000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                                                                  high
                                                                                  • No. of IPs < 25%
                                                                                  • 25% < No. of IPs < 50%
                                                                                  • 50% < No. of IPs < 75%
                                                                                  • 75% < No. of IPs
                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                  156.251.17.243
                                                                                  unknownSeychelles
                                                                                  132839POWERLINE-AS-APPOWERLINEDATACENTERHKtrue
                                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                                  Analysis ID:1583412
                                                                                  Start date and time:2025-01-02 17:32:48 +01:00
                                                                                  Joe Sandbox product:CloudBasic
                                                                                  Overall analysis duration:0h 8m 48s
                                                                                  Hypervisor based Inspection enabled:false
                                                                                  Report type:full
                                                                                  Cookbook file name:default.jbs
                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                  Run name:Run with higher sleep bypass
                                                                                  Number of analysed new started processes analysed:29
                                                                                  Number of new started drivers analysed:0
                                                                                  Number of existing processes analysed:0
                                                                                  Number of existing drivers analysed:0
                                                                                  Number of injected processes analysed:0
                                                                                  Technologies:
                                                                                  • HCA enabled
                                                                                  • EGA enabled
                                                                                  • AMSI enabled
                                                                                  Analysis Mode:default
                                                                                  Analysis stop reason:Timeout
                                                                                  Sample name:8R2YjBA8nI.exe
                                                                                  renamed because original name is a hash value
                                                                                  Original Sample Name:15D3E848E744AA25B6EDBAEFDF57BF3F.exe
                                                                                  Detection:MAL
                                                                                  Classification:mal100.troj.spyw.evad.winEXE@43/29@0/1
                                                                                  EGA Information:
                                                                                  • Successful, ratio: 50%
                                                                                  HCA Information:
                                                                                  • Successful, ratio: 98%
                                                                                  • Number of executed functions: 162
                                                                                  • Number of non-executed functions: 228
                                                                                  Cookbook Comments:
                                                                                  • Found application associated with file extension: .exe
                                                                                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                                  • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                  • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.45
                                                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                  • Execution Graph export aborted for target powershell.exe, PID 2472 because it is empty
                                                                                  • Execution Graph export aborted for target powershell.exe, PID 4624 because it is empty
                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                  • Report size getting too big, too many NtCreateKey calls found.
                                                                                  • Report size getting too big, too many NtEnumerateKey calls found.
                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                  • VT rate limit hit for: 8R2YjBA8nI.exe
                                                                                  No simulations
                                                                                  No context
                                                                                  No context
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  POWERLINE-AS-APPOWERLINEDATACENTERHKHilix.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                  • 45.202.220.139
                                                                                  Hilix.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                  • 45.202.220.141
                                                                                  DHL 745-12302024.exeGet hashmaliciousFormBookBrowse
                                                                                  • 154.215.72.110
                                                                                  vcimanagement.armv4l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                  • 156.250.157.117
                                                                                  vcimanagement.armv6l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                  • 156.252.64.239
                                                                                  vcimanagement.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                  • 156.242.206.56
                                                                                  vcimanagement.sh4.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                  • 156.253.238.131
                                                                                  loligang.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                  • 154.216.83.124
                                                                                  spc.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                  • 154.216.83.138
                                                                                  m68k.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                  • 154.218.41.135
                                                                                  No context
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  C:\Users\Public\Bilite\Axialis\Update.exe6f0slJzOrF.exeGet hashmaliciousGhostRatBrowse
                                                                                    6f0slJzOrF.exeGet hashmaliciousUnknownBrowse
                                                                                      zPJUOck9wt.exeGet hashmaliciousGhostRatBrowse
                                                                                        zPJUOck9wt.exeGet hashmaliciousUnknownBrowse
                                                                                          MEuu1a2o6n.exeGet hashmaliciousGhostRatBrowse
                                                                                            MEuu1a2o6n.exeGet hashmaliciousUnknownBrowse
                                                                                              Process:C:\Users\user\Desktop\8R2YjBA8nI.exe
                                                                                              File Type:openssl enc'd data with salted password, base64 encoded
                                                                                              Category:dropped
                                                                                              Size (bytes):64
                                                                                              Entropy (8bit):5.189464015923012
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:iqkaVf3EpDvlLWzdPds1:ilkgDvR0dO1
                                                                                              MD5:E0B9F50885C9027A8479809E48773FB5
                                                                                              SHA1:CD1DDCE77B76428A8377DA9DB6C98CD17D26B4A5
                                                                                              SHA-256:D4100BD47861860EE5B974DA6D1526300EFAD0BEA07A2147DE050F5AB4901AE7
                                                                                              SHA-512:62FD97F720A6FE77E4A5AFD9AEC2C7B5C537A37F44A6F9D60F44A9EE1783FE8BB3A27EEDE5B8671DACCA8E6057F1CF8A839CEEEEB45065BC08C524E83E36D562
                                                                                              Malicious:false
                                                                                              Preview:U2FsdGVkX19ed6jSWQZ87x5UTzuvDSxWy4TvJSbGs4rG0n3V8HGyYgGC1a8KQsHZ
                                                                                              Process:C:\Users\user\Desktop\8R2YjBA8nI.exe
                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):340760
                                                                                              Entropy (8bit):6.542973942124912
                                                                                              Encrypted:false
                                                                                              SSDEEP:6144:H66LUtNhlhaEDW8zn0iuAhzRgd5KrS8a1GJAlExz30/KUaCcM:H66LUtNrIAzCKzRgDKrSeRUalM
                                                                                              MD5:6CDF82D8FE534D835FAB242751200383
                                                                                              SHA1:72074E82596FBD085BED96EE7F84B291722ECDA3
                                                                                              SHA-256:144F9C2EB947F7DA86D77FE62B2CA893F8C794CDF5E76AFF8B471DC4220599A9
                                                                                              SHA-512:E43B6DFFC19BE693502DF47FB1A009B30D3E45370BDC65604689D2D52517041C163F52450915C69EF48CDB6667A013A52724EE6A50185C7DE6EC1D9DFDCD44F5
                                                                                              Malicious:false
                                                                                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....mg...........!.........L......Y........................................p............@..........................t..O....t..........p6...............)...@...&...r.......................4.......................w...............................text............................... ..`.rdata..............................@..@.data....!..........................@....00cfg..............................@..@.tls................................@....rsrc...p6.......8..................@..@.reloc...&...@...(..................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\Desktop\8R2YjBA8nI.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):395368
                                                                                              Entropy (8bit):5.090673225697451
                                                                                              Encrypted:false
                                                                                              SSDEEP:6144:I0acLF3rgypB1Grf/TRfiJ7BePaEvLJggZy:Y/TRfi3ePtJRg
                                                                                              MD5:FB325C945A08D06FE91681179BDCCC66
                                                                                              SHA1:F5D91B7D75D34E156066AB4099E0FD0DF9227B32
                                                                                              SHA-256:0C2CC4513EC9101A28A7988C72A46175EFD82F387BB3BCFB2612E808804282B5
                                                                                              SHA-512:2BB588EBE2FA35D03652AEC4E5D51DABD3A24E996336A4D5EC9C762D6084862D5CD5F530F1DA0B98D2887BA88F4E077697D128071FF497D2967F9F42ADC2F533
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Joe Sandbox View:
                                                                                              • Filename: 6f0slJzOrF.exe, Detection: malicious, Browse
                                                                                              • Filename: 6f0slJzOrF.exe, Detection: malicious, Browse
                                                                                              • Filename: zPJUOck9wt.exe, Detection: malicious, Browse
                                                                                              • Filename: zPJUOck9wt.exe, Detection: malicious, Browse
                                                                                              • Filename: MEuu1a2o6n.exe, Detection: malicious, Browse
                                                                                              • Filename: MEuu1a2o6n.exe, Detection: malicious, Browse
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........:..[...[...[...#l..[.......[.......[.......[.......[..b....[..e....[...0...[...[...[..e....[..e....[...[h..[..e....[..Rich.[..........................PE..L...X..e............................\........ ....@..................................8....@.................................D(.......@..................h(...........!..T............................!..@............ ...............................text............................... ..`.rdata....... ......................@..@.data........0.......$..............@....rsrc........@.......&..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\Desktop\8R2YjBA8nI.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):73389290
                                                                                              Entropy (8bit):7.9999949696309285
                                                                                              Encrypted:true
                                                                                              SSDEEP:1572864:4vucsY3Q3QOIErZwXrel/HeIk/o2u1wSkOQJAdq0H8TJZy:4vuc5MpVZwXilWIior1ZEA00cTzy
                                                                                              MD5:1308BAC0A9357B506C13B7861B422E1F
                                                                                              SHA1:BC58C688070CCCF07BFE8F1BDE8D1A7173F8EFA2
                                                                                              SHA-256:93FD6B7AD279A5AB9B86BE7813D5510512EF51F7D93671773C13211CE26FDF92
                                                                                              SHA-512:14F5A66A2149553B2F867B42CC5FA218EDF2648F3281B4FD06BD38C28503AF8BF6668348024A2F4552EDC2654EBB97AAF08389C8478D84CC3D3A73457D08F822
                                                                                              Malicious:false
                                                                                              Preview:..>..9..x...@..A.xE..._.g..1.Plj.@...........QP.'......b.c.xd.[...M...4Ct..w...~.-M.f`.Fp.+Xq%.}....;d....$.....5(..A..o].......n..3O..4.u..u4.{.........`yRc......#......$...?.$...oa.Cv ...6...3..[L..^.U....2...`..I..E.D....../........Ilc...efn.u..:sHf..'.......@D.V.o..~.."...a....7ABB.......4....).r2...&...g..d.~c.../.PW*cp.&...`9..KtU9.I...'.:y.X. PEd5p-.-.]..1D.(.V#L`1,.........w.2...y:.j*..~....*.....i.......c.D:sg.6......|K..!4..i..0^T.I?A8..[.sxZ.I.#.r.i....S1U.......;<.%....[.....U../.=s..&...bf.\I....R.C.p.....+...C..6.9.$..C_..y.exD..k.2i.-...5..5B...6.g}.}.../".xe4...3t.&N.Q=|.y.R.. t.wGj.S....o..s.R.8.W...lJ. ..?..."0.!.`J...O.....2..):-../...J.)&%.(...AH`hSck..6..}P....4c.SU.3...X.B.!...v....... _....K...+.^.l..{4...%.S....[.[K.1.69..a...B...:..!lZ+W..Q...)....#....ZP..{._,...47...n.G..P........h?.?D...PY.J4.~..K5..^..T..!.P.=j.3.5...S,..:.2.?.X....o...x.....l..+.S.. .d..cj...<..W..?..6.....G.A.:9..>.Y....(sv
                                                                                              Process:C:\Users\user\Desktop\8R2YjBA8nI.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):4540512
                                                                                              Entropy (8bit):7.278249613007746
                                                                                              Encrypted:false
                                                                                              SSDEEP:98304:vevwfTovd3ZIdCCFQfUfQ8aA78VREwBwMu:meol3ZIdCxujaAqRgMu
                                                                                              MD5:EC1580551A183D46B8BE885B7519F1D5
                                                                                              SHA1:4D5B0038633B92A11C3AAFD33DAAFF54D354FD91
                                                                                              SHA-256:D0B485BCBD919FA05653281A9F1AB5B574D19A47AACBFAD89D411B946763FA1A
                                                                                              SHA-512:759C4266DFA1168C6E91791AF71B946F3EE0E217B3CFFDD670BD6E7A811CBB2BECA0F5D9CE7ED06A40BE75C9FE735BBDD767E8A5F1AC6F61F61DB7FA47532D05
                                                                                              Malicious:false
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 4%
                                                                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........r.................E1............n........J............n.....n............n....n.......n.......n...................n.....Rich...........PE..L....:eg.................."..D#...............#...@..........................pF.......E...@..................................K*.|....p,..............D.`R... E..D....#.8............................7).@.............#..............................text...V."......."................. ..`.rdata...d....#..f....#.............@..@.data.........*......h*.............@....rsrc.......p,.......+.............@..@.reloc...D... E..F....C.............@..B........................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):1360
                                                                                              Entropy (8bit):5.408860214304474
                                                                                              Encrypted:false
                                                                                              SSDEEP:24:3yWSKco4KmZjKbmOIKod6emZ9tYs4RPQoUGt/NK3R88bJ02iaEW3b5:CWSU4xympjmZ9tz4RIoUeNWR832qab5
                                                                                              MD5:AB70D0D47823C49A9410EF2E2C12F557
                                                                                              SHA1:5010818385312BE76C385BEDAA7A7BDAA5EF8E22
                                                                                              SHA-256:08171B15FBBD5579D7219B169CA43051CB3F21F892BEEF77EC2B77E47525AA64
                                                                                              SHA-512:9954AAE8E3351591CF3CCD7A8535EEB83ACBF81CF8C828111A0E607A355B95ED4A0BA5EB03F1FC0D0734975B7912916B7BDDEDAA4777D748F654DD0D39E490EC
                                                                                              Malicious:false
                                                                                              Preview:@...e...........................................................P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.D....................+.H..!...e........System.Configuration.Ins
                                                                                              Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              File Type:XML 1.0 document, ASCII text
                                                                                              Category:dropped
                                                                                              Size (bytes):1893
                                                                                              Entropy (8bit):5.212287775015203
                                                                                              Encrypted:false
                                                                                              SSDEEP:48:c55XzDl4Q2ZbXL6Q0QFdOFQOzN33O4OiDdKrKsTLXbGMv:O5XzDl4Q2ZbGQhFdOFQOzBdKrKsTLXbV
                                                                                              MD5:E3FB2ECD2AD10C30913339D97E0E9042
                                                                                              SHA1:A004CE2B3D398312B80E2955E76BDA69EF9B7203
                                                                                              SHA-256:1BD6DB55FFF870C9DF7A0AAC11B895B50F57774F20A5744E63BBC3BD40D11F28
                                                                                              SHA-512:9D6F0C1E344F1DC5A0EF4CAAD86281F92A6C108E1085BACD8D6143F9C742198C2F759CA5BDFFAD4D9E40203E6B0460E84896D1C6B8B1759350452E1DE809B716
                                                                                              Malicious:false
                                                                                              Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2006-11-10T14:29:55.5851926</Date>. <Author>Microsoft Corporation</Author>. <Description>????? AD RMS ?????????????????? Web ?????????,???????????</Description>. <URI>\AS AMD updata</URI>. <SecurityDescriptor>D:(A;;FA;;;BA)(A;;FA;;;SY)(A;;FRFX;;;WD)</SecurityDescriptor>. </RegistrationInfo>. <Triggers>. <LogonTrigger id="06b3f632-87ad-4ac0-9737-48ea5ddbaf11">. <Enabled>true</Enabled>. <Delay>PT30S</Delay>. </LogonTrigger>. </Triggers>. <Principals>. <Principal id="AllUsers">. <GroupId>S-1-1-0</GroupId>. <RunLevel>HighestAvailable</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>. <AllowHardTerm
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):340760
                                                                                              Entropy (8bit):6.542973942124912
                                                                                              Encrypted:false
                                                                                              SSDEEP:6144:H66LUtNhlhaEDW8zn0iuAhzRgd5KrS8a1GJAlExz30/KUaCcM:H66LUtNrIAzCKzRgDKrSeRUalM
                                                                                              MD5:6CDF82D8FE534D835FAB242751200383
                                                                                              SHA1:72074E82596FBD085BED96EE7F84B291722ECDA3
                                                                                              SHA-256:144F9C2EB947F7DA86D77FE62B2CA893F8C794CDF5E76AFF8B471DC4220599A9
                                                                                              SHA-512:E43B6DFFC19BE693502DF47FB1A009B30D3E45370BDC65604689D2D52517041C163F52450915C69EF48CDB6667A013A52724EE6A50185C7DE6EC1D9DFDCD44F5
                                                                                              Malicious:false
                                                                                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....mg...........!.........L......Y........................................p............@..........................t..O....t..........p6...............)...@...&...r.......................4.......................w...............................text............................... ..`.rdata..............................@..@.data....!..........................@....00cfg..............................@..@.tls................................@....rsrc...p6.......8..................@..@.reloc...&...@...(..................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):395368
                                                                                              Entropy (8bit):5.090673225697451
                                                                                              Encrypted:false
                                                                                              SSDEEP:6144:I0acLF3rgypB1Grf/TRfiJ7BePaEvLJggZy:Y/TRfi3ePtJRg
                                                                                              MD5:FB325C945A08D06FE91681179BDCCC66
                                                                                              SHA1:F5D91B7D75D34E156066AB4099E0FD0DF9227B32
                                                                                              SHA-256:0C2CC4513EC9101A28A7988C72A46175EFD82F387BB3BCFB2612E808804282B5
                                                                                              SHA-512:2BB588EBE2FA35D03652AEC4E5D51DABD3A24E996336A4D5EC9C762D6084862D5CD5F530F1DA0B98D2887BA88F4E077697D128071FF497D2967F9F42ADC2F533
                                                                                              Malicious:false
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........:..[...[...[...#l..[.......[.......[.......[.......[..b....[..e....[...0...[...[...[..e....[..e....[...[h..[..e....[..Rich.[..........................PE..L...X..e............................\........ ....@..................................8....@.................................D(.......@..................h(...........!..T............................!..@............ ...............................text............................... ..`.rdata....... ......................@..@.data........0.......$..............@....rsrc........@.......&..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):769
                                                                                              Entropy (8bit):5.113976261619789
                                                                                              Encrypted:false
                                                                                              SSDEEP:24:NFW/WAW/WAWE3fzWcWrfZKx31SIYaYZLZ6y:NFVAVAjvz6ZKx31SIYN/6y
                                                                                              MD5:F7F23953F7C236A0F12AE4848F174480
                                                                                              SHA1:E222C191BE437B39FB294EDD1FCCAF961B1F7265
                                                                                              SHA-256:0CD1B31F9AA2F089BD33331B172CD4813167BD59F889EFDC7EB2ADAA71F3D9CC
                                                                                              SHA-512:2790AFD071756E25FF408426E0D40879603EBCBC23C1D98AD891017237A2930F27CC19F28C38C5BAB5221E828B0B08727EDCEC1D2AA528FCCED0B7EE576836B8
                                                                                              Malicious:false
                                                                                              Preview:@echo off..:CheckProcess..set "ProcessName=Update.exe"..set "ProcessPath=C:\Users\Public\Bilite\Axialis\Update.exe"..set "BackupProcessPath=C:\Users\user\AppData\Local\Temp\\backup.exe"..set "DLLPath=C:\Users\Public\Bilite\Axialis\Update.dll"..set "BackupDLLPath=C:\Users\user\AppData\Local\Temp\\backup.dll"..if not exist "%ProcessPath%" (.. echo Process file not found, restoring from backup..... copy /Y "%BackupProcessPath%" "%ProcessPath%"..)..if not exist "%DLLPath%" (.. echo DLL file not found, restoring from backup..... copy /Y "%BackupDLLPath%" "%DLLPath%"..)..tasklist /FI "IMAGENAME eq %ProcessName%" | findstr /I "%ProcessName%" >nul..if %ERRORLEVEL% neq 0 (.. start "" "%ProcessPath%"..)..timeout /t 30 /nobreak >nul..goto CheckProcess..
                                                                                              Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):4
                                                                                              Entropy (8bit):2.0
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:3:3
                                                                                              MD5:F0F6CC51DACEBE556699CCB45E2D43A8
                                                                                              SHA1:234306C0B6EFF1F32853A3B76F4A99A47A8E8018
                                                                                              SHA-256:4C92B97852BFEE9020336FD71929B50C7CA9FC7180ED2F647F925AF7B844ED1B
                                                                                              SHA-512:9DBFB4F5099C53130E791E7043E73A304DA25150BC4C6D6EDDC5BB3D99584E848A7CD64C1EA902E07FBE8502057858F1ECD8ED6F7F273D3973EE8F58B9C20DCB
                                                                                              Malicious:false
                                                                                              Preview:4268
                                                                                              Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              File Type:ASCII text
                                                                                              Category:dropped
                                                                                              Size (bytes):151
                                                                                              Entropy (8bit):4.741657013789009
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:41Ai+PBoAwnLFsI2FIERMJyjqLWAfXIhS/ytIEFMEQVGdAn:4yi+5dwnLFsI2F5KJy0fXnMFFQhn
                                                                                              MD5:AA0E1012D3B7C24FAD1BE4806756C2CF
                                                                                              SHA1:FE0D130AF9105D9044FF3D657D1ABEAF0B750516
                                                                                              SHA-256:FC47E1FA89397C3139D9047DC667531A9153A339F8E29AC713E518D51A995897
                                                                                              SHA-512:15FAE192951747A0C71059F608700F88548F3E60BB5C708B206BF793A7E3D059A278F2058D4AC86B86781B202037401A29602EE4D6C0CBAAFF532CEF311975F4
                                                                                              Malicious:true
                                                                                              Preview:$xmlPath = "XML??".$taskName = "????".$xmlContent = Get-Content -Path $xmlPath | Out-String.Register-ScheduledTask -Xml $xmlContent -TaskName $taskName
                                                                                              Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Jan 2 15:33:50 2025, mtime=Thu Jan 2 15:33:50 2025, atime=Tue Dec 24 02:25:35 2024, length=4540512, window=hide
                                                                                              Category:dropped
                                                                                              Size (bytes):1101
                                                                                              Entropy (8bit):4.702186987608341
                                                                                              Encrypted:false
                                                                                              SSDEEP:12:8JXQY0UlGIJCICHqXg/64XilCACmqIug9fojA3HpTzGT9fBav11bGhD44t2YZ/eE:8JXZtGANzzfsA5WfovfbGhMqyFm
                                                                                              MD5:78C0A68B13A3B0D6C7204614687F6A20
                                                                                              SHA1:C54AE1114ED3577E85EF3526D759B1DF9403891C
                                                                                              SHA-256:BCAF1F610D372F8FE810233D47E833D28E663739C44310F8CF7D0DEA9456651A
                                                                                              SHA-512:9298B3049FE9D9438941B5722A2318624FFEC5B27098AC9E35834B7878EFD2F909D38A41489554568A29F3840268C86E7C19C5F457FC7EF62812DCC158F7933F
                                                                                              Malicious:false
                                                                                              Preview:L..................F.... .....|.4]..r..4]....~.U..`HE..........................P.O. .:i.....+00.../C:\...................x.1.....CW;^..Users.d......OwH"Z4.....................:.....K...U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....|.1....."Z5...Public..f......O.I"Z:.....+...............<.....\.H.P.u.b.l.i.c...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.6.....T.1....."Z:...Bilite..>......"Z5."Z:............................N..B.i.l.i.t.e.....~.2.`HE..Y2. .LDPLAY~1.EXE..b......"Z:."Z:.............................c.l.d.p.l.a.y.e.r.9._.l.d._.6.0.0.0._.l.d...e.x.e.......^...............-.......]............^.R.....C:\Users\Public\Bilite\ldplayer9_ld_6000_ld.exe..,.....\.....\.P.u.b.l.i.c.\.B.i.l.i.t.e.\.l.d.p.l.a.y.e.r.9._.l.d._.6.0.0.0._.l.d...e.x.e..........v..*.cM.jVD.Es.!...`.......X.......830021...........hT..CrF.f4... ...T..b...,.......hT..CrF.f4... ...T..b...,..................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.
                                                                                              Process:C:\Windows\SysWOW64\timeout.exe
                                                                                              File Type:ASCII text, with CRLF line terminators, with overstriking
                                                                                              Category:dropped
                                                                                              Size (bytes):110
                                                                                              Entropy (8bit):4.292361616376963
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:hYFRZARcWmFsFJQZ/ctXvY/4to/9uF8cttEfYhnn:hYFRamFSQZ0lv5y/9JctESnn
                                                                                              MD5:7689D6E1AC4668D07ACB657413767158
                                                                                              SHA1:860195BB8E4C696138711AEE8EBCB62D502E3D45
                                                                                              SHA-256:1FCD0C76A32240DE46DEEB703A1A915A00C101DA60815B2C6845316FE7E18267
                                                                                              SHA-512:63D316D45C0CBCEE68808819C984AEAA4D13C4B5FC03A54D88F7A5297D88C9041FFEFD7232A3DA9F5DEC8097E5B62B9035D3BAE9B98BD70663AFF1D1CBF21A9B
                                                                                              Malicious:false
                                                                                              Preview:..Waiting for 30 seconds, press CTRL+C to quit .....29..28..27..26..25..24..23..22..21..20..19..18..17..16..15
                                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Entropy (8bit):7.999896618565362
                                                                                              TrID:
                                                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                              • DOS Executable Generic (2002/1) 0.02%
                                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                              File name:8R2YjBA8nI.exe
                                                                                              File size:77'302'708 bytes
                                                                                              MD5:15d3e848e744aa25b6edbaefdf57bf3f
                                                                                              SHA1:d6c429733e1f23b522b908aeb8a47d644f27d3b3
                                                                                              SHA256:27aaa78d661532a8c2702640a43496f1fa3f19b3af31d2f3d8110860ff2a9a01
                                                                                              SHA512:c6c93121a6a98ce4b857cde3544189c8f9a3312f3a3ade9e7366fb26e625abb2860cca8ac1a9200b8a0982ce22b34962ef09746d43caa580b51ae381085606e5
                                                                                              SSDEEP:1572864:9X0PbA0443v1abVn91uAsrTKaCSMehPEHz7FMosCyx7ry1PVsyw80Zbn9CIrQme:eTAVmaJjsrTKpSMehc7FMohyx7ry19PX
                                                                                              TLSH:DC0833C9B708BB77C410DFB2AADCFB8B21F6D91015159D5E5AA14C47ACDE306036A2CB
                                                                                              File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...~.&L.....................................0....@..........................@...............................................P.......................b...).
                                                                                              Icon Hash:01e0f2ccd4d4c400
                                                                                              Entrypoint:0x411def
                                                                                              Entrypoint Section:.text
                                                                                              Digitally signed:true
                                                                                              Imagebase:0x400000
                                                                                              Subsystem:windows gui
                                                                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                              DLL Characteristics:
                                                                                              Time Stamp:0x4C26F87E [Sun Jun 27 07:06:38 2010 UTC]
                                                                                              TLS Callbacks:
                                                                                              CLR (.Net) Version:
                                                                                              OS Version Major:4
                                                                                              OS Version Minor:0
                                                                                              File Version Major:4
                                                                                              File Version Minor:0
                                                                                              Subsystem Version Major:4
                                                                                              Subsystem Version Minor:0
                                                                                              Import Hash:b5a014d7eeb4c2042897567e1288a095
                                                                                              Signature Valid:false
                                                                                              Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                                                                                              Signature Validation Error:The digital signature of the object did not verify
                                                                                              Error Number:-2146869232
                                                                                              Not Before, Not After
                                                                                              • 18/07/2022 01:00:00 18/07/2024 00:59:59
                                                                                              Subject Chain
                                                                                              • CN=Incredibuild Software Ltd., O=Incredibuild Software Ltd., S=Tel Aviv, C=IL
                                                                                              Version:3
                                                                                              Thumbprint MD5:8164525B12F9B6829CCD5054865F2D41
                                                                                              Thumbprint SHA-1:583F01EE72450A9945FB1CFA539BAAB983D3F1D9
                                                                                              Thumbprint SHA-256:2EBD549CFBD28201F8773F370E920A21BB010F577BA74B4726332D2CE7836F69
                                                                                              Serial:7098774ED29B0565AB114EF2F2871CF7
                                                                                              Instruction
                                                                                              push ebp
                                                                                              mov ebp, esp
                                                                                              push FFFFFFFFh
                                                                                              push 00414C50h
                                                                                              push 00411F80h
                                                                                              mov eax, dword ptr fs:[00000000h]
                                                                                              push eax
                                                                                              mov dword ptr fs:[00000000h], esp
                                                                                              sub esp, 68h
                                                                                              push ebx
                                                                                              push esi
                                                                                              push edi
                                                                                              mov dword ptr [ebp-18h], esp
                                                                                              xor ebx, ebx
                                                                                              mov dword ptr [ebp-04h], ebx
                                                                                              push 00000002h
                                                                                              call dword ptr [00413184h]
                                                                                              pop ecx
                                                                                              or dword ptr [00419924h], FFFFFFFFh
                                                                                              or dword ptr [00419928h], FFFFFFFFh
                                                                                              call dword ptr [00413188h]
                                                                                              mov ecx, dword ptr [0041791Ch]
                                                                                              mov dword ptr [eax], ecx
                                                                                              call dword ptr [0041318Ch]
                                                                                              mov ecx, dword ptr [00417918h]
                                                                                              mov dword ptr [eax], ecx
                                                                                              mov eax, dword ptr [00413190h]
                                                                                              mov eax, dword ptr [eax]
                                                                                              mov dword ptr [00419920h], eax
                                                                                              call 00007FB0BCBBD6E2h
                                                                                              cmp dword ptr [00417710h], ebx
                                                                                              jne 00007FB0BCBBD5CEh
                                                                                              push 00411F78h
                                                                                              call dword ptr [00413194h]
                                                                                              pop ecx
                                                                                              call 00007FB0BCBBD6B4h
                                                                                              push 00417048h
                                                                                              push 00417044h
                                                                                              call 00007FB0BCBBD69Fh
                                                                                              mov eax, dword ptr [00417914h]
                                                                                              mov dword ptr [ebp-6Ch], eax
                                                                                              lea eax, dword ptr [ebp-6Ch]
                                                                                              push eax
                                                                                              push dword ptr [00417910h]
                                                                                              lea eax, dword ptr [ebp-64h]
                                                                                              push eax
                                                                                              lea eax, dword ptr [ebp-70h]
                                                                                              push eax
                                                                                              lea eax, dword ptr [ebp-60h]
                                                                                              push eax
                                                                                              call dword ptr [0041319Ch]
                                                                                              push 00417040h
                                                                                              push 00417000h
                                                                                              call 00007FB0BCBBD66Ch
                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x150dc0xb4.rdata
                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x190d7.rsrc
                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x49b629c0x2918
                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x130000x310.rdata
                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                              .text0x10000x113170x11400797279c5ab1a163aed1f2a528f9fe3ceFalse0.6174988677536232data6.576987441854239IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                              .rdata0x130000x30ea0x32001359639b02bcb8f0a8743e6ead1c0030False0.43828125data5.549434098115495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .data0x170000x292c0x8009415c9c8dea3245d6d73c23393e27d8eFalse0.431640625data3.6583182363171756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                              .rsrc0x1a0000x190d70x19200aedf42f084dabb70902985d8cb8d4f42False0.14223802860696516data4.481844282645869IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                              RT_ICON0x1a2080x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088RussianRussia0.42819148936170215
                                                                                              RT_ICON0x1a6700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224RussianRussia0.2767354596622889
                                                                                              RT_ICON0x1b7180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600RussianRussia0.2513485477178423
                                                                                              RT_ICON0x1dcc00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896RussianRussia0.17170524326877656
                                                                                              RT_ICON0x21ee80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584RussianRussia0.09922512717378446
                                                                                              RT_GROUP_ICON0x327100x4cdataRussianRussia0.7763157894736842
                                                                                              RT_VERSION0x3275c0x350dataEnglishUnited States0.47523584905660377
                                                                                              RT_VERSION0x32aac0x3b0dataChineseChina0.4523305084745763
                                                                                              RT_MANIFEST0x32e5c0x27bASCII text, with very long lines (635), with no line terminatorsEnglishUnited States0.5118110236220472
                                                                                              DLLImport
                                                                                              COMCTL32.dll
                                                                                              KERNEL32.dllGetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetModuleHandleW, GetProcAddress, LoadLibraryA, LockResource, LoadResource, SizeofResource, FindResourceExA, MulDiv, GlobalFree, GlobalAlloc, lstrcmpiA, GetSystemDefaultLCID, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, MultiByteToWideChar, GetLocaleInfoW, lstrlenA, lstrcmpiW, GetEnvironmentVariableW, lstrcmpW, GlobalMemoryStatusEx, VirtualAlloc, WideCharToMultiByte, ExpandEnvironmentStringsW, RemoveDirectoryW, FindClose, FindNextFileW, DeleteFileW, FindFirstFileW, SetThreadLocale, GetLocalTime, GetSystemTimeAsFileTime, lstrlenW, GetTempPathW, SetEnvironmentVariableW, CloseHandle, CreateFileW, GetDriveTypeW, SetCurrentDirectoryW, GetModuleFileNameW, GetCommandLineW, GetVersionExW, CreateEventW, SetEvent, ResetEvent, InitializeCriticalSection, TerminateThread, ResumeThread, SuspendThread, IsBadReadPtr, LocalFree, lstrcpyW, FormatMessageW, GetSystemDirectoryW, DeleteCriticalSection, GetFileSize, SetFilePointer, ReadFile, SetFileTime, SetEndOfFile, EnterCriticalSection, LeaveCriticalSection, WaitForMultipleObjects, GetModuleHandleA, SystemTimeToFileTime, GetLastError, CreateThread, WaitForSingleObject, GetExitCodeThread, Sleep, SetLastError, SetFileAttributesW, GetDiskFreeSpaceExW, lstrcatW, ExitProcess, CompareFileTime, GetStartupInfoA
                                                                                              USER32.dllCharUpperW, EndDialog, DestroyWindow, KillTimer, ReleaseDC, DispatchMessageW, GetMessageW, SetTimer, CreateWindowExW, ScreenToClient, GetWindowRect, wsprintfW, GetParent, GetSystemMenu, EnableMenuItem, EnableWindow, MessageBeep, LoadIconW, LoadImageW, wvsprintfW, IsWindow, DefWindowProcW, CallWindowProcW, DrawIconEx, DialogBoxIndirectParamW, GetWindow, ClientToScreen, GetDC, DrawTextW, ShowWindow, SystemParametersInfoW, SetFocus, SetWindowLongW, GetSystemMetrics, GetClientRect, GetDlgItem, GetKeyState, MessageBoxA, wsprintfA, SetWindowTextW, GetSysColor, GetWindowTextLengthW, GetWindowTextW, GetClassNameA, GetWindowLongW, GetMenu, SetWindowPos, CopyImage, SendMessageW, GetWindowDC
                                                                                              GDI32.dllGetCurrentObject, StretchBlt, SetStretchBltMode, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, GetObjectW, GetDeviceCaps, DeleteObject, CreateFontIndirectW, DeleteDC
                                                                                              SHELL32.dllSHGetFileInfoW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetMalloc, ShellExecuteExW, SHGetSpecialFolderPathW, ShellExecuteW
                                                                                              ole32.dllCoInitialize, CreateStreamOnHGlobal, CoCreateInstance
                                                                                              OLEAUT32.dllVariantClear, OleLoadPicture, SysAllocString
                                                                                              MSVCRT.dll__set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, memset, _wcsnicmp, strncmp, malloc, memmove, _wtol, memcpy, free, memcmp, _purecall, ??2@YAPAXI@Z, ??3@YAXPAX@Z, _except_handler3, _controlfp
                                                                                              Language of compilation systemCountry where language is spokenMap
                                                                                              RussianRussia
                                                                                              EnglishUnited States
                                                                                              ChineseChina
                                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                              2025-01-02T17:35:05.903264+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.449916156.251.17.24317093TCP
                                                                                              2025-01-02T17:36:15.375847+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.449936156.251.17.24317093TCP
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Jan 2, 2025 17:35:01.993319035 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:01.998158932 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:01.998364925 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:02.783809900 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:02.783826113 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:02.783839941 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:02.783852100 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:02.783864021 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:02.783901930 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:02.828483105 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:02.998209953 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:02.998229980 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:02.998240948 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:02.998258114 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:02.998269081 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:02.998279095 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:02.998281002 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:02.998297930 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:02.998297930 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:02.998307943 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:02.998332024 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:02.998352051 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:02.999023914 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:02.999033928 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:02.999188900 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:02.999202013 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:02.999213934 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:02.999254942 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.212838888 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.212853909 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.212905884 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.212925911 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.212945938 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.212955952 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.212984085 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.212989092 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.212990046 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.213064909 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.213845968 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.213857889 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.213869095 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.213879108 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.213890076 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.213903904 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.213932037 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.214710951 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.214723110 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.214732885 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.214766026 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.266017914 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.299473047 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.344111919 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.427438021 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.427454948 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.427467108 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.427478075 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.427489042 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.427506924 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.427545071 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.427927017 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.427938938 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.427949905 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.427961111 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.427973986 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.427987099 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.428009033 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.428030014 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.428639889 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.428675890 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.428688049 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.428703070 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.428720951 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.428751945 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.429275990 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.429295063 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.429306984 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.429317951 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.429328918 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.429338932 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.429395914 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.430054903 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.433737040 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.641999960 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.642102957 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.642112970 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.642124891 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.642136097 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.642146111 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.642158031 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.642169952 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.642214060 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.642457008 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.642513037 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.642653942 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.642664909 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.642677069 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.642688036 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.642699003 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.642709017 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.642709970 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.642721891 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.642743111 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.643439054 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.643507957 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.643520117 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.643532038 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.643537045 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.643542051 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.643563986 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.643573999 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.643590927 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.643599987 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.643635988 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.644398928 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.644418955 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.644431114 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.644442081 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.644453049 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.644510031 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.728548050 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.778258085 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.856606960 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.856621981 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.856633902 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.856645107 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.856657028 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.856667042 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.856678009 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.856681108 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.856689930 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.856704950 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.856715918 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.856739044 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.856868982 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.856973886 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.856985092 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.856997967 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.857008934 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.857024908 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.857031107 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.857036114 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.857047081 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.857060909 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.857105017 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.857724905 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.857734919 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.857747078 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.857758045 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.857768059 CET1885249890156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:03.857774973 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:03.857805967 CET4989018852192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:05.898099899 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:05.902904987 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:05.902973890 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:05.903264046 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:05.908030033 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:06.759259939 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:06.759675980 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:06.764512062 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:06.764520884 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:06.764524937 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.066679955 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.066692114 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.066709042 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.066720009 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.066730976 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.066740990 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.066751957 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.066792965 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.274102926 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.274127960 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.274138927 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.274151087 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.274163008 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.274293900 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.274293900 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.274482012 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.274492025 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.274537086 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.274677038 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.274694920 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.274708033 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.274719954 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.274725914 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.274766922 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.481798887 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.481818914 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.481878042 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.481928110 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.481955051 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.481967926 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.481980085 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.481991053 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.482011080 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.482047081 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.482752085 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.482769966 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.482781887 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.482794046 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.482805014 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.482815981 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.482836008 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.482853889 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.483620882 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.483632088 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.483644962 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.483656883 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.483668089 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.483678102 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.483710051 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.689332962 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.689512014 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.689522982 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.689533949 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.689546108 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.689555883 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.689568043 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.689572096 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.689573050 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.689585924 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.689620972 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.690349102 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.690387011 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.690392017 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.690655947 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.690746069 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.690757036 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.690768957 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.690782070 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.690793037 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.690804958 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.690812111 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.690814972 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.690836906 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.690856934 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.691642046 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.691653967 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.691664934 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.691693068 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.734775066 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.896986961 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.897166967 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.897192001 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.897241116 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.897245884 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.897264004 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.897281885 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.897298098 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.897308111 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.897313118 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.897327900 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.897336006 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.897356987 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.897726059 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.897778988 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.897785902 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.897835970 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.897851944 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.897867918 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.897881031 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.897882938 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.897916079 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.898389101 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.898439884 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.898466110 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.898513079 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.898530006 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.898551941 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.898566008 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.898567915 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.898585081 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.898586988 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.898602962 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.898648024 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.899454117 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.899477005 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.899492979 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.899507046 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.899509907 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.899528980 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.899543047 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.899544001 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.899559975 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.899581909 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.899595022 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.899609089 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:07.900386095 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:07.900433064 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.104530096 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.104590893 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.104605913 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.104640961 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.104640961 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.104671955 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.104681969 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.104690075 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.104707003 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.104754925 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.105112076 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.105127096 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.105143070 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.105159044 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.105175018 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.105180979 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.105190992 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.105206013 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.105206966 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.105221987 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.105226040 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.105252981 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.105662107 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.105710030 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.105714083 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.105736971 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.105753899 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.105770111 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.105777979 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.105803013 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.105803967 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.105820894 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.105827093 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.105854034 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.106374025 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.106396914 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.106414080 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.106439114 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.106453896 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.106484890 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.106501102 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.106517076 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.106539965 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.106545925 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.106556892 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.106573105 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.106585026 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.106589079 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.106606007 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.106616974 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.106647968 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.107394934 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.107409954 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.107425928 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.107441902 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.107453108 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.107458115 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.107475042 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.107486010 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.107500076 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.107513905 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.156678915 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.312273026 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.312292099 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.312309027 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.312354088 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.312372923 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.312428951 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.312664032 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.312789917 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.312820911 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.312843084 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.312858105 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.312874079 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.312887907 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.312902927 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.312911987 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.312922001 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.312937975 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.312942982 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.312952995 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.312956095 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.312975883 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.312999010 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.313016891 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313040018 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.313113928 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313128948 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313138008 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313152075 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313167095 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313184023 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313186884 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.313235998 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.313420057 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313436031 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313494921 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313510895 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313534021 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.313534021 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.313539982 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313563108 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313579082 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313592911 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313606977 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313611984 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.313635111 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.313642025 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313659906 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313663006 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.313673973 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313688993 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.313714981 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.313746929 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.314253092 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.314277887 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.314311981 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.314325094 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.314327002 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.314342976 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.314362049 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.314378023 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.314399958 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.314415932 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.314426899 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.314430952 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.314455032 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.314483881 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.314498901 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.314502001 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.314522028 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.314522982 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.314541101 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.314585924 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.314585924 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:08.315253019 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.315268993 CET1709349916156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:08.315326929 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:09.417279959 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:09.422106028 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:09.422200918 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:11.328744888 CET4991617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:14.831335068 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:14.836148977 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:14.836162090 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:14.836172104 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:14.836275101 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:15.375133991 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:15.375416994 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:15.380211115 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:26.313251972 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:26.318065882 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:26.630960941 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:26.672391891 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:26.692274094 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:26.697108030 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:42.500866890 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:42.619323969 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:42.955595970 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:43.000617027 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:43.038355112 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:43.043150902 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:58.674565077 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:58.679470062 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:58.996917963 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:35:59.047641993 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:59.084880114 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:35:59.091658115 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:36:15.375847101 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:36:15.380810976 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:36:15.745831966 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:36:15.797676086 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:36:15.848962069 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:36:15.853832960 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:36:31.563566923 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:36:31.568456888 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:36:31.885278940 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:36:31.938391924 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:36:31.975116968 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:36:31.979979992 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:36:47.641699076 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:36:47.763598919 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:36:48.121665001 CET1709349936156.251.17.243192.168.2.4
                                                                                              Jan 2, 2025 17:36:48.169292927 CET4993617093192.168.2.4156.251.17.243
                                                                                              Jan 2, 2025 17:36:48.174190998 CET1709349936156.251.17.243192.168.2.4

                                                                                              Click to jump to process

                                                                                              Click to jump to process

                                                                                              Click to dive into process behavior distribution

                                                                                              Click to jump to process

                                                                                              Target ID:0
                                                                                              Start time:11:33:41
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Users\user\Desktop\8R2YjBA8nI.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\Desktop\8R2YjBA8nI.exe"
                                                                                              Imagebase:0x400000
                                                                                              File size:77'302'708 bytes
                                                                                              MD5 hash:15D3E848E744AA25B6EDBAEFDF57BF3F
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:1
                                                                                              Start time:11:33:50
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              Imagebase:0x240000
                                                                                              File size:236'544 bytes
                                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:2
                                                                                              Start time:11:33:50
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff7699e0000
                                                                                              File size:862'208 bytes
                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:3
                                                                                              Start time:11:33:50
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              Imagebase:0xe00000
                                                                                              File size:395'368 bytes
                                                                                              MD5 hash:FB325C945A08D06FE91681179BDCCC66
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.3067908639.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.2612748611.0000000000FEA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.3235606389.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.3396873224.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000002.3557271908.0000000003AB0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000002.3557007107.0000000003220000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.2744056117.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.3067978820.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.2907446964.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000002.3557849730.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.2907514560.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.2571536188.0000000000FB9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000002.3557383262.0000000003BB0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.3235533822.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.3396747004.0000000004D51000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.2744000452.0000000004D2D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              Antivirus matches:
                                                                                              • Detection: 0%, ReversingLabs
                                                                                              Reputation:low
                                                                                              Has exited:false

                                                                                              Target ID:9
                                                                                              Start time:11:35:01
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat"
                                                                                              Imagebase:0x240000
                                                                                              File size:236'544 bytes
                                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:false

                                                                                              Target ID:10
                                                                                              Start time:11:35:01
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff7699e0000
                                                                                              File size:862'208 bytes
                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:false

                                                                                              Target ID:11
                                                                                              Start time:11:35:01
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:tasklist /FI "IMAGENAME eq Update.exe"
                                                                                              Imagebase:0xcf0000
                                                                                              File size:79'360 bytes
                                                                                              MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:12
                                                                                              Start time:11:35:01
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\SysWOW64\findstr.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:findstr /I "Update.exe"
                                                                                              Imagebase:0x130000
                                                                                              File size:29'696 bytes
                                                                                              MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:13
                                                                                              Start time:11:35:01
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"
                                                                                              Imagebase:0x240000
                                                                                              File size:236'544 bytes
                                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:14
                                                                                              Start time:11:35:01
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:cmd.exe /C powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
                                                                                              Imagebase:0x240000
                                                                                              File size:236'544 bytes
                                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:15
                                                                                              Start time:11:35:01
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff7699e0000
                                                                                              File size:862'208 bytes
                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:16
                                                                                              Start time:11:35:01
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff7699e0000
                                                                                              File size:862'208 bytes
                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:17
                                                                                              Start time:11:35:01
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"
                                                                                              Imagebase:0x540000
                                                                                              File size:433'152 bytes
                                                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:18
                                                                                              Start time:11:35:01
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
                                                                                              Imagebase:0x540000
                                                                                              File size:433'152 bytes
                                                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:19
                                                                                              Start time:11:35:02
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\SysWOW64\timeout.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:timeout /t 30 /nobreak
                                                                                              Imagebase:0xb00000
                                                                                              File size:25'088 bytes
                                                                                              MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:20
                                                                                              Start time:11:35:32
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:tasklist /FI "IMAGENAME eq Update.exe"
                                                                                              Imagebase:0xcf0000
                                                                                              File size:79'360 bytes
                                                                                              MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:21
                                                                                              Start time:11:35:32
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\SysWOW64\findstr.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:findstr /I "Update.exe"
                                                                                              Imagebase:0x130000
                                                                                              File size:29'696 bytes
                                                                                              MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:22
                                                                                              Start time:11:35:32
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\SysWOW64\timeout.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:timeout /t 30 /nobreak
                                                                                              Imagebase:0xb00000
                                                                                              File size:25'088 bytes
                                                                                              MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:23
                                                                                              Start time:11:36:02
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:tasklist /FI "IMAGENAME eq Update.exe"
                                                                                              Imagebase:0xcf0000
                                                                                              File size:79'360 bytes
                                                                                              MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:24
                                                                                              Start time:11:36:02
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\SysWOW64\findstr.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:findstr /I "Update.exe"
                                                                                              Imagebase:0x130000
                                                                                              File size:29'696 bytes
                                                                                              MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:25
                                                                                              Start time:11:36:02
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\SysWOW64\timeout.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:timeout /t 30 /nobreak
                                                                                              Imagebase:0xb00000
                                                                                              File size:25'088 bytes
                                                                                              MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:26
                                                                                              Start time:11:36:32
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:tasklist /FI "IMAGENAME eq Update.exe"
                                                                                              Imagebase:0xcf0000
                                                                                              File size:79'360 bytes
                                                                                              MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:27
                                                                                              Start time:11:36:32
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\SysWOW64\findstr.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:findstr /I "Update.exe"
                                                                                              Imagebase:0x130000
                                                                                              File size:29'696 bytes
                                                                                              MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:28
                                                                                              Start time:11:36:32
                                                                                              Start date:02/01/2025
                                                                                              Path:C:\Windows\SysWOW64\timeout.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:timeout /t 30 /nobreak
                                                                                              Imagebase:0xb00000
                                                                                              File size:25'088 bytes
                                                                                              MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:false

                                                                                              Reset < >

                                                                                                Execution Graph

                                                                                                Execution Coverage:18%
                                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                                Signature Coverage:26.8%
                                                                                                Total number of Nodes:1423
                                                                                                Total number of Limit Nodes:15
                                                                                                execution_graph 9093 410e7f 9094 410e9a 9093->9094 9095 410eb5 9094->9095 9097 40f42d 9094->9097 9098 40f445 free 9097->9098 9099 40f437 9097->9099 9100 4024e7 46 API calls 9098->9100 9099->9098 9101 40f456 9099->9101 9100->9101 9101->9095 9089 40e63c 9090 40e5d3 6 API calls 9089->9090 9091 40e644 9090->9091 8241 4024c4 8242 40245a 45 API calls 8241->8242 8243 4024cd 8242->8243 8244 4024d2 8243->8244 8245 4024d3 VirtualAlloc 8243->8245 8246 4096c7 _EH_prolog 8260 4096fa 8246->8260 8247 40971c 8248 409827 8281 40118a 8248->8281 8250 409851 8255 40985e ??2@YAPAXI 8250->8255 8251 40983c 8332 409425 8251->8332 8252 4094e0 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8252->8260 8254 40969d 8 API calls 8254->8260 8256 409878 8255->8256 8261 409925 ??2@YAPAXI 8256->8261 8262 4098c2 8256->8262 8266 409530 3 API calls 8256->8266 8268 409425 ctype 3 API calls 8256->8268 8270 4099a2 8256->8270 8275 409a65 8256->8275 8291 409fb4 8256->8291 8295 408ea4 8256->8295 8338 409c13 ??2@YAPAXI 8256->8338 8340 409f49 8256->8340 8258 40e959 VirtualFree ??3@YAXPAX free free ctype 8258->8260 8260->8247 8260->8248 8260->8252 8260->8254 8260->8258 8325 4095b7 8260->8325 8329 409403 8260->8329 8261->8256 8335 409530 8262->8335 8266->8256 8268->8256 8271 409530 3 API calls 8270->8271 8272 4099c7 8271->8272 8273 409425 ctype 3 API calls 8272->8273 8273->8247 8277 409530 3 API calls 8275->8277 8278 409a84 8277->8278 8279 409425 ctype 3 API calls 8278->8279 8279->8247 8282 401198 GetDiskFreeSpaceExW 8281->8282 8283 4011ee SendMessageW 8281->8283 8282->8283 8284 4011b0 8282->8284 8289 4011d6 8283->8289 8284->8283 8285 401f9d 19 API calls 8284->8285 8286 4011c9 8285->8286 8287 407717 25 API calls 8286->8287 8288 4011cf 8287->8288 8288->8289 8290 4011e7 8288->8290 8289->8250 8289->8251 8290->8283 8292 409fdd 8291->8292 8344 409dff 8292->8344 8618 40aef3 8295->8618 8298 408ec1 8298->8256 8300 408fd5 8636 408b7c 8300->8636 8301 408f0d ??2@YAPAXI 8310 408ef5 8301->8310 8303 408f31 ??2@YAPAXI 8303->8310 8310->8300 8310->8301 8310->8303 8681 40cdb8 ??2@YAPAXI 8310->8681 8326 4095c6 8325->8326 8328 4095cc 8325->8328 8326->8260 8327 4095e2 _CxxThrowException 8327->8326 8328->8326 8328->8327 8330 40e8e2 4 API calls 8329->8330 8331 40940b 8330->8331 8331->8260 8333 40e8da ctype 3 API calls 8332->8333 8334 409433 8333->8334 8336 408963 ctype 3 API calls 8335->8336 8337 40953b 8336->8337 8339 409c45 8338->8339 8339->8256 8341 409f4e 8340->8341 8342 409f75 8341->8342 8343 409cde 110 API calls 8341->8343 8342->8256 8343->8341 8346 409e04 8344->8346 8345 409e3a 8345->8256 8346->8345 8348 409cde 8346->8348 8349 409cf8 8348->8349 8353 40db1f 8349->8353 8356 401626 8349->8356 8350 409d2c 8350->8346 8419 40da56 8353->8419 8357 401642 8356->8357 8363 401638 8356->8363 8427 40a62f _EH_prolog 8357->8427 8359 40166f 8495 40eca9 8359->8495 8360 401411 2 API calls 8362 401688 8360->8362 8364 401962 ??3@YAXPAX 8362->8364 8365 40169d 8362->8365 8363->8350 8369 40eca9 VariantClear 8364->8369 8453 401329 8365->8453 8368 4016a8 8457 401454 8368->8457 8369->8363 8372 401362 2 API calls 8373 4016c7 ??3@YAXPAX 8372->8373 8378 4016d9 8373->8378 8405 401928 ??3@YAXPAX 8373->8405 8375 40eca9 VariantClear 8375->8363 8376 4016fa 8377 40eca9 VariantClear 8376->8377 8379 401702 ??3@YAXPAX 8377->8379 8378->8376 8380 401764 8378->8380 8393 401725 8378->8393 8379->8359 8382 4017a2 8380->8382 8383 401789 8380->8383 8381 40eca9 VariantClear 8384 401737 ??3@YAXPAX 8381->8384 8386 4017c4 GetLocalTime SystemTimeToFileTime 8382->8386 8387 4017aa 8382->8387 8385 40eca9 VariantClear 8383->8385 8384->8359 8388 401791 ??3@YAXPAX 8385->8388 8386->8387 8389 4017e1 8387->8389 8390 4017f8 8387->8390 8387->8393 8388->8359 8462 403354 lstrlenW 8389->8462 8486 40301a GetFileAttributesW 8390->8486 8393->8381 8395 401934 GetLastError 8395->8405 8396 401818 ??2@YAPAXI 8398 401824 8396->8398 8397 40192a 8397->8395 8499 40db53 8398->8499 8401 40190f 8404 40eca9 VariantClear 8401->8404 8402 40185f GetLastError 8502 4012f7 8402->8502 8404->8405 8405->8375 8406 401871 8407 403354 86 API calls 8406->8407 8411 40187f ??3@YAXPAX 8406->8411 8409 4018cc 8407->8409 8409->8411 8412 40db53 2 API calls 8409->8412 8410 40189c 8413 40eca9 VariantClear 8410->8413 8411->8410 8414 4018f1 8412->8414 8415 4018aa ??3@YAXPAX 8413->8415 8416 4018f5 GetLastError 8414->8416 8417 401906 ??3@YAXPAX 8414->8417 8415->8359 8416->8411 8417->8401 8424 40d985 8419->8424 8422 40da65 CreateFileW 8423 40da8a 8422->8423 8423->8350 8425 40d98f CloseHandle 8424->8425 8426 40d99a 8424->8426 8425->8426 8426->8422 8426->8423 8428 40a738 8427->8428 8429 40a66a 8427->8429 8430 40a687 8428->8430 8431 40a73d 8428->8431 8429->8430 8432 40a704 8429->8432 8433 40a679 8429->8433 8440 40a6ad 8430->8440 8531 40a3b0 8430->8531 8434 40a6f2 8431->8434 8437 40a747 8431->8437 8438 40a699 8431->8438 8432->8440 8505 40e69c 8432->8505 8433->8434 8435 40a67e 8433->8435 8527 40ed34 8434->8527 8439 40a6b2 8435->8439 8444 40a684 8435->8444 8437->8434 8437->8439 8438->8440 8519 40ed59 8438->8519 8439->8440 8523 40ed79 8439->8523 8514 40ecae 8440->8514 8443 40a71a 8508 40eced 8443->8508 8444->8430 8444->8438 8450 40eca9 VariantClear 8452 40166b 8450->8452 8452->8359 8452->8360 8454 401340 8453->8454 8455 40112b 2 API calls 8454->8455 8456 40134b 8455->8456 8456->8368 8458 4012f7 2 API calls 8457->8458 8459 401462 8458->8459 8546 4013e2 8459->8546 8461 40146d 8461->8372 8463 4024fc 2 API calls 8462->8463 8464 403375 8463->8464 8465 40112b 2 API calls 8464->8465 8468 403385 8464->8468 8465->8468 8467 4033d3 GetSystemTimeAsFileTime GetFileAttributesW 8469 4033e8 8467->8469 8470 4033f2 8467->8470 8468->8467 8476 403477 8468->8476 8549 401986 CreateDirectoryW 8468->8549 8471 40301a 22 API calls 8469->8471 8472 401986 4 API calls 8470->8472 8483 4033f8 ??3@YAXPAX 8470->8483 8471->8470 8485 403405 8472->8485 8473 4034a7 8474 407776 55 API calls 8473->8474 8479 4034b1 ??3@YAXPAX 8474->8479 8475 40340a 8555 407776 8475->8555 8476->8473 8476->8483 8477 40346b ??3@YAXPAX 8482 4034bc 8477->8482 8478 40341d memcpy 8478->8485 8479->8482 8482->8393 8483->8482 8484 401986 4 API calls 8484->8485 8485->8475 8485->8477 8485->8478 8485->8484 8487 403037 8486->8487 8493 401804 8486->8493 8488 403048 8487->8488 8489 40303b SetLastError 8487->8489 8490 403051 8488->8490 8492 40305f FindFirstFileW 8488->8492 8488->8493 8489->8493 8574 402fed 8490->8574 8492->8490 8494 403072 FindClose CompareFileTime 8492->8494 8493->8395 8493->8396 8493->8397 8494->8490 8494->8493 8496 40ec65 8495->8496 8497 40ec86 VariantClear 8496->8497 8498 40ec9d 8496->8498 8497->8363 8498->8363 8615 40db3c 8499->8615 8503 40112b 2 API calls 8502->8503 8504 401311 8503->8504 8504->8406 8506 4012f7 2 API calls 8505->8506 8507 40e6a9 8506->8507 8507->8443 8535 40ecd7 8508->8535 8511 40ed12 8512 40a726 ??3@YAXPAX 8511->8512 8513 40ed17 _CxxThrowException 8511->8513 8512->8440 8513->8512 8538 40ec65 8514->8538 8516 40ecba 8517 40a7b2 8516->8517 8518 40ecbe memcpy 8516->8518 8517->8450 8518->8517 8520 40ed62 8519->8520 8521 40ed67 8519->8521 8522 40ecd7 VariantClear 8520->8522 8521->8440 8522->8521 8524 40ed82 8523->8524 8525 40ed87 8523->8525 8526 40ecd7 VariantClear 8524->8526 8525->8440 8526->8525 8528 40ed42 8527->8528 8529 40ed3d 8527->8529 8528->8440 8530 40ecd7 VariantClear 8529->8530 8530->8528 8532 40a3c2 8531->8532 8533 40a3de 8532->8533 8542 40eda0 8532->8542 8533->8440 8536 40eca9 VariantClear 8535->8536 8537 40ecdf SysAllocString 8536->8537 8537->8511 8537->8512 8539 40ec6d 8538->8539 8540 40ec86 VariantClear 8539->8540 8541 40ec9d 8539->8541 8540->8516 8541->8516 8543 40edae 8542->8543 8544 40eda9 8542->8544 8543->8533 8545 40ecd7 VariantClear 8544->8545 8545->8543 8547 401398 2 API calls 8546->8547 8548 4013f2 8547->8548 8548->8461 8550 4019c7 8549->8550 8551 401997 GetLastError 8549->8551 8550->8468 8552 4019b1 GetFileAttributesW 8551->8552 8554 4019a6 8551->8554 8552->8550 8552->8554 8553 4019a7 SetLastError 8553->8468 8554->8550 8554->8553 8556 401f9d 19 API calls 8555->8556 8557 40778a wvsprintfW 8556->8557 8558 407859 8557->8558 8559 4077ab GetLastError FormatMessageW 8557->8559 8562 4076a8 25 API calls 8558->8562 8560 4077d9 FormatMessageW 8559->8560 8561 4077ee lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 8559->8561 8560->8558 8560->8561 8566 4076a8 8561->8566 8564 407865 8562->8564 8564->8483 8567 407715 ??3@YAXPAX LocalFree 8566->8567 8568 4076b7 8566->8568 8567->8564 8569 40661a 2 API calls 8568->8569 8570 4076c6 IsWindow 8569->8570 8571 4076ef 8570->8571 8572 4076dd IsBadReadPtr 8570->8572 8573 4073d1 21 API calls 8571->8573 8572->8571 8573->8567 8580 402c86 8574->8580 8576 402ff6 8577 403017 8576->8577 8578 402ffb GetLastError 8576->8578 8577->8493 8579 403006 8578->8579 8579->8493 8581 402c93 GetFileAttributesW 8580->8581 8582 402c8f 8580->8582 8583 402ca4 8581->8583 8584 402ca9 8581->8584 8582->8576 8583->8576 8585 402cc7 8584->8585 8586 402cad SetFileAttributesW 8584->8586 8591 402b79 8585->8591 8588 402cc3 8586->8588 8589 402cba DeleteFileW 8586->8589 8588->8576 8589->8576 8592 4024fc 2 API calls 8591->8592 8593 402b90 8592->8593 8594 40254d 2 API calls 8593->8594 8595 402b9d FindFirstFileW 8594->8595 8596 402c55 SetFileAttributesW 8595->8596 8609 402bbf 8595->8609 8598 402c60 RemoveDirectoryW 8596->8598 8599 402c78 ??3@YAXPAX 8596->8599 8597 401329 2 API calls 8597->8609 8598->8599 8600 402c6d ??3@YAXPAX 8598->8600 8601 402c80 8599->8601 8600->8601 8601->8576 8603 40254d 2 API calls 8603->8609 8604 402c24 SetFileAttributesW 8604->8599 8606 402c2d DeleteFileW 8604->8606 8605 402bef lstrcmpW 8607 402c05 lstrcmpW 8605->8607 8608 402c38 FindNextFileW 8605->8608 8606->8609 8607->8608 8607->8609 8608->8609 8610 402c4e FindClose 8608->8610 8609->8597 8609->8599 8609->8603 8609->8604 8609->8605 8609->8608 8611 402b79 2 API calls 8609->8611 8612 401429 8609->8612 8610->8596 8611->8609 8613 401398 2 API calls 8612->8613 8614 401433 8613->8614 8614->8609 8616 40db1f 2 API calls 8615->8616 8617 401857 8616->8617 8617->8401 8617->8402 8619 40af0c 8618->8619 8634 408ebd 8618->8634 8619->8634 8711 40ac7a 8619->8711 8621 40af3f 8622 40ac7a 7 API calls 8621->8622 8623 40b0cb 8621->8623 8627 40af96 8622->8627 8625 40e959 ctype 4 API calls 8623->8625 8624 40afbd 8718 40e959 8624->8718 8625->8634 8627->8623 8627->8624 8628 40b043 8631 40e959 ctype 4 API calls 8628->8631 8629 408761 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8630 40afc6 8629->8630 8630->8628 8630->8629 8632 40b07f 8631->8632 8633 40e959 ctype 4 API calls 8632->8633 8633->8634 8634->8298 8635 4065ea InitializeCriticalSection 8634->8635 8635->8310 8730 4086f0 8636->8730 8682 40cdc7 8681->8682 8683 408761 4 API calls 8682->8683 8684 40cdde 8683->8684 8684->8310 8712 40e8da ctype 3 API calls 8711->8712 8713 40ac86 8712->8713 8722 40e811 8713->8722 8715 40aca2 8715->8621 8716 409403 4 API calls 8717 40ac90 8716->8717 8717->8715 8717->8716 8719 40e93b 8718->8719 8720 40e8da ctype 3 API calls 8719->8720 8721 40e943 ??3@YAXPAX 8720->8721 8721->8630 8723 40e8a5 8722->8723 8724 40e824 8722->8724 8723->8717 8725 40e833 _CxxThrowException 8724->8725 8726 40e863 ??2@YAPAXI 8724->8726 8727 40e895 ??3@YAXPAX 8724->8727 8725->8724 8726->8724 8728 40e879 memcpy 8726->8728 8727->8723 8728->8727 8731 40e8da ctype 3 API calls 8730->8731 8732 4086f8 8731->8732 8733 40e8da ctype 3 API calls 8732->8733 8734 408700 8733->8734 8735 40e8da ctype 3 API calls 8734->8735 8736 408708 8735->8736 9102 40dace 9105 40daac 9102->9105 9108 40da8f 9105->9108 9109 40da56 2 API calls 9108->9109 9110 40daa9 9109->9110 9092 40dadc ReadFile 9111 411def __set_app_type __p__fmode __p__commode 9112 411e5e 9111->9112 9113 411e72 9112->9113 9114 411e66 __setusermatherr 9112->9114 9123 411f66 _controlfp 9113->9123 9114->9113 9116 411e77 _initterm __getmainargs _initterm 9117 411ecb GetStartupInfoA 9116->9117 9119 411eff GetModuleHandleA 9117->9119 9124 4064af _EH_prolog 9119->9124 9123->9116 9127 404faa 9124->9127 9432 401b37 GetModuleHandleW CreateWindowExW 9127->9432 9130 404fdc 9131 40648e MessageBoxA 9130->9131 9133 404ff6 9130->9133 9132 4064a5 exit _XcptFilter 9131->9132 9134 401411 2 API calls 9133->9134 9135 40502d 9134->9135 9136 401411 2 API calls 9135->9136 9137 405035 9136->9137 9435 403e23 9137->9435 9142 40254d 2 API calls 9143 405073 9142->9143 9444 402a69 9143->9444 9145 40507c 9458 403d71 9145->9458 9149 40509b _wtol 9151 4050b1 9149->9151 9150 4050d6 9152 403d71 6 API calls 9150->9152 9463 404405 9151->9463 9153 4050e1 9152->9153 9154 4050e7 9153->9154 9155 405118 9153->9155 9620 404996 9154->9620 9156 405130 GetModuleFileNameW 9155->9156 9158 40112b 2 API calls 9155->9158 9159 405151 9156->9159 9160 405142 9156->9160 9158->9156 9165 403d71 6 API calls 9159->9165 9161 407776 55 API calls 9160->9161 9170 4050ec 9161->9170 9162 4050ee ??3@YAXPAX 9638 403e70 9162->9638 9164 4050ff ??3@YAXPAX ??3@YAXPAX 9164->9132 9178 405173 9165->9178 9166 4052d5 9167 401362 2 API calls 9166->9167 9168 4052e5 9167->9168 9169 401362 2 API calls 9168->9169 9173 4052f2 9169->9173 9170->9162 9171 4051fa 9171->9170 9172 40522a 9171->9172 9175 405213 _wtol 9171->9175 9176 403d71 6 API calls 9172->9176 9174 40538d ??2@YAPAXI 9173->9174 9177 401329 2 API calls 9173->9177 9184 405399 9174->9184 9175->9172 9182 405289 9176->9182 9179 405327 9177->9179 9178->9166 9178->9170 9178->9171 9178->9172 9181 401429 2 API calls 9178->9181 9180 401329 2 API calls 9179->9180 9186 40533d 9180->9186 9181->9178 9182->9166 9183 404594 2 API calls 9182->9183 9185 4052ba 9183->9185 9187 4053cf 9184->9187 9191 407776 55 API calls 9184->9191 9185->9166 9189 401362 2 API calls 9185->9189 9190 401362 2 API calls 9186->9190 9488 4025ae 9187->9488 9189->9166 9193 405367 9190->9193 9191->9187 9195 401f9d 19 API calls 9193->9195 9194 4025ae 2 API calls 9196 4053f6 9194->9196 9197 40536e 9195->9197 9198 4025ae 2 API calls 9196->9198 9199 40254d 2 API calls 9197->9199 9201 4053fe 9198->9201 9200 405377 9199->9200 9200->9174 9491 404e3f 9201->9491 9206 40546f 9207 405534 9206->9207 9210 403d71 6 API calls 9206->9210 9209 40e8da ctype 3 API calls 9207->9209 9208 402844 10 API calls 9211 405441 9208->9211 9212 40553c 9209->9212 9213 405493 9210->9213 9211->9206 9214 407776 55 API calls 9211->9214 9215 405573 9212->9215 9669 403093 9212->9669 9213->9207 9224 40549d 9213->9224 9216 405450 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9214->9216 9218 405506 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9215->9218 9219 40557c 9215->9219 9216->9206 9218->9162 9218->9170 9222 405588 wsprintfW 9219->9222 9223 4055ed 9219->9223 9230 401411 2 API calls 9219->9230 9232 401329 ??2@YAPAXI ??3@YAXPAX 9219->9232 9234 401f9d 19 API calls 9219->9234 9703 402f6c ??2@YAPAXI 9219->9703 9709 402425 ??3@YAXPAX ??3@YAXPAX 9219->9709 9221 405556 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9225 4054f5 9221->9225 9226 401411 2 API calls 9222->9226 9519 404603 9223->9519 9224->9218 9643 404cbc 9224->9643 9225->9218 9226->9219 9229 4054cc 9229->9218 9231 407776 55 API calls 9229->9231 9230->9219 9233 4054da ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9231->9233 9232->9219 9233->9225 9234->9219 9235 40584a 9236 404603 26 API calls 9235->9236 9268 40586a 9236->9268 9240 405933 9581 404034 9240->9581 9241 4024fc 2 API calls 9241->9268 9245 4059d8 CoInitialize 9251 40243b lstrcmpW 9245->9251 9246 40595a 9249 40243b lstrcmpW 9246->9249 9247 405935 ??3@YAXPAX 9247->9240 9250 405969 9249->9250 9252 405979 9250->9252 9255 401f9d 19 API calls 9250->9255 9253 4059fe 9251->9253 9736 403b40 9252->9736 9256 405a12 9253->9256 9259 401329 2 API calls 9253->9259 9254 401411 ??2@YAPAXI ??3@YAXPAX 9254->9268 9255->9252 9587 403b59 9256->9587 9258 401362 2 API calls 9258->9268 9259->9256 9263 4073d1 21 API calls 9267 40599c ctype 9263->9267 9264 401329 2 API calls 9264->9268 9265 4055f6 9265->9235 9275 403b94 lstrlenW lstrlenW _wcsnicmp 9265->9275 9279 4057dd _wtol 9265->9279 9294 405878 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9265->9294 9710 40484d 9265->9710 9721 40408b 9265->9721 9266 405a4d 9272 405a2b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9266->9272 9308 405a61 9266->9308 9756 4082e9 9266->9756 9273 4059a7 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9267->9273 9268->9240 9268->9241 9268->9247 9268->9254 9268->9258 9268->9264 9271 402f6c 7 API calls 9268->9271 9578 40243b 9268->9578 9735 402425 ??3@YAXPAX ??3@YAXPAX 9268->9735 9271->9268 9272->9266 9273->9170 9275->9265 9276 405910 ??3@YAXPAX 9276->9268 9277 401411 2 API calls 9277->9308 9279->9265 9280 405bd8 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9301 405bf3 9280->9301 9281 405a9f GetKeyState 9281->9308 9282 405c6c 9285 405ca2 9282->9285 9286 405c74 9282->9286 9283 401329 ??2@YAPAXI ??3@YAXPAX 9283->9308 9284 40243b lstrcmpW 9284->9308 9289 4012f7 2 API calls 9285->9289 9798 403f85 9286->9798 9292 405cb0 9289->9292 9295 403b59 15 API calls 9292->9295 9293 401362 2 API calls 9299 405c91 ??3@YAXPAX 9293->9299 9294->9170 9297 405cb9 9295->9297 9296 407776 55 API calls 9298 405c13 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9296->9298 9300 405cca ??3@YAXPAX 9297->9300 9304 401362 2 API calls 9297->9304 9298->9301 9305 405cd9 9299->9305 9300->9305 9301->9296 9302 405c4a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9301->9302 9302->9301 9303 405bcd ??3@YAXPAX 9303->9308 9304->9300 9306 405d24 9305->9306 9307 405d16 9305->9307 9811 40786b 9306->9811 9594 404a44 9307->9594 9308->9277 9308->9280 9308->9281 9308->9282 9308->9283 9308->9284 9308->9301 9308->9302 9308->9303 9311 401429 ??2@YAPAXI ??3@YAXPAX 9308->9311 9783 407613 9308->9783 9792 407674 9308->9792 9311->9308 9312 405d20 9313 405d65 9312->9313 9817 403e0d 9312->9817 9314 404034 21 API calls 9313->9314 9316 405d77 9314->9316 9318 406373 9316->9318 9319 401411 2 API calls 9316->9319 9321 4063f7 ctype 9318->9321 9324 40243b lstrcmpW 9318->9324 9320 405d95 9319->9320 9364 405da8 9320->9364 9821 40453e 9320->9821 9323 40643a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9321->9323 9329 40243b lstrcmpW 9321->9329 9325 406461 9323->9325 9326 406467 ??3@YAXPAX 9323->9326 9327 4063a4 9324->9327 9325->9326 9328 403e70 ctype 4 API calls 9326->9328 9327->9321 9848 403f48 9327->9848 9330 406478 ??3@YAXPAX ??3@YAXPAX 9328->9330 9332 406416 9329->9332 9330->9132 9331 401411 ??2@YAPAXI ??3@YAXPAX 9331->9364 9332->9323 9336 406423 9332->9336 9335 405dd8 9338 405de5 9335->9338 9339 4061fa ??3@YAXPAX ??3@YAXPAX 9335->9339 9341 4012f7 2 API calls 9336->9341 9337 4073d1 21 API calls 9342 4063e0 ??3@YAXPAX 9337->9342 9830 4043c6 9338->9830 9343 406312 9339->9343 9340 40243b lstrcmpW 9340->9364 9345 406432 9341->9345 9342->9321 9349 40636a ??3@YAXPAX 9343->9349 9350 404034 21 API calls 9343->9350 9853 404aff 9345->9853 9348 405e45 9352 401329 2 API calls 9348->9352 9349->9318 9354 406321 9350->9354 9355 405e4e 9352->9355 9353 4043c6 2 API calls 9356 405e0e 9353->9356 9838 4048ab 9354->9838 9360 403b7f 19 API calls 9355->9360 9361 401362 2 API calls 9356->9361 9358 40626b ??3@YAXPAX ??3@YAXPAX 9358->9343 9359 401329 2 API calls 9359->9364 9378 405e57 9360->9378 9362 405e1a ??3@YAXPAX ??3@YAXPAX GetFileAttributesW 9361->9362 9365 406211 9362->9365 9366 405e41 9362->9366 9363 40633a SetCurrentDirectoryW 9367 4048ab 4 API calls 9363->9367 9364->9331 9364->9335 9364->9340 9364->9348 9364->9358 9364->9359 9368 401429 2 API calls 9364->9368 9371 403e0d 16 API calls 9365->9371 9366->9348 9369 406362 9367->9369 9370 405ee5 ??3@YAXPAX ??3@YAXPAX 9368->9370 9372 403e0d 16 API calls 9369->9372 9370->9364 9373 406216 9371->9373 9372->9349 9374 407776 55 API calls 9373->9374 9375 40621f 7 API calls 9374->9375 9376 40625e 9375->9376 9376->9358 9377 403bce lstrlenW lstrlenW _wcsnicmp 9377->9378 9378->9377 9379 405f61 _wtol 9378->9379 9380 406025 9378->9380 9379->9378 9381 406080 9380->9381 9382 40602e 9380->9382 9383 401362 2 API calls 9381->9383 9384 406053 9382->9384 9385 406034 9382->9385 9386 40607e 9383->9386 9388 401329 2 API calls 9384->9388 9387 401329 2 API calls 9385->9387 9389 40254d 2 API calls 9386->9389 9390 40603f 9387->9390 9391 406051 9388->9391 9392 406092 9389->9392 9393 40254d 2 API calls 9390->9393 9394 40243b lstrcmpW 9391->9394 9395 401411 2 API calls 9392->9395 9396 406048 9393->9396 9397 406068 9394->9397 9398 40609a 9395->9398 9399 40254d 2 API calls 9396->9399 9397->9392 9401 40254d 2 API calls 9397->9401 9400 401411 2 API calls 9398->9400 9399->9391 9402 4060a2 memset 9400->9402 9401->9386 9403 4060e1 9402->9403 9404 404594 2 API calls 9403->9404 9405 4060fe 9404->9405 9406 401329 2 API calls 9405->9406 9407 406109 9406->9407 9408 403b7f 19 API calls 9407->9408 9409 406112 9408->9409 9410 4061b1 9409->9410 9614 4021ed 9409->9614 9412 4062ee ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9410->9412 9414 4061c5 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9410->9414 9412->9343 9414->9339 9415 406150 9417 403b7f 19 API calls 9415->9417 9416 401429 2 API calls 9418 406147 9416->9418 9419 406168 ShellExecuteExW 9417->9419 9420 40254d 2 API calls 9418->9420 9422 406282 9419->9422 9423 40618c 9419->9423 9420->9415 9426 407776 55 API calls 9422->9426 9424 4061a0 CloseHandle 9423->9424 9425 406192 WaitForSingleObject 9423->9425 9835 402185 9424->9835 9425->9424 9428 40628c 9426->9428 9429 403e0d 16 API calls 9428->9429 9430 406291 9 API calls 9429->9430 9431 4062e1 9430->9431 9431->9412 9433 401b6c SetTimer GetMessageW DispatchMessageW KillTimer KiUserCallbackDispatcher 9432->9433 9434 401b9f GetVersionExW 9432->9434 9433->9434 9434->9130 9434->9131 9436 40112b 2 API calls 9435->9436 9437 403e38 GetCommandLineW 9436->9437 9438 404594 9437->9438 9439 4045ce 9438->9439 9441 4045a2 9438->9441 9440 4045c6 9439->9440 9443 401429 2 API calls 9439->9443 9440->9142 9441->9440 9442 401429 2 API calls 9441->9442 9442->9441 9443->9439 9445 401411 2 API calls 9444->9445 9453 402a79 9445->9453 9446 401362 2 API calls 9447 402b6c ??3@YAXPAX 9446->9447 9447->9145 9448 402b5f 9448->9446 9450 401411 2 API calls 9450->9453 9451 401429 ??2@YAPAXI ??3@YAXPAX 9451->9453 9453->9448 9453->9450 9453->9451 9454 401362 2 API calls 9453->9454 9892 4025c6 9453->9892 9895 40272e 9453->9895 9455 402ad9 ??3@YAXPAX 9454->9455 9456 4013e2 2 API calls 9455->9456 9457 402aee ??3@YAXPAX ??3@YAXPAX 9456->9457 9457->9453 9459 403d80 9458->9459 9460 403dbd 9459->9460 9461 403d9a lstrlenW lstrlenW 9459->9461 9460->9149 9460->9151 9906 401a85 9461->9906 9464 401f47 3 API calls 9463->9464 9465 404416 9464->9465 9466 401f9d 19 API calls 9465->9466 9467 40441d 9466->9467 9468 401f9d 19 API calls 9467->9468 9469 404429 9468->9469 9470 401f9d 19 API calls 9469->9470 9471 404435 9470->9471 9472 401f9d 19 API calls 9471->9472 9473 404441 9472->9473 9474 401f9d 19 API calls 9473->9474 9475 40444d 9474->9475 9476 401f9d 19 API calls 9475->9476 9477 404459 9476->9477 9478 401f9d 19 API calls 9477->9478 9479 404465 9478->9479 9480 404480 SHGetSpecialFolderPathW 9479->9480 9483 404533 #17 9479->9483 9484 401411 2 API calls 9479->9484 9485 401329 ??2@YAPAXI ??3@YAXPAX 9479->9485 9487 402f6c 7 API calls 9479->9487 9911 402425 ??3@YAXPAX ??3@YAXPAX 9479->9911 9480->9479 9481 40449a wsprintfW 9480->9481 9482 401411 2 API calls 9481->9482 9482->9479 9483->9150 9484->9479 9485->9479 9487->9479 9489 4022b0 2 API calls 9488->9489 9490 4025c2 9489->9490 9490->9194 9912 403e86 9491->9912 9493 404e56 9494 403e86 2 API calls 9493->9494 9495 404e65 9494->9495 9916 404343 9495->9916 9499 404e82 ??3@YAXPAX 9500 404343 3 API calls 9499->9500 9501 404e9d 9500->9501 9502 403ec1 2 API calls 9501->9502 9503 404ea8 ??3@YAXPAX wsprintfA 9502->9503 9932 403ef6 9503->9932 9505 404ed0 9506 403ef6 2 API calls 9505->9506 9507 404edb 9506->9507 9508 402844 9507->9508 9509 402851 9508->9509 9517 40dcfb 3 API calls 9509->9517 9510 402863 lstrlenA lstrlenA 9515 402890 9510->9515 9511 40296e 9511->9206 9511->9208 9512 40293b memmove 9512->9511 9512->9515 9513 4028db memcmp 9513->9511 9513->9515 9514 402918 memcmp 9514->9515 9515->9511 9515->9512 9515->9513 9515->9514 9518 40dcc7 GetLastError 9515->9518 9943 402640 9515->9943 9517->9510 9518->9515 9520 40243b lstrcmpW 9519->9520 9521 40461c 9520->9521 9522 40466c 9521->9522 9524 401329 2 API calls 9521->9524 9523 40243b lstrcmpW 9522->9523 9525 40468a 9523->9525 9526 404633 9524->9526 9528 40243b lstrcmpW 9525->9528 9527 401f9d 19 API calls 9526->9527 9529 40463a 9527->9529 9531 4046a2 9528->9531 9530 40254d 2 API calls 9529->9530 9532 404643 9530->9532 9533 40243b lstrcmpW 9531->9533 9534 401329 2 API calls 9532->9534 9535 4046ba 9533->9535 9536 40465c 9534->9536 9538 40243b lstrcmpW 9535->9538 9537 401f9d 19 API calls 9536->9537 9539 404663 9537->9539 9540 4046d2 9538->9540 9541 40254d 2 API calls 9539->9541 9542 4046e9 9540->9542 9543 4046d9 lstrcmpiW 9540->9543 9541->9522 9544 40243b lstrcmpW 9542->9544 9543->9542 9545 4046ff 9544->9545 9546 40243b lstrcmpW 9545->9546 9547 40472c 9546->9547 9550 404739 9547->9550 9946 403d1f 9547->9946 9549 40243b lstrcmpW 9554 40474d 9549->9554 9550->9549 9551 40476d 9553 40243b lstrcmpW 9551->9553 9559 404780 9553->9559 9554->9551 9555 40243b lstrcmpW 9554->9555 9950 403cc6 9554->9950 9555->9554 9556 4047a0 9558 40243b lstrcmpW 9556->9558 9560 4047ac 9558->9560 9559->9556 9561 40243b lstrcmpW 9559->9561 9954 403cf7 9559->9954 9562 40243b lstrcmpW 9560->9562 9561->9559 9563 4047bd 9562->9563 9564 40243b lstrcmpW 9563->9564 9565 4047ce 9564->9565 9566 4047e4 9565->9566 9567 4047db _wtol 9565->9567 9568 40243b lstrcmpW 9566->9568 9567->9566 9569 4047f0 9568->9569 9570 404800 9569->9570 9571 4047f7 _wtol 9569->9571 9572 40243b lstrcmpW 9570->9572 9571->9570 9573 40480c 9572->9573 9574 40243b lstrcmpW 9573->9574 9575 404824 9574->9575 9576 40243b lstrcmpW 9575->9576 9577 40483c 9576->9577 9577->9265 9962 4023dd 9578->9962 9582 404045 9581->9582 9583 404088 9581->9583 9584 4012f7 2 API calls 9582->9584 9585 403b7f 19 API calls 9582->9585 9583->9245 9583->9246 9584->9582 9586 404062 SetEnvironmentVariableW ??3@YAXPAX 9585->9586 9586->9582 9586->9583 9588 40393b 7 API calls 9587->9588 9589 403b69 9588->9589 9590 4039f6 7 API calls 9589->9590 9591 403b74 9590->9591 9592 4027c7 6 API calls 9591->9592 9593 403b7a 9592->9593 9593->9266 9739 4083b6 9593->9739 9966 408676 9594->9966 9596 404a55 ??2@YAPAXI 9597 404a64 9596->9597 9611 40dcfb 3 API calls 9597->9611 9598 404a85 9968 40a7de _EH_prolog 9598->9968 9984 40b2fc 9598->9984 9599 404a95 9600 404ab3 9599->9600 9601 404a99 9599->9601 9603 404ada ??2@YAPAXI 9600->9603 9607 403354 86 API calls 9600->9607 9602 407776 55 API calls 9601->9602 9606 404aa1 9602->9606 9604 404ae6 9603->9604 9605 404aed 9603->9605 10009 404292 9604->10009 9990 40150b 9605->9990 9606->9312 9609 404ac6 9607->9609 9609->9603 9609->9606 9611->9598 9615 402200 LoadLibraryA GetProcAddress 9614->9615 9616 4021fb 9614->9616 9617 40221b 9615->9617 9618 402223 9615->9618 9616->9410 9616->9415 9616->9416 9617->9616 9618->9617 10472 4021b9 LoadLibraryA GetProcAddress 9618->10472 9621 40661a 2 API calls 9620->9621 9622 4049af 9621->9622 9623 401f9d 19 API calls 9622->9623 9624 4049bd 9623->9624 9625 4024fc 2 API calls 9624->9625 9626 4049c7 9625->9626 9627 4049fd 9626->9627 9629 40254d ??2@YAPAXI ??3@YAXPAX 9626->9629 9628 40254d 2 API calls 9627->9628 9630 404a0a 9628->9630 9629->9626 9631 401f9d 19 API calls 9630->9631 9632 404a11 9631->9632 9633 40254d 2 API calls 9632->9633 9634 404a1b 9633->9634 9635 4073d1 21 API calls 9634->9635 9636 404a30 ??3@YAXPAX 9635->9636 9637 404a41 ctype 9636->9637 9637->9170 9639 40e8da ctype 3 API calls 9638->9639 9640 403e7e 9639->9640 9641 40e8da ctype 3 API calls 9640->9641 9642 40e943 ??3@YAXPAX 9641->9642 9642->9164 9644 40db53 2 API calls 9643->9644 9645 404ce8 9644->9645 9646 404d44 9645->9646 9648 4024fc 2 API calls 9645->9648 9647 4025ae 2 API calls 9646->9647 9649 404d4c 9647->9649 9650 404cf7 9648->9650 9651 403e86 2 API calls 9649->9651 9654 404db5 ??3@YAXPAX 9650->9654 9656 403354 86 API calls 9650->9656 9652 404d59 9651->9652 9653 403ef6 2 API calls 9652->9653 9655 404d66 9653->9655 9668 404db1 9654->9668 9657 403ef6 2 API calls 9655->9657 9658 404d1b 9656->9658 9659 404d73 9657->9659 9658->9654 9661 40db53 2 API calls 9658->9661 9660 403ef6 2 API calls 9659->9660 9662 404d80 9660->9662 9663 404d37 9661->9663 9664 40dd5f 2 API calls 9662->9664 9663->9654 9665 404d3b ??3@YAXPAX 9663->9665 9666 404d94 9664->9666 9665->9646 9666->9654 9667 404d9d ??3@YAXPAX 9666->9667 9667->9668 9668->9229 9670 4025ae 2 API calls 9669->9670 9686 4030a8 9670->9686 9671 403301 9672 403344 ??3@YAXPAX 9671->9672 9673 40334e 9672->9673 9673->9215 9673->9221 9674 401411 ??2@YAPAXI ??3@YAXPAX 9674->9686 9676 40272e ??2@YAPAXI ??3@YAXPAX MultiByteToWideChar 9676->9686 9677 401362 2 API calls 9678 4030f3 ??3@YAXPAX ??3@YAXPAX 9677->9678 9679 403303 9678->9679 9678->9686 10480 4029c3 9679->10480 9683 40331c ??3@YAXPAX 9683->9673 9684 4031e5 strncmp 9685 4031d0 strncmp 9684->9685 9684->9686 9685->9684 9685->9686 9686->9671 9686->9674 9686->9676 9686->9677 9686->9679 9686->9684 9687 401362 2 API calls 9686->9687 9688 402640 2 API calls 9686->9688 9691 402640 ??2@YAPAXI ??3@YAXPAX 9686->9691 9693 4023dd lstrcmpW 9686->9693 9694 402f6c 7 API calls 9686->9694 9696 403330 9686->9696 9697 4032b2 lstrcmpW 9686->9697 9701 401329 2 API calls 9686->9701 10474 402986 9686->10474 10479 402425 ??3@YAXPAX ??3@YAXPAX 9686->10479 9689 403252 ??3@YAXPAX 9687->9689 9688->9685 9690 402a69 9 API calls 9689->9690 9692 403263 lstrcmpW 9690->9692 9691->9686 9692->9686 9693->9686 9694->9686 9699 402f6c 7 API calls 9696->9699 9697->9686 9698 4032c0 lstrcmpW 9697->9698 9698->9686 9700 40333c 9699->9700 10498 402425 ??3@YAXPAX ??3@YAXPAX 9700->10498 9701->9686 9704 402f86 9703->9704 9705 402f7b 9703->9705 9707 408761 4 API calls 9704->9707 10500 402668 9705->10500 9708 402f92 9707->9708 9708->9219 9709->9219 9711 4024fc 2 API calls 9710->9711 9712 40485f 9711->9712 9713 40254d 2 API calls 9712->9713 9714 40486c 9713->9714 9715 404888 9714->9715 9716 401429 2 API calls 9714->9716 9717 40254d 2 API calls 9715->9717 9716->9714 9718 404892 9717->9718 9719 40408b 94 API calls 9718->9719 9720 40489d ??3@YAXPAX 9719->9720 9720->9265 9722 4040a2 lstrlenW 9721->9722 9723 4040ce 9721->9723 9724 401a85 4 API calls 9722->9724 9723->9265 9725 4040b8 9724->9725 9725->9722 9725->9723 9726 4040d5 9725->9726 9727 4024fc 2 API calls 9726->9727 9730 4040de 9727->9730 10505 402776 9730->10505 9731 403093 84 API calls 9732 40414c 9731->9732 9733 404156 ??3@YAXPAX ??3@YAXPAX 9732->9733 9734 40416d ??3@YAXPAX ??3@YAXPAX 9732->9734 9733->9723 9734->9723 9735->9276 9737 40661a 2 API calls 9736->9737 9738 403b48 9737->9738 9738->9263 9740 408646 9739->9740 9752 4083d5 ctype 9739->9752 9740->9272 9741 40661a 2 API calls 9741->9752 9742 40243b lstrcmpW 9742->9752 9743 40786b 23 API calls 9743->9752 9745 407674 23 API calls 9745->9752 9746 407613 23 API calls 9746->9752 9747 403b40 2 API calls 9747->9752 9748 401f9d 19 API calls 9748->9752 9749 403f48 4 API calls 9749->9752 9750 4073d1 21 API calls 9750->9752 9751 407776 55 API calls 9751->9752 9752->9740 9752->9741 9752->9742 9752->9743 9752->9745 9752->9746 9752->9747 9752->9748 9752->9749 9752->9750 9752->9751 9753 407717 25 API calls 9752->9753 9754 4073d1 21 API calls 9752->9754 10515 40744b 9752->10515 9753->9752 9755 408476 ??3@YAXPAX 9754->9755 9755->9752 9757 40243b lstrcmpW 9756->9757 9758 4082fd 9757->9758 9759 40830b 9758->9759 10519 4019f0 GetStdHandle WriteFile 9758->10519 9761 40831e 9759->9761 10520 4019f0 GetStdHandle WriteFile 9759->10520 9763 408333 9761->9763 10521 4019f0 GetStdHandle WriteFile 9761->10521 9767 408344 9763->9767 10522 4019f0 GetStdHandle WriteFile 9763->10522 9765 40243b lstrcmpW 9769 408351 9765->9769 9767->9765 9768 40835f 9771 40243b lstrcmpW 9768->9771 9769->9768 10523 4019f0 GetStdHandle WriteFile 9769->10523 9772 40836c 9771->9772 9773 40837a 9772->9773 10524 4019f0 GetStdHandle WriteFile 9772->10524 9775 40243b lstrcmpW 9773->9775 9776 408387 9775->9776 9777 408395 9776->9777 10525 4019f0 GetStdHandle WriteFile 9776->10525 9779 40243b lstrcmpW 9777->9779 9780 4083a2 9779->9780 9781 4083b2 9780->9781 10526 4019f0 GetStdHandle WriteFile 9780->10526 9781->9266 9784 407636 9783->9784 9785 407658 9784->9785 9786 40764b 9784->9786 10530 407186 9785->10530 10527 407154 9786->10527 9789 407653 9790 4073d1 21 API calls 9789->9790 9791 407671 9790->9791 9791->9308 9793 407689 9792->9793 9794 40716d 2 API calls 9793->9794 9795 407694 9794->9795 9796 4073d1 21 API calls 9795->9796 9797 4076a5 9796->9797 9797->9308 9799 401411 2 API calls 9798->9799 9800 403f96 9799->9800 9801 402535 2 API calls 9800->9801 9802 403f9f GetTempPathW 9801->9802 9803 403fb8 9802->9803 9808 403fcf 9802->9808 9804 402535 2 API calls 9803->9804 9805 403fc3 GetTempPathW 9804->9805 9805->9808 9806 402535 2 API calls 9807 403ff2 wsprintfW 9806->9807 9807->9808 9808->9806 9809 404009 GetFileAttributesW 9808->9809 9810 40402d 9808->9810 9809->9808 9809->9810 9810->9293 9812 40787e 9811->9812 10536 40719f 9812->10536 9815 4073d1 21 API calls 9816 4078b3 9815->9816 9816->9312 9818 403e21 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9817->9818 9819 403e16 9817->9819 9818->9313 9820 402c86 16 API calls 9819->9820 9820->9818 9822 40243b lstrcmpW 9821->9822 9823 40455d 9822->9823 9824 404592 9823->9824 9825 401329 2 API calls 9823->9825 9824->9364 9826 40456c 9825->9826 9827 403b7f 19 API calls 9826->9827 9828 404572 9827->9828 9828->9824 9829 401429 2 API calls 9828->9829 9829->9824 9831 4012f7 2 API calls 9830->9831 9832 4043d4 9831->9832 9833 40254d 2 API calls 9832->9833 9834 4043df 9833->9834 9834->9353 9836 4021a9 9835->9836 9837 40218e LoadLibraryA GetProcAddress 9835->9837 9836->9410 9837->9836 9839 401411 2 API calls 9838->9839 9846 4048bc 9839->9846 9840 401329 2 API calls 9840->9846 9841 40494e 9842 404988 ??3@YAXPAX 9841->9842 9844 4048ab 3 API calls 9841->9844 9842->9363 9843 401429 2 API calls 9843->9846 9845 404985 9844->9845 9845->9842 9846->9840 9846->9841 9846->9843 9847 40243b lstrcmpW 9846->9847 9847->9846 9849 40661a 2 API calls 9848->9849 9850 403f50 9849->9850 9851 401411 2 API calls 9850->9851 9852 403f5e 9851->9852 9852->9337 9854 404cb1 ??3@YAXPAX 9853->9854 9855 404b15 9853->9855 9857 404cb7 9854->9857 9855->9854 9856 404b29 GetDriveTypeW 9855->9856 9856->9854 9858 404b55 9856->9858 9857->9323 9859 403f85 6 API calls 9858->9859 9860 404b63 CreateFileW 9859->9860 9861 404b89 9860->9861 9862 404c7b ??3@YAXPAX ??3@YAXPAX 9860->9862 9863 401411 2 API calls 9861->9863 9862->9857 9864 404b92 9863->9864 9865 401329 2 API calls 9864->9865 9866 404b9f 9865->9866 9867 40254d 2 API calls 9866->9867 9868 404bad 9867->9868 9869 4013e2 2 API calls 9868->9869 9870 404bb9 9869->9870 9871 40254d 2 API calls 9870->9871 9872 404bc7 9871->9872 9873 40254d 2 API calls 9872->9873 9874 404bd4 9873->9874 9875 4013e2 2 API calls 9874->9875 9876 404be0 9875->9876 9877 40254d 2 API calls 9876->9877 9878 404bed 9877->9878 9879 40254d 2 API calls 9878->9879 9880 404bf6 9879->9880 9881 4013e2 2 API calls 9880->9881 9882 404c02 9881->9882 9883 40254d 2 API calls 9882->9883 9884 404c0b 9883->9884 9885 402776 3 API calls 9884->9885 9886 404c1d WriteFile ??3@YAXPAX CloseHandle 9885->9886 9887 404c4b 9886->9887 9888 404c8c 9886->9888 9887->9888 9889 404c53 SetFileAttributesW ShellExecuteW ??3@YAXPAX 9887->9889 9890 402c86 16 API calls 9888->9890 9889->9862 9891 404c94 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9890->9891 9891->9857 9901 4022b0 9892->9901 9896 401411 2 API calls 9895->9896 9897 40273a 9896->9897 9898 402772 9897->9898 9899 402535 2 API calls 9897->9899 9898->9453 9900 402757 MultiByteToWideChar 9899->9900 9900->9898 9902 4022be ??2@YAPAXI 9901->9902 9903 4022ea 9901->9903 9902->9903 9904 4022cf ??3@YAXPAX 9902->9904 9903->9453 9904->9903 9907 401ae3 9906->9907 9910 401a97 9906->9910 9907->9460 9908 401abc CharUpperW CharUpperW 9909 401af3 CharUpperW CharUpperW 9908->9909 9908->9910 9909->9907 9910->9907 9910->9908 9911->9479 9913 403e9e 9912->9913 9914 4022b0 2 API calls 9913->9914 9915 403eac 9914->9915 9915->9493 9917 40435e 9916->9917 9918 404375 9917->9918 9919 40436a 9917->9919 9920 4025ae 2 API calls 9918->9920 9936 4025f6 9919->9936 9922 40437e 9920->9922 9923 4022b0 2 API calls 9922->9923 9924 404387 9923->9924 9926 4025f6 2 API calls 9924->9926 9925 404373 9928 403ec1 9925->9928 9927 4043b5 ??3@YAXPAX 9926->9927 9927->9925 9929 403ecd 9928->9929 9931 403ede 9928->9931 9930 4022b0 2 API calls 9929->9930 9930->9931 9931->9499 9933 403f06 9932->9933 9933->9933 9939 4022fc 9933->9939 9935 403f13 9935->9505 9937 4022b0 2 API calls 9936->9937 9938 402610 9937->9938 9938->9925 9940 402340 9939->9940 9941 402310 9939->9941 9940->9935 9942 4022b0 2 API calls 9941->9942 9942->9940 9944 4022fc 2 API calls 9943->9944 9945 40264a 9944->9945 9945->9515 9947 403d3d 9946->9947 9958 403c63 9947->9958 9951 403cd3 9950->9951 9952 403c63 _wtol 9951->9952 9953 403cf4 9952->9953 9953->9554 9955 403d04 9954->9955 9956 403c63 _wtol 9955->9956 9957 403d1c 9956->9957 9957->9559 9959 403c6d 9958->9959 9960 403c88 _wtol 9959->9960 9961 403cc1 9959->9961 9960->9959 9961->9550 9963 4023e8 9962->9963 9964 4023f4 lstrcmpW 9963->9964 9965 402411 9963->9965 9964->9963 9964->9965 9965->9268 9967 408679 9966->9967 9967->9596 9969 40a7fe 9968->9969 9970 40b2fc 11 API calls 9969->9970 9971 40a823 9970->9971 9972 40a845 9971->9972 9973 40a82c 9971->9973 10014 40cc59 _EH_prolog 9972->10014 10017 40a3fe 9973->10017 9985 40b30d 9984->9985 9989 40dcfb 3 API calls 9985->9989 9986 40b321 9987 40b331 9986->9987 10453 40b163 9986->10453 9987->9599 9989->9986 9991 40151e 9990->9991 9992 401329 2 API calls 9991->9992 9993 40152b 9992->9993 9994 401429 2 API calls 9993->9994 9995 401534 CreateThread 9994->9995 9996 401563 9995->9996 9997 401568 WaitForSingleObject 9995->9997 10466 40129c 9995->10466 9998 40786b 23 API calls 9996->9998 9999 401585 9997->9999 10000 4015b7 9997->10000 9998->9997 10003 4015a3 9999->10003 10006 401594 9999->10006 10001 4015b3 10000->10001 10002 4015bf GetExitCodeThread 10000->10002 10001->9606 10004 4015d6 10002->10004 10005 407776 55 API calls 10003->10005 10004->10001 10004->10006 10007 401605 SetLastError 10004->10007 10005->10001 10006->10001 10008 407776 55 API calls 10006->10008 10007->10006 10008->10001 10010 401411 2 API calls 10009->10010 10011 4042ab 10010->10011 10012 401411 2 API calls 10011->10012 10013 4042b7 10012->10013 10013->9605 10025 40c9fc 10014->10025 10436 40a28e 10017->10436 10047 40a0bf 10025->10047 10181 40a030 10047->10181 10182 40e8da ctype 3 API calls 10181->10182 10183 40a039 10182->10183 10184 40e8da ctype 3 API calls 10183->10184 10185 40a041 10184->10185 10186 40e8da ctype 3 API calls 10185->10186 10187 40a049 10186->10187 10188 40e8da ctype 3 API calls 10187->10188 10189 40a051 10188->10189 10190 40e8da ctype 3 API calls 10189->10190 10191 40a059 10190->10191 10192 40e8da ctype 3 API calls 10191->10192 10193 40a061 10192->10193 10194 40e8da ctype 3 API calls 10193->10194 10195 40a06b 10194->10195 10196 40e8da ctype 3 API calls 10195->10196 10197 40a073 10196->10197 10198 40e8da ctype 3 API calls 10197->10198 10199 40a080 10198->10199 10200 40e8da ctype 3 API calls 10199->10200 10201 40a088 10200->10201 10202 40e8da ctype 3 API calls 10201->10202 10203 40a095 10202->10203 10204 40e8da ctype 3 API calls 10203->10204 10205 40a09d 10204->10205 10206 40e8da ctype 3 API calls 10205->10206 10207 40a0aa 10206->10207 10208 40e8da ctype 3 API calls 10207->10208 10209 40a0b2 10208->10209 10437 40e8da ctype 3 API calls 10436->10437 10438 40a29c 10437->10438 10454 40f0b6 GetLastError 10453->10454 10456 40b17e 10454->10456 10455 40b192 10455->9987 10456->10455 10457 40adc3 3 API calls 10456->10457 10458 40b1b6 memcpy 10457->10458 10463 40b1d9 10458->10463 10459 40b297 ??3@YAXPAX 10459->10455 10460 40b2a2 ??3@YAXPAX 10460->10455 10462 40b27a memmove 10462->10463 10463->10459 10463->10460 10463->10462 10464 40b2ac memcpy 10463->10464 10465 40dcfb 3 API calls 10464->10465 10465->10460 10467 4012a5 10466->10467 10468 4012b8 10466->10468 10467->10468 10469 4012a7 Sleep 10467->10469 10470 4012f1 10468->10470 10471 4012e3 EndDialog 10468->10471 10469->10467 10471->10470 10473 4021db 10472->10473 10473->9617 10475 4025ae 2 API calls 10474->10475 10476 402992 10475->10476 10477 4029be 10476->10477 10478 402640 2 API calls 10476->10478 10477->9686 10478->10476 10479->9686 10481 4029d2 10480->10481 10482 4029de 10480->10482 10499 4019f0 GetStdHandle WriteFile 10481->10499 10484 4025ae 2 API calls 10482->10484 10488 4029e8 10484->10488 10485 4029d9 10497 402425 ??3@YAXPAX ??3@YAXPAX 10485->10497 10486 402a13 10487 40272e 3 API calls 10486->10487 10489 402a25 10487->10489 10488->10486 10492 402640 2 API calls 10488->10492 10490 402a33 10489->10490 10491 402a47 10489->10491 10493 407776 55 API calls 10490->10493 10494 407776 55 API calls 10491->10494 10492->10488 10495 402a42 ??3@YAXPAX ??3@YAXPAX 10493->10495 10494->10495 10495->10485 10497->9683 10498->9672 10499->10485 10501 4012f7 2 API calls 10500->10501 10502 402676 10501->10502 10503 4012f7 2 API calls 10502->10503 10504 402682 10503->10504 10504->9704 10506 4025ae 2 API calls 10505->10506 10507 402785 10506->10507 10508 4027c1 10507->10508 10511 402628 10507->10511 10508->9731 10512 402634 10511->10512 10513 40263a WideCharToMultiByte 10511->10513 10514 4022b0 2 API calls 10512->10514 10513->10508 10514->10513 10516 407456 10515->10516 10517 40745b 10515->10517 10516->9752 10517->10516 10518 4073d1 21 API calls 10517->10518 10518->10516 10519->9759 10520->9761 10521->9763 10522->9767 10523->9768 10524->9773 10525->9777 10526->9781 10528 40661a 2 API calls 10527->10528 10529 40715c 10528->10529 10529->9789 10533 40716d 10530->10533 10534 40661a 2 API calls 10533->10534 10535 407175 10534->10535 10535->9789 10537 40661a 2 API calls 10536->10537 10538 4071a7 10537->10538 10538->9815 8035 40f3f1 8038 4024e7 8035->8038 8043 40245a 8038->8043 8041 4024f5 8042 4024f6 malloc 8044 40246a 8043->8044 8050 402466 8043->8050 8045 40247a GlobalMemoryStatusEx 8044->8045 8044->8050 8046 402488 8045->8046 8045->8050 8046->8050 8051 401f9d 8046->8051 8050->8041 8050->8042 8052 401fb4 8051->8052 8053 401fe5 GetLastError wsprintfW GetEnvironmentVariableW GetLastError 8052->8053 8057 401fdb 8052->8057 8054 402095 SetLastError 8053->8054 8055 40201d ??2@YAPAXI GetEnvironmentVariableW 8053->8055 8054->8057 8058 4020ac 8054->8058 8056 40204c GetLastError 8055->8056 8069 40207e ??3@YAXPAX 8055->8069 8059 402052 8056->8059 8056->8069 8071 407717 8057->8071 8061 4020cb lstrlenA ??2@YAPAXI 8058->8061 8078 401f47 8058->8078 8064 402081 8059->8064 8065 40205c lstrcmpiW 8059->8065 8062 402136 MultiByteToWideChar 8061->8062 8063 4020fc GetLocaleInfoW 8061->8063 8062->8057 8063->8062 8067 402123 _wtol 8063->8067 8064->8054 8068 40206b ??3@YAXPAX 8065->8068 8065->8069 8067->8062 8068->8064 8069->8064 8070 4020c1 8070->8061 8085 40661a 8071->8085 8074 40774e 8089 4073d1 8074->8089 8075 40773c IsBadReadPtr 8075->8074 8079 401f51 GetUserDefaultUILanguage 8078->8079 8080 401f95 8078->8080 8081 401f72 GetSystemDefaultUILanguage 8079->8081 8082 401f6e 8079->8082 8080->8070 8081->8080 8083 401f7e GetSystemDefaultLCID 8081->8083 8082->8070 8083->8080 8084 401f8e 8083->8084 8084->8080 8086 406643 8085->8086 8087 40666f IsWindow 8085->8087 8086->8087 8088 40664b GetSystemMetrics GetSystemMetrics 8086->8088 8087->8074 8087->8075 8088->8087 8090 407444 8089->8090 8091 4073e0 8089->8091 8090->8050 8091->8090 8101 4024fc 8091->8101 8093 4073f1 8094 4024fc 2 API calls 8093->8094 8095 4073fc 8094->8095 8105 403b7f 8095->8105 8098 403b7f 19 API calls 8099 40740e ??3@YAXPAX ??3@YAXPAX 8098->8099 8099->8090 8102 402513 8101->8102 8114 40112b 8102->8114 8104 40251e 8104->8093 8178 403880 8105->8178 8107 403b59 8119 40393b 8107->8119 8109 403b69 8142 4039f6 8109->8142 8111 403b74 8165 4027c7 8111->8165 8115 401177 8114->8115 8116 401139 ??2@YAPAXI 8114->8116 8115->8104 8116->8115 8118 40115a 8116->8118 8117 40116f ??3@YAXPAX 8117->8115 8118->8117 8118->8118 8201 401411 8119->8201 8123 403954 8208 40254d 8123->8208 8125 403961 8126 4024fc 2 API calls 8125->8126 8127 40396e 8126->8127 8212 403805 8127->8212 8130 401362 2 API calls 8131 403992 8130->8131 8132 40254d 2 API calls 8131->8132 8133 40399f 8132->8133 8134 4024fc 2 API calls 8133->8134 8135 4039ac 8134->8135 8136 403805 3 API calls 8135->8136 8137 4039bc ??3@YAXPAX 8136->8137 8138 4024fc 2 API calls 8137->8138 8139 4039d3 8138->8139 8140 403805 3 API calls 8139->8140 8141 4039e2 ??3@YAXPAX ??3@YAXPAX 8140->8141 8141->8109 8143 401411 2 API calls 8142->8143 8144 403a04 8143->8144 8145 401362 2 API calls 8144->8145 8146 403a0f 8145->8146 8147 40254d 2 API calls 8146->8147 8148 403a1c 8147->8148 8149 4024fc 2 API calls 8148->8149 8150 403a29 8149->8150 8151 403805 3 API calls 8150->8151 8152 403a39 ??3@YAXPAX 8151->8152 8153 401362 2 API calls 8152->8153 8154 403a4d 8153->8154 8155 40254d 2 API calls 8154->8155 8156 403a5a 8155->8156 8157 4024fc 2 API calls 8156->8157 8158 403a67 8157->8158 8159 403805 3 API calls 8158->8159 8160 403a77 ??3@YAXPAX 8159->8160 8161 4024fc 2 API calls 8160->8161 8162 403a8e 8161->8162 8163 403805 3 API calls 8162->8163 8164 403a9d ??3@YAXPAX ??3@YAXPAX 8163->8164 8164->8111 8166 401411 2 API calls 8165->8166 8167 4027d5 8166->8167 8168 4027e5 ExpandEnvironmentStringsW 8167->8168 8171 40112b 2 API calls 8167->8171 8169 402809 8168->8169 8170 4027fe ??3@YAXPAX 8168->8170 8237 402535 8169->8237 8172 402840 8170->8172 8171->8168 8172->8098 8175 402824 8176 401362 2 API calls 8175->8176 8177 402838 ??3@YAXPAX 8176->8177 8177->8172 8179 401411 2 API calls 8178->8179 8180 40388e 8179->8180 8181 401362 2 API calls 8180->8181 8182 403899 8181->8182 8183 40254d 2 API calls 8182->8183 8184 4038a6 8183->8184 8185 4024fc 2 API calls 8184->8185 8186 4038b3 8185->8186 8187 403805 3 API calls 8186->8187 8188 4038c3 ??3@YAXPAX 8187->8188 8189 401362 2 API calls 8188->8189 8190 4038d7 8189->8190 8191 40254d 2 API calls 8190->8191 8192 4038e4 8191->8192 8193 4024fc 2 API calls 8192->8193 8194 4038f1 8193->8194 8195 403805 3 API calls 8194->8195 8196 403901 ??3@YAXPAX 8195->8196 8197 4024fc 2 API calls 8196->8197 8198 403918 8197->8198 8199 403805 3 API calls 8198->8199 8200 403927 ??3@YAXPAX ??3@YAXPAX 8199->8200 8200->8107 8202 40112b 2 API calls 8201->8202 8203 401425 8202->8203 8204 401362 8203->8204 8205 40136e 8204->8205 8207 401380 8204->8207 8206 40112b 2 API calls 8205->8206 8206->8207 8207->8123 8209 40255a 8208->8209 8217 401398 8209->8217 8211 402565 8211->8125 8213 40381b 8212->8213 8214 403817 ??3@YAXPAX 8212->8214 8213->8214 8221 4026b1 8213->8221 8225 402f96 8213->8225 8214->8130 8218 4013dc 8217->8218 8219 4013ac 8217->8219 8218->8211 8220 40112b 2 API calls 8219->8220 8220->8218 8222 4026c7 8221->8222 8223 4026db 8222->8223 8229 402346 memmove 8222->8229 8223->8213 8226 402fa5 8225->8226 8228 402fbe 8226->8228 8230 4026e6 8226->8230 8228->8213 8229->8223 8231 4026f6 8230->8231 8232 401398 2 API calls 8231->8232 8233 402702 8232->8233 8236 402346 memmove 8233->8236 8235 40270f 8235->8228 8236->8235 8238 402541 8237->8238 8239 402547 ExpandEnvironmentStringsW 8237->8239 8240 40112b 2 API calls 8238->8240 8239->8175 8240->8239 11204 40e4f9 11205 40e516 11204->11205 11206 40e506 11204->11206 11209 40de46 11206->11209 11212 401b1f VirtualFree 11209->11212 11211 40de81 ??3@YAXPAX 11211->11205 11212->11211 9087 411388 ??2@YAPAXI 9088 411397 9087->9088
                                                                                                APIs
                                                                                                  • Part of subcall function 00401B37: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                                                                                                  • Part of subcall function 00401B37: CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                                                                                                  • Part of subcall function 00401B37: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                                                                                                  • Part of subcall function 00401B37: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                                                                                                  • Part of subcall function 00401B37: DispatchMessageW.USER32(?), ref: 00401B89
                                                                                                  • Part of subcall function 00401B37: KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                                                                                                  • Part of subcall function 00401B37: KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                                                                                                • GetVersionExW.KERNEL32(?,?,?,00000000), ref: 00404FCE
                                                                                                • GetCommandLineW.KERNEL32(?,00000020,?,?,00000000), ref: 0040505C
                                                                                                  • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                                                                                                  • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                                                                                                  • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                                                                                                  • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                                                                                                  • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,00000000,00000020,?,0040508F,?,?,00000000,?,00000000), ref: 00403DA5
                                                                                                  • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,?,00000000), ref: 00403DAD
                                                                                                • _wtol.MSVCRT ref: 0040509F
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004050F1
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405102
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040510A
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,00000208,00000000,?,00000000), ref: 00405138
                                                                                                • _wtol.MSVCRT ref: 00405217
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000010,004177C4,004177C4,?,00000000), ref: 0040538F
                                                                                                  • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                                                                                                  • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                                                                                                  • Part of subcall function 00404E3F: wsprintfA.USER32 ref: 00404EBC
                                                                                                  • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                                                                                                  • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                                                                                                  • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?), ref: 004028E4
                                                                                                  • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                                                                                                  • Part of subcall function 00402844: memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405453
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040545B
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405463
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054DD
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054E5
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054ED
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405509
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405511
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405519
                                                                                                  • Part of subcall function 00403093: ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405559
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405561
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405569
                                                                                                  • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,00000020,?,?,00405650,?,00414668,?,00000000,?), ref: 00403BA1
                                                                                                  • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00403BAA
                                                                                                  • Part of subcall function 00403B94: _wcsnicmp.MSVCRT ref: 00403BB6
                                                                                                • wsprintfW.USER32 ref: 00405595
                                                                                                • _wtol.MSVCRT ref: 004057DE
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040587B
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00405883
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040588B
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,0000003D,00000000,00000000,?,?,00000000,?), ref: 00405913
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,0000003D,00000000,00000000,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4), ref: 00405938
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059AA
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059B2
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059BA
                                                                                                • CoInitialize.OLE32(00000000), ref: 004059E9
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405A30
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405A38
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405A40
                                                                                                • GetKeyState.USER32(00000010), ref: 00405AA1
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405BCD
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BDB
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BE3
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C16
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C1E
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C26
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C2E
                                                                                                • memset.MSVCRT ref: 004060AE
                                                                                                • ShellExecuteExW.SHELL32(?), ref: 0040617E
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?), ref: 0040619A
                                                                                                • CloseHandle.KERNEL32(?,?,?,?), ref: 004061A6
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004061D4
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004061DC
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 004061E4
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 004061EA
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 004061FD
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00406205
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406222
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040622A
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406232
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040623A
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406242
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 0040624A
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 00406252
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 0040626E
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00406276
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BEB
                                                                                                  • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                                                                  • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                                                                  • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                                                                  • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                                                                  • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                                                                  • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                                                                  • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                                                                  • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                                                                  • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                                                                  • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                                                                  • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405C4A
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405C52
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C5A
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C62
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C94
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405CD4
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D41
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D49
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D51
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D59
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E20
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E28
                                                                                                • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E32
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405EEC
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00405EF4
                                                                                                • _wtol.MSVCRT ref: 00405F65
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000001,00000010,?,?,?,?), ref: 00406294
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000001,00000010,?,?,?,?), ref: 0040629C
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000001,00000010,?,?,?,?), ref: 004062A4
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062AA
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062B2
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062BA
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062C2
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062CA
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062D2
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004062F1
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004062F9
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 00406301
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 00406307
                                                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406343
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040636D
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,?,?,?,?,?,?,00000000,?,?,?), ref: 004063E6
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040643D
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,?,?,?), ref: 00406445
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,?,?,?), ref: 0040644D
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406455
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040646A
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040647B
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406483
                                                                                                • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 0040649C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$lstrlen$Message$_wtol$??2@FileFormatHandleModuleTimerlstrcpymemcmpwsprintf$AttributesCallbackCloseCommandCreateCurrentDirectoryDispatchDispatcherErrorExecuteFreeInitializeKillLastLineLocalNameObjectShellSingleStateUserVersionWaitWindow_wcsnicmpmemmovememsetwvsprintf
                                                                                                • String ID: 4AA$4DA$7-Zip SFX$7ZipSfx.%03x$7zSfxString%d$;!@Install@!UTF-8!$;!@InstallEnd@!$@DA$AutoInstall$BeginPrompt$Delete$ExecuteFile$ExecuteParameters$FinishMessage$GUIFlags$GUIMode$HelpText$InstallPath$MiscFlags$OverwriteMode$RunProgram$SelfDelete$SetEnvironment$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$XpA$amd64$del$forcenowait$hidcon$i386$nowait$setup.exe$sfxconfig$sfxversion$shc$x64$x86$IA
                                                                                                • API String ID: 154539431-3058303289
                                                                                                • Opcode ID: cabb4e2e52945036c720e1880f7d789d9992fedd99c9f327f88584105f760328
                                                                                                • Instruction ID: bd55e9a5e2f2b8c77b34d16bce6880ff8bafa7c96c93ceffa7f521d25999041e
                                                                                                • Opcode Fuzzy Hash: cabb4e2e52945036c720e1880f7d789d9992fedd99c9f327f88584105f760328
                                                                                                • Instruction Fuzzy Hash: 65C2E231904619AADF21AF61DC45AEF3769EF00708F54403BF906B61E2EB7C9981CB5D

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 651 401626-401636 652 401642-40166d call 40874d call 40a62f 651->652 653 401638-40163d 651->653 658 401680-40168c call 401411 652->658 659 40166f 652->659 654 401980-401983 653->654 665 401962-40197d ??3@YAXPAX@Z call 40eca9 658->665 666 401692-401697 658->666 660 401671-40167b call 40eca9 659->660 667 40197f 660->667 665->667 666->665 668 40169d-4016d3 call 401329 call 401454 call 401362 ??3@YAXPAX@Z 666->668 667->654 678 401948-40194b 668->678 679 4016d9-4016f8 668->679 680 40194d-401960 ??3@YAXPAX@Z call 40eca9 678->680 683 401713-401717 679->683 684 4016fa-40170e call 40eca9 ??3@YAXPAX@Z 679->684 680->667 687 401719-40171c 683->687 688 40171e-401723 683->688 684->660 690 40174b-401762 687->690 691 401745-401748 688->691 692 401725 688->692 690->684 695 401764-401787 690->695 691->690 693 401727-40172d 692->693 697 40172f-401740 call 40eca9 ??3@YAXPAX@Z 693->697 700 4017a2-4017a8 695->700 701 401789-40179d call 40eca9 ??3@YAXPAX@Z 695->701 697->660 704 4017c4-4017d6 GetLocalTime SystemTimeToFileTime 700->704 705 4017aa-4017ad 700->705 701->660 709 4017dc-4017df 704->709 707 4017b6-4017c2 705->707 708 4017af-4017b1 705->708 707->709 708->693 710 4017e1-4017e3 call 403354 709->710 711 4017f8-4017ff call 40301a 709->711 714 4017e8-4017eb 710->714 715 401804-401809 711->715 714->697 716 4017f1-4017f3 714->716 717 401934-401943 GetLastError 715->717 718 40180f-401812 715->718 716->693 717->678 719 401818-401822 ??2@YAPAXI@Z 718->719 720 40192a-40192d 718->720 722 401833 719->722 723 401824-401831 719->723 720->717 724 401835-401859 call 4010e2 call 40db53 722->724 723->724 729 40190f-401928 call 408726 call 40eca9 724->729 730 40185f-40187d GetLastError call 4012f7 call 402d5a 724->730 729->680 739 4018ba-4018cf call 403354 730->739 740 40187f-401886 730->740 746 4018d1-4018d9 739->746 747 4018db-4018f3 call 40db53 739->747 742 40188a-40189a ??3@YAXPAX@Z 740->742 744 4018a2-4018b5 call 40eca9 ??3@YAXPAX@Z 742->744 745 40189c-40189e 742->745 744->660 745->744 746->742 753 4018f5-401904 GetLastError 747->753 754 401906-40190e ??3@YAXPAX@Z 747->754 753->742 754->729
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f637a799f1653e3b63fa741730d3cbaf64608c0369243d42a1217ae41316ed6c
                                                                                                • Instruction ID: 8ae67fe93764504dd4472983a8ee98937692ca3eac7777145cc28303e79798ac
                                                                                                • Opcode Fuzzy Hash: f637a799f1653e3b63fa741730d3cbaf64608c0369243d42a1217ae41316ed6c
                                                                                                • Instruction Fuzzy Hash: 8DB17C71900205EFCB14EFA5D8849AEB7B5FF44304B24842BF512BB2F1EB39A945CB58

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1082 40301a-403031 GetFileAttributesW 1083 403033-403035 1082->1083 1084 403037-403039 1082->1084 1085 403090-403092 1083->1085 1086 403048-40304f 1084->1086 1087 40303b-403046 SetLastError 1084->1087 1088 403051-403058 call 402fed 1086->1088 1089 40305a-40305d 1086->1089 1087->1085 1088->1085 1091 40308d-40308f 1089->1091 1092 40305f-403070 FindFirstFileW 1089->1092 1091->1085 1092->1088 1094 403072-40308b FindClose CompareFileTime 1092->1094 1094->1088 1094->1091
                                                                                                APIs
                                                                                                • GetFileAttributesW.KERNELBASE(?,-00000001), ref: 00403028
                                                                                                • SetLastError.KERNEL32(00000010), ref: 0040303D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesErrorFileLast
                                                                                                • String ID:
                                                                                                • API String ID: 1799206407-0
                                                                                                • Opcode ID: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                                                                                                • Instruction ID: 32a2c072cbeca167af0ba40feded167abd8377b8b15159977275e4e23b0806bf
                                                                                                • Opcode Fuzzy Hash: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                                                                                                • Instruction Fuzzy Hash: 42018B30102004AADF206F749C4CAAB3BACAB0136BF108632F621F11D8D738DB46965E
                                                                                                APIs
                                                                                                • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 004011A6
                                                                                                • SendMessageW.USER32(00008001,00000000,?), ref: 004011FF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: DiskFreeMessageSendSpace
                                                                                                • String ID:
                                                                                                • API String ID: 696007252-0
                                                                                                • Opcode ID: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                                                                                                • Instruction ID: 9edb1a80411cac00ba33afe52a6c86c35bfa08927eae57e7515b94cd88b359ae
                                                                                                • Opcode Fuzzy Hash: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                                                                                                • Instruction Fuzzy Hash: 1C014B30654209ABEB18EB90DD85F9A3BE9EB05704F108436F611F91F0CB79BA408B1D

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 757 411def-411e64 __set_app_type __p__fmode __p__commode call 411f7b 760 411e72-411ec9 call 411f66 _initterm __getmainargs _initterm 757->760 761 411e66-411e71 __setusermatherr 757->761 764 411f05-411f08 760->764 765 411ecb-411ed3 760->765 761->760 766 411ee2-411ee6 764->766 767 411f0a-411f0e 764->767 768 411ed5-411ed7 765->768 769 411ed9-411edc 765->769 770 411ee8-411eea 766->770 771 411eec-411efd GetStartupInfoA 766->771 767->764 768->765 768->769 769->766 772 411ede-411edf 769->772 770->771 770->772 773 411f10-411f12 771->773 774 411eff-411f03 771->774 772->766 775 411f13-411f40 GetModuleHandleA call 4064af exit _XcptFilter 773->775 774->775
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                                                • String ID: HpA
                                                                                                • API String ID: 801014965-2938899866
                                                                                                • Opcode ID: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                                                                                                • Instruction ID: 158ffaedae0d42993a529c42e252781da09b2560f8e529a8c548a3e081932a5e
                                                                                                • Opcode Fuzzy Hash: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                                                                                                • Instruction Fuzzy Hash: 254192B0944344AFDB20DFA4DC45AEA7BB8FB09711F20452FFA51973A1D7784981CB58

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                                                                                                • CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                                                                                                • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                                                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                                                                                                • DispatchMessageW.USER32(?), ref: 00401B89
                                                                                                • KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                                                                                                • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageTimer$CallbackCreateDispatchDispatcherHandleKillModuleUserWindow
                                                                                                • String ID: Static
                                                                                                • API String ID: 2479445380-2272013587
                                                                                                • Opcode ID: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                                                                                                • Instruction ID: f02a6d563a0a994406544e3b77250aae51f77c8b940714b819f60fd1d37dc764
                                                                                                • Opcode Fuzzy Hash: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                                                                                                • Instruction Fuzzy Hash: 10F03C3250212476CA203FA69C4DEEF7E6CDB86BA2F008160B615A10D1DAB88241C6B9

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 781 40b163-40b183 call 40f0b6 784 40b2f6-40b2f9 781->784 785 40b189-40b190 call 40ac2d 781->785 788 40b192-40b194 785->788 789 40b199-40b1d6 call 40adc3 memcpy 785->789 788->784 792 40b1d9-40b1dd 789->792 793 40b202-40b221 792->793 794 40b1df-40b1f2 792->794 800 40b2a2 793->800 801 40b223-40b22b 793->801 795 40b297-40b2a0 ??3@YAXPAX@Z 794->795 796 40b1f8 794->796 799 40b2f4-40b2f5 795->799 796->793 797 40b1fa-40b1fc 796->797 797->793 797->795 799->784 802 40b2a4-40b2a5 800->802 803 40b2a7-40b2aa 801->803 804 40b22d-40b231 801->804 805 40b2ed-40b2f2 ??3@YAXPAX@Z 802->805 803->802 804->793 806 40b233-40b243 804->806 805->799 807 40b245 806->807 808 40b27a-40b292 memmove 806->808 809 40b254-40b258 807->809 808->792 810 40b25a 809->810 811 40b24c-40b24e 809->811 812 40b25c 810->812 811->812 813 40b250-40b251 811->813 812->808 814 40b25e-40b267 call 40ac2d 812->814 813->809 817 40b269-40b278 814->817 818 40b2ac-40b2e5 memcpy call 40dcfb 814->818 817->808 819 40b247-40b24a 817->819 820 40b2e8-40b2eb 818->820 819->809 820->805
                                                                                                APIs
                                                                                                • memcpy.MSVCRT(00000000,?,0000001F,00010000), ref: 0040B1C5
                                                                                                • memmove.MSVCRT(00000000,-000000C1,00000020,?,00010000), ref: 0040B289
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040B298
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@memcpymemmove
                                                                                                • String ID:
                                                                                                • API String ID: 3549172513-3916222277
                                                                                                • Opcode ID: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                                                                                                • Instruction ID: 201babb0cc669d9fea5df8a163075e687156198648327345136f7fe875bf0058
                                                                                                • Opcode Fuzzy Hash: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                                                                                                • Instruction Fuzzy Hash: 495181B1A00205ABDF14DB95C889AAE7BB4EF49354F1441BAE905B7381D338DD81CB9D

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 822 403354-40337a lstrlenW call 4024fc 825 403385-403391 822->825 826 40337c-403380 call 40112b 822->826 828 403393-403397 825->828 829 403399-40339f 825->829 826->825 828->829 830 4033a2-4033a4 828->830 829->830 831 4033c8-4033d1 call 401986 830->831 834 4033d3-4033e6 GetSystemTimeAsFileTime GetFileAttributesW 831->834 835 4033b7-4033b9 831->835 838 4033e8-4033f6 call 40301a 834->838 839 4033ff-403408 call 401986 834->839 836 4033a6-4033ae 835->836 837 4033bb-4033bd 835->837 836->837 844 4033b0-4033b4 836->844 840 4033c3 837->840 841 403477-40347d 837->841 838->839 851 4033f8-4033fa 838->851 852 403419-40341b 839->852 853 40340a-403417 call 407776 839->853 840->831 847 4034a7-4034ba call 407776 ??3@YAXPAX@Z 841->847 848 40347f-40348a 841->848 844->837 849 4033b6 844->849 864 4034bc-4034c0 847->864 848->847 854 40348c-403490 848->854 849->835 858 40349c-4034a5 ??3@YAXPAX@Z 851->858 855 40346b-403475 ??3@YAXPAX@Z 852->855 856 40341d-40343c memcpy 852->856 853->851 854->847 860 403492-403497 854->860 855->864 862 403451-403455 856->862 863 40343e 856->863 858->864 860->847 861 403499-40349b 860->861 861->858 867 403440-403448 862->867 868 403457-403464 call 401986 862->868 866 403450 863->866 866->862 867->868 869 40344a-40344e 867->869 868->853 872 403466-403469 868->872 869->866 869->868 872->855 872->856
                                                                                                APIs
                                                                                                • lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                                                                                                • GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                                                                                                • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                                                                                                  • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                                                                                  • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                                                                                • memcpy.MSVCRT(-00000001,00404AC6,?,?,?,?,?,00404AC6,?), ref: 0040342F
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 0040346C
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000001,0000000C,00404AC6,00404AC6,?,?,?,?,00404AC6,?), ref: 004034B2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$FileTime$??2@AttributesSystemlstrlenmemcpy
                                                                                                • String ID:
                                                                                                • API String ID: 846840743-0
                                                                                                • Opcode ID: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                                                                                                • Instruction ID: c1b9adc2f16cc45d244a7c0b75b8b4a4f89234fa72cd4c12ee41ca3d86f3c48f
                                                                                                • Opcode Fuzzy Hash: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                                                                                                • Instruction Fuzzy Hash: 8F41C836904611AADB216F998881ABF7F6CEF40716F80403BED01B61D5DB3C9B4282DD

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                  • Part of subcall function 00401F47: GetUserDefaultUILanguage.KERNEL32(00404416,00000000,00000020,?), ref: 00401F51
                                                                                                  • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                                                                  • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                                                                                                  • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                                                                  • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                                                                                                  • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                                                                  • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                                                                  • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                                                                                                  • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                                                                  • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                                                                  • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                                                                                                  • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                                                                  • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                                                                  • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                                                                                  • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                                                                                                  • Part of subcall function 00401F9D: _wtol.MSVCRT ref: 0040212A
                                                                                                  • Part of subcall function 00401F9D: MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                                                                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,?,?,00000000,00000020,?), ref: 0040448C
                                                                                                • wsprintfW.USER32 ref: 004044A7
                                                                                                  • Part of subcall function 00402F6C: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                                                                                                • #17.COMCTL32(?,?,?,?,00000000,00000020,?), ref: 00404533
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$??2@$??3@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                                                                                                • String ID: 7zSfxFolder%02d$IA
                                                                                                • API String ID: 3387708999-1317665167
                                                                                                • Opcode ID: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                                                                                                • Instruction ID: c443879f351b6d6d2b07c84fde6f3777072453d7374e8d7fc75fcfd2f507d9dd
                                                                                                • Opcode Fuzzy Hash: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                                                                                                • Instruction Fuzzy Hash: E03140B19042199BDB10FFA2DC86AEE7B78EB44308F40407FF619B21E1EB785644DB58

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 913 408ea4-408ebf call 40aef3 916 408ec1-408ecb 913->916 917 408ece-408f07 call 4065ea call 408726 913->917 922 408fd5-408ffb call 408d21 call 408b7c 917->922 923 408f0d-408f17 ??2@YAPAXI@Z 917->923 935 408ffd-409013 call 408858 922->935 936 40901e 922->936 925 408f26 923->925 926 408f19-408f24 923->926 927 408f28-408f61 call 4010e2 ??2@YAPAXI@Z 925->927 926->927 933 408f73 927->933 934 408f63-408f71 927->934 937 408f75-408fae call 4010e2 call 408726 call 40cdb8 933->937 934->937 944 409199-4091b0 935->944 945 409019-40901c 935->945 939 409020-409035 call 40e8da call 40874d 936->939 965 408fb0-408fb2 937->965 966 408fb6-408fbb 937->966 954 409037-409044 ??2@YAPAXI@Z 939->954 955 40906d-40907d 939->955 952 4091b6 944->952 953 40934c-409367 call 4087ea 944->953 945->939 957 4091b9-4091e9 952->957 975 409372-409375 953->975 976 409369-40936f 953->976 958 409046-40904d call 408c96 954->958 959 40904f 954->959 970 4090ad-4090b3 955->970 971 40907f 955->971 978 409219-40925f call 40e811 * 2 957->978 979 4091eb-4091f1 957->979 963 409051-409061 call 408726 958->963 959->963 987 409063-409066 963->987 988 409068 963->988 965->966 968 408fc3-408fcf 966->968 969 408fbd-408fbf 966->969 968->922 968->923 969->968 981 409187-409196 call 408e83 970->981 982 4090b9-4090d9 call 40d94b 970->982 977 409081-4090a7 call 40e959 call 408835 call 408931 call 408963 971->977 975->977 983 40937b-4093a2 call 40e811 975->983 976->975 977->970 1016 409261-409264 978->1016 1017 4092c9 978->1017 985 4091f7-409209 979->985 986 4092b9-4092bb 979->986 981->944 997 4090de-4090e6 982->997 999 4093a4-4093b8 call 408761 983->999 1000 4093ba-4093d6 983->1000 1013 409293-409295 985->1013 1014 40920f-409211 985->1014 1001 4092bf-4092c4 986->1001 994 40906a 987->994 988->994 994->955 1005 409283-409288 997->1005 1006 4090ec-4090f3 997->1006 999->1000 1080 4093d7 call 40ce70 1000->1080 1081 4093d7 call 40f160 1000->1081 1001->977 1011 409290 1005->1011 1012 40928a-40928c 1005->1012 1007 409121-409124 1006->1007 1008 4090f5-4090f9 1006->1008 1022 4092b2-4092b7 1007->1022 1023 40912a-409138 call 408726 1007->1023 1008->1007 1018 4090fb-4090fe 1008->1018 1011->1013 1012->1011 1025 409297-409299 1013->1025 1026 40929d-4092a0 1013->1026 1014->978 1024 409213-409215 1014->1024 1027 409267-40927f call 408761 1016->1027 1030 4092cc-4092d2 1017->1030 1028 409104-409112 call 408726 1018->1028 1029 4092a5-4092aa 1018->1029 1020 4093da-4093e4 call 40e959 1020->977 1022->986 1022->1001 1046 409145-409156 call 40cdb8 1023->1046 1047 40913a-409140 call 40d6f0 1023->1047 1024->978 1025->1026 1026->977 1049 409281 1027->1049 1028->1046 1050 409114-40911f call 40d6cb 1028->1050 1029->1001 1041 4092ac-4092ae 1029->1041 1036 4092d4-4092e0 call 408a55 1030->1036 1037 40931d-409346 call 40e959 * 2 1030->1037 1057 4092e2-4092ec 1036->1057 1058 4092ee-4092fa call 408aa0 1036->1058 1037->953 1037->957 1041->1022 1059 409158-40915a 1046->1059 1060 40915e-409163 1046->1060 1047->1046 1049->1030 1050->1046 1063 409303-40931b call 408761 1057->1063 1074 409300 1058->1074 1075 4093e9-4093fe call 40e959 * 2 1058->1075 1059->1060 1065 409165-409167 1060->1065 1066 40916b-409170 1060->1066 1063->1036 1063->1037 1065->1066 1071 409172-409174 1066->1071 1072 409178-409181 1066->1072 1071->1072 1072->981 1072->982 1074->1063 1075->977 1080->1020 1081->1020
                                                                                                APIs
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000018,?,?,00000000,?), ref: 00408F0F
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000028,00000000,?,?,00000000,?), ref: 00408F59
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@
                                                                                                • String ID: IA$IA
                                                                                                • API String ID: 1033339047-1400641299
                                                                                                • Opcode ID: 6a22e71803ea0f4d69e2f58a84b042c4ce0c016d1f42beed39b79896576e25f5
                                                                                                • Instruction ID: ddcf9de22f7a46eeefc4975c1fab543939f34ce9f972055b0c78c556d294e1f5
                                                                                                • Opcode Fuzzy Hash: 6a22e71803ea0f4d69e2f58a84b042c4ce0c016d1f42beed39b79896576e25f5
                                                                                                • Instruction Fuzzy Hash: EF123671A00209DFCB14EFA5C98489ABBB5FF48304B10456EF95AA7392DB39ED85CF44

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1095 410cd0-410d1a call 410b9a free 1098 410d22-410d23 1095->1098 1099 410d1c-410d1e 1095->1099 1099->1098
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: free
                                                                                                • String ID: $KA$4KA$HKA$\KA
                                                                                                • API String ID: 1294909896-3316857779
                                                                                                • Opcode ID: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                                                                                                • Instruction ID: 889df95fe732b3a4b2d84b4ab476e7a54c7f97cead7299b76f73e2708a1c6c0a
                                                                                                • Opcode Fuzzy Hash: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                                                                                                • Instruction Fuzzy Hash: C5F09271409B109FC7319F55E405AC6B7F4AE447183058A2EA89A5BA11D3B8F989CB9C

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1100 4096c7-40970f _EH_prolog call 4010e2 1103 409711-409714 1100->1103 1104 409717-40971a 1100->1104 1103->1104 1105 409730-409755 1104->1105 1106 40971c-409721 1104->1106 1109 409757-40975d 1105->1109 1107 409723-409725 1106->1107 1108 409729-40972b 1106->1108 1107->1108 1110 409b93-409ba4 1108->1110 1111 409763-409767 1109->1111 1112 409827-40983a call 40118a 1109->1112 1113 409769-40976c 1111->1113 1114 40976f-40977e 1111->1114 1120 409851-409876 call 408e4e ??2@YAPAXI@Z 1112->1120 1121 40983c-409846 call 409425 1112->1121 1113->1114 1116 409780-409796 call 4094e0 call 40969d call 40e959 1114->1116 1117 4097a3-4097a8 1114->1117 1137 40979b-4097a1 1116->1137 1118 4097b6-4097f0 call 4094e0 call 40969d call 40e959 call 4095b7 1117->1118 1119 4097aa-4097b4 1117->1119 1124 4097f3-409809 1118->1124 1119->1118 1119->1124 1133 409881-40989a call 4010e2 call 40eb24 1120->1133 1134 409878-40987f call 40ebf7 1120->1134 1144 40984a-40984c 1121->1144 1129 40980c-409814 1124->1129 1136 409816-409825 call 409403 1129->1136 1129->1137 1153 40989d-4098c0 call 40eb19 1133->1153 1134->1133 1136->1129 1137->1109 1144->1110 1157 4098c2-4098c7 1153->1157 1158 4098f6-4098f9 1153->1158 1161 4098c9-4098cb 1157->1161 1162 4098cf-4098e7 call 409530 call 409425 1157->1162 1159 409925-409949 ??2@YAPAXI@Z 1158->1159 1160 4098fb-409900 1158->1160 1163 409954 1159->1163 1164 40994b-409952 call 409c13 1159->1164 1165 409902-409904 1160->1165 1166 409908-40991e call 409530 call 409425 1160->1166 1161->1162 1179 4098e9-4098eb 1162->1179 1180 4098ef-4098f1 1162->1180 1170 409956-40996d call 4010e2 1163->1170 1164->1170 1165->1166 1166->1159 1181 40997b-4099a0 call 409fb4 1170->1181 1182 40996f-409978 1170->1182 1179->1180 1180->1110 1186 4099a2-4099a7 1181->1186 1187 4099e3-4099e6 1181->1187 1182->1181 1190 4099a9-4099ab 1186->1190 1191 4099af-4099b4 1186->1191 1188 4099ec-409a49 call 409603 call 4094b1 call 408ea4 1187->1188 1189 409b4e-409b53 1187->1189 1205 409a4e-409a53 1188->1205 1194 409b55-409b56 1189->1194 1195 409b5b-409b7f 1189->1195 1190->1191 1192 4099b6-4099b8 1191->1192 1193 4099bc-4099d4 call 409530 call 409425 1191->1193 1192->1193 1206 4099d6-4099d8 1193->1206 1207 4099dc-4099de 1193->1207 1194->1195 1195->1153 1208 409ab5-409abb 1205->1208 1209 409a55 1205->1209 1206->1207 1207->1110 1211 409ac1-409ac3 1208->1211 1212 409abd-409abf 1208->1212 1210 409a57 1209->1210 1213 409a5a-409a63 call 409f49 1210->1213 1214 409a65-409a67 1211->1214 1215 409ac5-409ad1 1211->1215 1212->1210 1213->1214 1225 409aa2-409aa4 1213->1225 1217 409a69-409a6a 1214->1217 1218 409a6f-409a71 1214->1218 1219 409ad3-409ad5 1215->1219 1220 409ad7-409add 1215->1220 1217->1218 1222 409a73-409a75 1218->1222 1223 409a79-409a91 call 409530 call 409425 1218->1223 1219->1213 1220->1195 1224 409adf-409ae5 1220->1224 1222->1223 1223->1144 1233 409a97-409a9d 1223->1233 1224->1195 1228 409aa6-409aa8 1225->1228 1229 409aac-409ab0 1225->1229 1228->1229 1229->1195 1233->1144
                                                                                                APIs
                                                                                                • _EH_prolog.MSVCRT ref: 004096D0
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000038,00000001), ref: 0040986E
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000038,?,00000000,00000000,00000001), ref: 00409941
                                                                                                  • Part of subcall function 00409C13: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,?,00409952,?,00000000,00000000,00000001), ref: 00409C3B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@$H_prolog
                                                                                                • String ID: HIA
                                                                                                • API String ID: 3431946709-2712174624
                                                                                                • Opcode ID: 3a91edc2a80342029bdf13785710b8021a7be55c7c109f54d8d38dfd795fbdbc
                                                                                                • Instruction ID: da3614a8b55b1d80bdf53177d95d0cff5abf3d9c279f99a440b99522f39c568d
                                                                                                • Opcode Fuzzy Hash: 3a91edc2a80342029bdf13785710b8021a7be55c7c109f54d8d38dfd795fbdbc
                                                                                                • Instruction Fuzzy Hash: 53F13971610249DFCB24DF69C884AAA77F4BF48314F24416AF829AB392DB39ED41CF54

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1236 402844-40288e call 411c20 call 40dcfb lstrlenA * 2 1240 402893-4028af call 40dcc7 1236->1240 1242 4028b5-4028ba 1240->1242 1243 40297f 1240->1243 1242->1243 1244 4028c0-4028ca 1242->1244 1245 402981-402985 1243->1245 1246 4028cd-4028d2 1244->1246 1247 402911-402916 1246->1247 1248 4028d4-4028d9 1246->1248 1249 40293b-40295f memmove 1247->1249 1251 402918-40292b memcmp 1247->1251 1248->1249 1250 4028db-4028ee memcmp 1248->1250 1256 402961-402968 1249->1256 1257 40296e-402979 1249->1257 1252 4028f4-4028fe 1250->1252 1253 40297b-40297d 1250->1253 1254 40290b-40290f 1251->1254 1255 40292d-402939 1251->1255 1252->1243 1258 402900-402906 call 402640 1252->1258 1253->1245 1254->1246 1255->1246 1256->1257 1259 402890 1256->1259 1257->1245 1258->1254 1259->1240
                                                                                                APIs
                                                                                                • lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                                                                                                • lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                                                                                                • memcmp.MSVCRT(?,?,?), ref: 004028E4
                                                                                                • memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                                                                                                • memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: lstrlenmemcmp$memmove
                                                                                                • String ID:
                                                                                                • API String ID: 3251180759-0
                                                                                                • Opcode ID: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                                                                                                • Instruction ID: d4955105e7b234ce255a009ef61331e6eb412850de833d0a73495bfba1f32545
                                                                                                • Opcode Fuzzy Hash: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                                                                                                • Instruction Fuzzy Hash: 4A417F72E00209AFCF01DFA4C9889EEBBB5EF08344F04447AE945B3291D3B49E55CB55

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1263 40150b-401561 call 408726 call 401329 call 401429 CreateThread 1270 401563 call 40786b 1263->1270 1271 401568-401583 WaitForSingleObject 1263->1271 1270->1271 1273 401585-401588 1271->1273 1274 4015b7-4015bd 1271->1274 1277 40158a-40158d 1273->1277 1278 4015ab 1273->1278 1275 40161b 1274->1275 1276 4015bf-4015d4 GetExitCodeThread 1274->1276 1280 401620-401623 1275->1280 1281 4015d6-4015d8 1276->1281 1282 4015de-4015e9 1276->1282 1283 4015a7-4015a9 1277->1283 1284 40158f-401592 1277->1284 1279 4015ad-4015b5 call 407776 1278->1279 1279->1275 1281->1282 1286 4015da-4015dc 1281->1286 1287 4015f1-4015fa 1282->1287 1288 4015eb-4015ec 1282->1288 1283->1279 1289 4015a3-4015a5 1284->1289 1290 401594-401597 1284->1290 1286->1280 1293 401605-401611 SetLastError 1287->1293 1294 4015fc-401603 1287->1294 1292 4015ee-4015ef 1288->1292 1289->1279 1295 401599-40159c 1290->1295 1296 40159e-4015a1 1290->1296 1297 401613-401618 call 407776 1292->1297 1293->1297 1294->1275 1294->1293 1295->1275 1295->1296 1296->1292 1297->1275
                                                                                                APIs
                                                                                                • CreateThread.KERNELBASE(00000000,00000000,0040129C,00000000,00000000,?), ref: 0040154F
                                                                                                • WaitForSingleObject.KERNEL32(000000FF,?,00404AFB,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401570
                                                                                                  • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                                                                  • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                                                                  • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                                                                  • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                                                                  • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                                                                  • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                                                                  • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                                                                  • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                                                                  • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                                                                  • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                                                                  • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: FormatMessagelstrcpylstrlen$??2@??3@CreateErrorFreeLastLocalObjectSingleThreadWaitwvsprintf
                                                                                                • String ID:
                                                                                                • API String ID: 359084233-0
                                                                                                • Opcode ID: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                                                                                                • Instruction ID: 87277f5b9ffc23463226fd0df2644328d4cfb3d5af9d6e9341eee715f5e270ad
                                                                                                • Opcode Fuzzy Hash: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                                                                                                • Instruction Fuzzy Hash: 8231F171644200BBDA305B15DC86EBB37B9EBC5350F24843BF522F92F0CA79A941DA5E

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1300 401986-401995 CreateDirectoryW 1301 4019c7-4019cb 1300->1301 1302 401997-4019a4 GetLastError 1300->1302 1303 4019b1-4019be GetFileAttributesW 1302->1303 1304 4019a6 1302->1304 1303->1301 1306 4019c0-4019c2 1303->1306 1305 4019a7-4019b0 SetLastError 1304->1305 1306->1301 1307 4019c4-4019c5 1306->1307 1307->1305
                                                                                                APIs
                                                                                                • CreateDirectoryW.KERNELBASE(004033CE,00000000,-00000001,004033CE,?,00404AC6,?,?,?,?,00404AC6,?), ref: 0040198D
                                                                                                • GetLastError.KERNEL32(?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401997
                                                                                                • SetLastError.KERNEL32(000000B7,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019A7
                                                                                                • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019B5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$AttributesCreateDirectoryFile
                                                                                                • String ID:
                                                                                                • API String ID: 635176117-0
                                                                                                • Opcode ID: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                                                                                                • Instruction ID: 5ae0be16486f509c6b40768ba71a6c1c2cea9be4331c5fc90c1b41dbeb0419e3
                                                                                                • Opcode Fuzzy Hash: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                                                                                                • Instruction Fuzzy Hash: D5E09AB0518250AFDE142BB4BD187DB3AA5AF46362F508932F495E02F0C33888428A89

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1308 404a44-404a62 call 408676 ??2@YAPAXI@Z 1311 404a64-404a6b call 40a9f8 1308->1311 1312 404a6d 1308->1312 1314 404a6f-404a91 call 408726 call 40dcfb 1311->1314 1312->1314 1341 404a92 call 40b2fc 1314->1341 1342 404a92 call 40a7de 1314->1342 1319 404a95-404a97 1320 404ab3-404abd 1319->1320 1321 404a99-404aa9 call 407776 1319->1321 1323 404ada-404ae4 ??2@YAPAXI@Z 1320->1323 1324 404abf-404ac1 call 403354 1320->1324 1337 404aae-404ab2 1321->1337 1325 404ae6-404aed call 404292 1323->1325 1326 404aef 1323->1326 1331 404ac6-404ac9 1324->1331 1330 404af1-404af6 call 40150b 1325->1330 1326->1330 1336 404afb-404afd 1330->1336 1331->1323 1335 404acb 1331->1335 1338 404ad0-404ad8 1335->1338 1336->1338 1338->1337 1341->1319 1342->1319
                                                                                                APIs
                                                                                                • ??2@YAPAXI@Z.MSVCRT(000001E8,00000000,?,ExecuteFile,00000015,?,00405D20,?,00417788,00417788), ref: 00404A5A
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000040,?,?,?,?,?,?,?,?,00000000,?), ref: 00404ADC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@
                                                                                                • String ID: ExecuteFile
                                                                                                • API String ID: 1033339047-323923146
                                                                                                • Opcode ID: 612dc6f8e3fe8df0745ed42aa02adea807ab2e0a0b71f5bf8dc2b3d1454147a6
                                                                                                • Instruction ID: 446d0bd8c70a379003bbf02419fa435b46014474c8a02eb0da5acec479ce97d7
                                                                                                • Opcode Fuzzy Hash: 612dc6f8e3fe8df0745ed42aa02adea807ab2e0a0b71f5bf8dc2b3d1454147a6
                                                                                                • Instruction Fuzzy Hash: EA1184B5340104BFD710AB659C85D6B73A8EF80355724443FF602B72D1DA789D418A6D

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1343 40adc3-40adce 1344 40add0-40add3 1343->1344 1345 40ae0d-40ae0f 1343->1345 1346 40add5-40ade3 ??2@YAPAXI@Z 1344->1346 1347 40adfb 1344->1347 1348 40adfd-40ae0c ??3@YAXPAX@Z 1346->1348 1349 40ade5-40ade7 1346->1349 1347->1348 1348->1345 1350 40ade9 1349->1350 1351 40adeb-40adf9 memmove 1349->1351 1350->1351 1351->1348
                                                                                                APIs
                                                                                                • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                                                                • memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@??3@memmove
                                                                                                • String ID:
                                                                                                • API String ID: 3828600508-0
                                                                                                • Opcode ID: 2c1e852e3357fe345785b0ad8426fcfe448c8ec3a37487201466d82e595bf6a2
                                                                                                • Instruction ID: a8ce0a3cb4653ecb547b1a3698f229d81d6147035ad3680bc60947505803a3f4
                                                                                                • Opcode Fuzzy Hash: 2c1e852e3357fe345785b0ad8426fcfe448c8ec3a37487201466d82e595bf6a2
                                                                                                • Instruction Fuzzy Hash: 74F089763047016FC3205B1ADC80857BBABDFC4715311883FE55E93A50D634F891965A
                                                                                                APIs
                                                                                                • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 0040247E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: GlobalMemoryStatus
                                                                                                • String ID: @
                                                                                                • API String ID: 1890195054-2766056989
                                                                                                • Opcode ID: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                                                                                                • Instruction ID: 9ce3ff159218229c34eda893c3d8d64f83397f3f2cddac743d7c565554413103
                                                                                                • Opcode Fuzzy Hash: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                                                                                                • Instruction Fuzzy Hash: AAF0AF30A042048ADF15AB719E8DA5A37A4BB00348F10853AF516F52D4D7BCE9048B5D
                                                                                                APIs
                                                                                                  • Part of subcall function 0040AAAB: _CxxThrowException.MSVCRT(?,00414EF8), ref: 0040AAC5
                                                                                                  • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                                                                  • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                                                                  • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,004149F0,?,004149B0), ref: 0040CAF2
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,004149F0,?,004149B0), ref: 0040CC4A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$??2@ExceptionThrowmemmove
                                                                                                • String ID:
                                                                                                • API String ID: 4269121280-0
                                                                                                • Opcode ID: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                                                                                                • Instruction ID: 88480e7f7e551c391a26326ce122d220a9eefc885560dc6ed21150e7f5ba8ef6
                                                                                                • Opcode Fuzzy Hash: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                                                                                                • Instruction Fuzzy Hash: 00712571A00209EFCB24DFA5C8D1AAEBBB1FF08314F10463AE545A3291D739A945CF99
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 1329742358-0
                                                                                                • Opcode ID: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                                                                                                • Instruction ID: 956102545b91a7c0cba0a64d671320761176ea25dc816e9057e3d4af94f09eda
                                                                                                • Opcode Fuzzy Hash: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                                                                                                • Instruction Fuzzy Hash: 0D411F32800204AFCB09DB65CD45EBE7B35EF50304B18883BF402B72E2D63E9E21965B
                                                                                                APIs
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@??3@
                                                                                                • String ID:
                                                                                                • API String ID: 1936579350-0
                                                                                                • Opcode ID: ebac23084a16b944365a47061f6b21e986bd860b63916dd214b45b095081060c
                                                                                                • Instruction ID: 063e94d8e06ff9613a5b681c15dc067c338ae4066a9753272274ce5f9f11bd0f
                                                                                                • Opcode Fuzzy Hash: ebac23084a16b944365a47061f6b21e986bd860b63916dd214b45b095081060c
                                                                                                • Instruction Fuzzy Hash: 71F0A476210612ABC334DF2DC581867B3E4EF88711710893FE6C7C72B1DA31A881C754
                                                                                                APIs
                                                                                                • SetFilePointer.KERNELBASE(?,?,?,?), ref: 0040DA0B
                                                                                                • GetLastError.KERNEL32(?,?,?,?), ref: 0040DA19
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorFileLastPointer
                                                                                                • String ID:
                                                                                                • API String ID: 2976181284-0
                                                                                                • Opcode ID: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                                                                                                • Instruction ID: d86f9e507f4e039952bd1031b0dc001be1b0661bb6f0ed5f18f0f7cd7a7605a3
                                                                                                • Opcode Fuzzy Hash: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                                                                                                • Instruction Fuzzy Hash: FCF0B2B8A04208FFCB04CFA8D8448AE7BB9EB49314B2085A9F815A7390D735DA04DF64
                                                                                                APIs
                                                                                                • SysAllocString.OLEAUT32(?), ref: 0040ED05
                                                                                                • _CxxThrowException.MSVCRT(?,00415010), ref: 0040ED28
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocExceptionStringThrow
                                                                                                • String ID:
                                                                                                • API String ID: 3773818493-0
                                                                                                • Opcode ID: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                                                                                                • Instruction ID: 896a1b371a95ab63a3f889c911e7bff8eb1facf706b7c8fcc1dab20228dace7a
                                                                                                • Opcode Fuzzy Hash: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                                                                                                • Instruction Fuzzy Hash: CDE06D71600309ABDB10AF66D8419D67BE8EF00380B00C83FF948CA250E779E590C7D9
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(?), ref: 0040E745
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,?,?,?), ref: 0040E764
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterLeave
                                                                                                • String ID:
                                                                                                • API String ID: 3168844106-0
                                                                                                • Opcode ID: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                                                                                                • Instruction ID: 086d926b78662e0ab04275255430a857868cdabe8091615e808f779c17768b54
                                                                                                • Opcode Fuzzy Hash: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                                                                                                • Instruction Fuzzy Hash: 76F05436200214FBCB119F95DC08E9BBBB9FF49761F14842AF945E7260C771E821DBA4
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 3519838083-0
                                                                                                • Opcode ID: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                                                                                                • Instruction ID: 39d544f4fee3d18347c8ea8d59cce7c7d4ef222c74644271f89bd24cd9d44c54
                                                                                                • Opcode Fuzzy Hash: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                                                                                                • Instruction Fuzzy Hash: 4B2180316003099BCB14EFA5C945AAE73B5EF40344F14843EF806BB291DB38DD16CB1A
                                                                                                APIs
                                                                                                • SetFileAttributesW.KERNELBASE(?,?), ref: 0040124F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesFile
                                                                                                • String ID:
                                                                                                • API String ID: 3188754299-0
                                                                                                • Opcode ID: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                                                                                                • Instruction ID: 5817d5120c2da98d16edaa91ace5ca285f5b3ff1e58b2ffd557e42fef7bfdc6e
                                                                                                • Opcode Fuzzy Hash: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                                                                                                • Instruction Fuzzy Hash: 66F05E72100201DBC720AF98C840BA777F5BB84314F04483EE583F2AA0D778B885CB59
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 3519838083-0
                                                                                                • Opcode ID: 05aa82fd4493c2954843b58147a6e12e638aaadf2772ca9641b0bace8f10624d
                                                                                                • Instruction ID: 375caa893e42e0daca7b158ffe4b4b415bc54d3572d418f3e5e61c8e5be1c541
                                                                                                • Opcode Fuzzy Hash: 05aa82fd4493c2954843b58147a6e12e638aaadf2772ca9641b0bace8f10624d
                                                                                                • Instruction Fuzzy Hash: 30F0F272500109BBCF029F85D901AEEBB36EB48354F00811ABA1161160D33A9961AB99
                                                                                                APIs
                                                                                                  • Part of subcall function 0040D985: CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                                                                                                • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50), ref: 0040DA78
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseCreateFileHandle
                                                                                                • String ID:
                                                                                                • API String ID: 3498533004-0
                                                                                                • Opcode ID: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                                                                                                • Instruction ID: 040011ad7fb3de3f437c6c7e3ebc1dcda5640d8293b7e84d035d3e38099293ab
                                                                                                • Opcode Fuzzy Hash: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                                                                                                • Instruction Fuzzy Hash: A1E04F32140219ABCF215FA49C01BCA7B96AF09760F144526BE11A61E0C672D465AF94
                                                                                                APIs
                                                                                                • WriteFile.KERNELBASE(?,?,00000001,00000000,00000000,?,?,0040DD78,00000001,00000000,00000000,00413330,?,00404D94,?,?), ref: 0040DBBA
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3934441357-0
                                                                                                • Opcode ID: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                                                                                                • Instruction ID: ec3d056ad33d5175d1bee219b94afd5900c8108b90431a53c6143dcb1d381838
                                                                                                • Opcode Fuzzy Hash: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                                                                                                • Instruction Fuzzy Hash: D7E0C275600208FBCB00CF95C801B9E7BBABB49755F10C069F918AA2A0D739AA10DF54
                                                                                                APIs
                                                                                                • _beginthreadex.MSVCRT ref: 00406552
                                                                                                  • Part of subcall function 00406501: GetLastError.KERNEL32(00406563,00000000), ref: 004064F5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast_beginthreadex
                                                                                                • String ID:
                                                                                                • API String ID: 4034172046-0
                                                                                                • Opcode ID: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                                                                                                • Instruction ID: fe95790bd269afcad05a26a3721163fc0b830ac61c9b3c5b6bbddf8a66cf2d64
                                                                                                • Opcode Fuzzy Hash: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                                                                                                • Instruction Fuzzy Hash: 12D05EF6400208BFDF01DFE0DC05CAB3BADEB08204B004464FD05C2150E632DA108B60
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 3519838083-0
                                                                                                • Opcode ID: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                                                                                                • Instruction ID: 312fbe8762c42e8d4a239ae194adb86e93363bc1e5443e54fb58aca6058f63a2
                                                                                                • Opcode Fuzzy Hash: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                                                                                                • Instruction Fuzzy Hash: 70D05EB2A04108FBE7109F85D946BEEFB78EB80399F10823FB506B1150D7BC5A0196AD
                                                                                                APIs
                                                                                                • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 0040DAF2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileRead
                                                                                                • String ID:
                                                                                                • API String ID: 2738559852-0
                                                                                                • Opcode ID: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                                                                                                • Instruction ID: c05821c64f4412cbb188b0f884d423eaa3d686fb1c941f6ac6705c8b1bb703da
                                                                                                • Opcode Fuzzy Hash: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                                                                                                • Instruction Fuzzy Hash: 58E0EC75211208FFDB01CF90CD01FDE7BBDFB49755F208058E90596160C7759A10EB54
                                                                                                APIs
                                                                                                • SetFileTime.KERNELBASE(?,?,?,?,0040DB94,00000000,00000000,?,0040123C,?), ref: 0040DB78
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileTime
                                                                                                • String ID:
                                                                                                • API String ID: 1425588814-0
                                                                                                • Opcode ID: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                                                                                                • Instruction ID: c6000770aa4fb4c72b4925fc402daec6625791e8065b7518697746b49206ca3e
                                                                                                • Opcode Fuzzy Hash: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                                                                                                • Instruction Fuzzy Hash: 40C04C3A199105FF8F020F70CD04C1ABBA2AB95722F10C918B199C4070CB328424EB02
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: memmove
                                                                                                • String ID:
                                                                                                • API String ID: 2162964266-0
                                                                                                • Opcode ID: 97bd8de7a7fe9ad43a3345e9333d2138b4beb196f0434672ce39f7d09e0e15cd
                                                                                                • Instruction ID: f56dbf57367ec124b55c1fed62106b1dafce564086f6503587e0b0fbfa293862
                                                                                                • Opcode Fuzzy Hash: 97bd8de7a7fe9ad43a3345e9333d2138b4beb196f0434672ce39f7d09e0e15cd
                                                                                                • Instruction Fuzzy Hash: EA21A271A00B009FC724CFAAC88485BF7F9FF88724764896EE49A93A40E774B945CB54
                                                                                                APIs
                                                                                                • _CxxThrowException.MSVCRT(?,00414F84), ref: 0040E616
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionThrow
                                                                                                • String ID:
                                                                                                • API String ID: 432778473-0
                                                                                                • Opcode ID: 85c4e5dde0f8cee934fbe77132b2d5831568e55a053817787dcfc8e06ea2b7f6
                                                                                                • Instruction ID: f2b552c6dcb6979234feea5fe890f572eb9d388e9264680fa6f26452196acfb0
                                                                                                • Opcode Fuzzy Hash: 85c4e5dde0f8cee934fbe77132b2d5831568e55a053817787dcfc8e06ea2b7f6
                                                                                                • Instruction Fuzzy Hash: 20017171600701AFDB28CFBAD805997BBF8EF85314704496EE482D3651E374F946CB50
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: free
                                                                                                • String ID:
                                                                                                • API String ID: 1294909896-0
                                                                                                • Opcode ID: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                                                                                                • Instruction ID: 8ccd5c106adaedd21fdabd868c2a091acccb285e2c6396e7c66228af9079aab7
                                                                                                • Opcode Fuzzy Hash: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                                                                                                • Instruction Fuzzy Hash: 68E0ED311087008BEB74DA38A941F97B3DAAB14314F15893FE89AE7690EB74FC448A59
                                                                                                APIs
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@
                                                                                                • String ID:
                                                                                                • API String ID: 1033339047-0
                                                                                                • Opcode ID: 76c2607c9262a084594b8968e60506e1095ba5b3921c342d3f15f01c827a8030
                                                                                                • Instruction ID: 194059228ff5733793a196764ebf5a0b63d959e09992ce12dff2d54d27d13516
                                                                                                • Opcode Fuzzy Hash: 76c2607c9262a084594b8968e60506e1095ba5b3921c342d3f15f01c827a8030
                                                                                                • Instruction Fuzzy Hash: 67D0A9313083121ADA5432320A09AAF84848B503A0F10083FB800A32D1DCBE8C81A299
                                                                                                APIs
                                                                                                • CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseHandle
                                                                                                • String ID:
                                                                                                • API String ID: 2962429428-0
                                                                                                • Opcode ID: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                                                                                                • Instruction ID: 71cfb53d0268b44c797f7400575dcc0518408263689e7c465582b3111ebcfb94
                                                                                                • Opcode Fuzzy Hash: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                                                                                                • Instruction Fuzzy Hash: 95D0127251422156CF646E7CB8849C277D85A06334335176AF0B4E32E4D3749DCB5698
                                                                                                APIs
                                                                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,0040E4D6,00020000,00000000,?,00000000,?,0040D92B,?,?,00000000,?,0040D96E), ref: 004024E0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                                                                                                • Instruction ID: 23ad038ad5ccaf642d49e1102795c1c714580f299e31bec6e074b0e2bc220d86
                                                                                                • Opcode Fuzzy Hash: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                                                                                                • Instruction Fuzzy Hash: D3C080301443007DED115F505E06B463A916B44717F508065F344540D0C7F484009509
                                                                                                APIs
                                                                                                • ??2@YAPAXI@Z.MSVCRT(000000D0), ref: 0041138D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@
                                                                                                • String ID:
                                                                                                • API String ID: 1033339047-0
                                                                                                • Opcode ID: 08d588780a3caab37cf70573278ad1822b03e6a84bf609910ea5ba04e31b1b9c
                                                                                                • Instruction ID: d5b8b2b556814232dc2945b8f7e5995fed121ff751d048b21687cc00dda573f5
                                                                                                • Opcode Fuzzy Hash: 08d588780a3caab37cf70573278ad1822b03e6a84bf609910ea5ba04e31b1b9c
                                                                                                • Instruction Fuzzy Hash: B4B0123438914504FE5413B208013FB01800F40303F10087B5B02E4DF9FD0884805139
                                                                                                APIs
                                                                                                • VirtualFree.KERNELBASE(00000000,00000000,00008000,0040E561,?,00000004,0040E5B0,?,?,004117E5,?), ref: 00401B2A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 1263568516-0
                                                                                                • Opcode ID: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                                                                                                • Instruction ID: 5381ed20748db0b7fd93371e38984c83fa4171db9cf80dc6a42123bab5888d64
                                                                                                • Opcode Fuzzy Hash: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                                                                                                • Instruction Fuzzy Hash: 45A002305446007ADE515B10DD05F457F516744B11F20C5547155540E586755654DA09
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: free
                                                                                                • String ID:
                                                                                                • API String ID: 1294909896-0
                                                                                                • Opcode ID: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                                                                                                • Instruction ID: 7baee4be7330d58fba6a4d3e6254b3dabd4481adb37f3967e502ba2394f26960
                                                                                                • Opcode Fuzzy Hash: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                                                                                                • Instruction Fuzzy Hash:
                                                                                                APIs
                                                                                                • _wtol.MSVCRT ref: 004034E5
                                                                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,CC5BE863,00000000,004177A0,00000000,00417794), ref: 00403588
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 004035F9
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 00403601
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 00403609
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 00403611
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 00403619
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00403621
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403629
                                                                                                • _wtol.MSVCRT ref: 0040367F
                                                                                                • CoCreateInstance.OLE32(00414BF4,00000000,00000001,00414BE4,00404F9B,.lnk,?,0000005C), ref: 00403720
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,0000005C), ref: 004037B8
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0000005C), ref: 004037C0
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0000005C), ref: 004037C8
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0000005C), ref: 004037D0
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,0000005C), ref: 004037D8
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,0000005C), ref: 004037E0
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,0000005C), ref: 004037E8
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,0000005C), ref: 004037EE
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0000005C), ref: 004037F6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                                                                                                • String ID: .lnk
                                                                                                • API String ID: 408529070-24824748
                                                                                                • Opcode ID: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                                                                                                • Instruction ID: c4a1d47ac56633071a1bd2db01059e5edb54ffe0bccc65637149caefe5d2277b
                                                                                                • Opcode Fuzzy Hash: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                                                                                                • Instruction Fuzzy Hash: 8EA18A71910219ABDF04EFA1CC46DEEBB79EF44705F50442AF502B71A1EB79AA81CB18
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                                                                • wsprintfW.USER32 ref: 00401FFD
                                                                                                • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                                                                • GetLastError.KERNEL32 ref: 00402017
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                                                                • GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                                                                • GetLastError.KERNEL32 ref: 0040204C
                                                                                                • lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                                                                                                • SetLastError.KERNEL32(00000000), ref: 00402098
                                                                                                • lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                                                                • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                                                                                • _wtol.MSVCRT ref: 0040212A
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                                                                                                • String ID: 7zSfxString%d$XpA$\3A
                                                                                                • API String ID: 2117570002-3108448011
                                                                                                • Opcode ID: 332d11925e247980b34bd098e8b038dc96ba1155979fc83484f9ac8f636b93aa
                                                                                                • Instruction ID: 5c0681f152172bce6659d4e02be164ba9bb36eab7c70e8d4f1a0ed4420d73572
                                                                                                • Opcode Fuzzy Hash: 332d11925e247980b34bd098e8b038dc96ba1155979fc83484f9ac8f636b93aa
                                                                                                • Instruction Fuzzy Hash: 11518471604305AFDB209F74DD899DBBBB9EB08345B11407AF646E62E0E774AA44CB18
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                                                                                                • FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                                                                                                • FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                                                                                                • SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                                                                                                • LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                                                                                                • LockResource.KERNEL32(00000000), ref: 00401C41
                                                                                                • LoadLibraryA.KERNEL32(kernel32,SetProcessPreferredUILanguages), ref: 00401C6D
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00401C76
                                                                                                • wsprintfW.USER32 ref: 00401C95
                                                                                                • LoadLibraryA.KERNEL32(kernel32,SetThreadPreferredUILanguages), ref: 00401CAA
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00401CAD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: Resource$Load$AddressFindLibraryProc$HandleLockModuleSizeofwsprintf
                                                                                                • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages$kernel32
                                                                                                • API String ID: 2639302590-365843014
                                                                                                • Opcode ID: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                                                                                                • Instruction ID: 1b367ad183524107b1556f539f271e2bfa11f4d2ebd4ebc35158efee647c5c94
                                                                                                • Opcode Fuzzy Hash: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                                                                                                • Instruction Fuzzy Hash: 002153B1944318BBDB109FA59D48F9B7FBCEB48751F118036FA05B72D1D678DA008BA8
                                                                                                APIs
                                                                                                • wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                                                                • GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                                                                • FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                                                                • FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                                                                • lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                                                                • lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                                                                • lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                                                                • lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                                                                • LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                                                                                                • String ID:
                                                                                                • API String ID: 829399097-0
                                                                                                • Opcode ID: bf60f95a6a1f59c2bb6c04e2e113b9a1b5cd8de0030c6a868400c9436056581d
                                                                                                • Instruction ID: 98041b7e574f1f1c61a73cce3db0a13ad597614178cae5aaf21d0c5f67190c53
                                                                                                • Opcode Fuzzy Hash: bf60f95a6a1f59c2bb6c04e2e113b9a1b5cd8de0030c6a868400c9436056581d
                                                                                                • Instruction Fuzzy Hash: 85218172804209BEDF14AFA0DC85CEB7BACEB04355B10847BF506A7150EB34EE848BA4
                                                                                                APIs
                                                                                                • FindFirstFileW.KERNEL32(?,?,00413454,?,?,?,00000000), ref: 00402BA8
                                                                                                • lstrcmpW.KERNEL32(?,00413450,?,0000005C,?,?,?,00000000), ref: 00402BFB
                                                                                                • lstrcmpW.KERNEL32(?,00413448,?,?,00000000), ref: 00402C11
                                                                                                • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?,?,?,00000000), ref: 00402C27
                                                                                                • DeleteFileW.KERNEL32(?,?,?,00000000), ref: 00402C2E
                                                                                                • FindNextFileW.KERNEL32(00000000,00000010,?,?,00000000), ref: 00402C40
                                                                                                • FindClose.KERNEL32(00000000,?,?,00000000), ref: 00402C4F
                                                                                                • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 00402C5A
                                                                                                • RemoveDirectoryW.KERNEL32(?,?,?,00000000), ref: 00402C63
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C6E
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C79
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$Find$??3@Attributeslstrcmp$CloseDeleteDirectoryFirstNextRemove
                                                                                                • String ID:
                                                                                                • API String ID: 1862581289-0
                                                                                                • Opcode ID: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                                                                                                • Instruction ID: 7ffcf375551190f92b7aba4ef5ef3cd4ed0286f9dec59b0789af02bc25bdcc12
                                                                                                • Opcode Fuzzy Hash: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                                                                                                • Instruction Fuzzy Hash: A321A230500209BAEB10AF61DE4CFBF7B7C9B0470AF14417AB505B11E0EB78DB459A6C
                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(uxtheme,?,00407F57,000004B1,00000000,?,?,?,?,?,0040803E), ref: 00406D65
                                                                                                • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00406D76
                                                                                                • GetWindow.USER32(?,00000005), ref: 00406D8F
                                                                                                • GetWindow.USER32(00000000,00000002), ref: 00406DA5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$AddressLibraryLoadProc
                                                                                                • String ID: SetWindowTheme$\EA$uxtheme
                                                                                                • API String ID: 324724604-1613512829
                                                                                                • Opcode ID: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                                                                                                • Instruction ID: f2e0bdee1e376373ef12be0a37c87caa708c4cf78f5ebad58458586032015049
                                                                                                • Opcode Fuzzy Hash: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                                                                                                • Instruction Fuzzy Hash: 47F0A73274172537C6312A6A6C4CF9B6B9C9FC6B51B070176B905F7280DA6CCD0045BC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                                                                                                • Instruction ID: 2cf66fefa79674a345482580870fbecf2b771b639b37e27eb1fc897e4fc9b441
                                                                                                • Opcode Fuzzy Hash: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                                                                                                • Instruction Fuzzy Hash: 44126E31E00129DFDF08CF68C6945ECBBB2EF85345F2585AAD856AB280D6749EC1DF84
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                                                                                                • Instruction ID: 8743f1180a29be23716da9caa70fae7f7856ace610ba4dfa2102d12747f13ae8
                                                                                                • Opcode Fuzzy Hash: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                                                                                                • Instruction Fuzzy Hash: D12129725104255BC711DF1DE8887B7B3E1FFC4319F678A36DA81CB281C629D894C6A0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                                                                • Instruction ID: 7cc7f0f00d3fdf34bc0739e2af2c3edfb6ca911da6c9eaecf720caf4c907201e
                                                                                                • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                                                                • Instruction Fuzzy Hash: 0621F53290062587CB12CE6EE4845A7F392FBC436AF134727EE84A3291C62CA855C6A0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                                                                                                • Instruction ID: 0032c0c3dd355d3b1328166acc4be040b7821e5e83bc1fe28c274bced218c28f
                                                                                                • Opcode Fuzzy Hash: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                                                                                                • Instruction Fuzzy Hash: 4EF074B5A05209EFCB09CFA9C49199EFBF5FF48304B1084A9E819E7350E731AA11CF50
                                                                                                APIs
                                                                                                • GetDriveTypeW.KERNEL32(?,?,?), ref: 00404B46
                                                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00404B77
                                                                                                • WriteFile.KERNEL32(004177C4,?,?,00406437,00000000,del ",:Repeat,00000000), ref: 00404C2C
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C37
                                                                                                • CloseHandle.KERNEL32(004177C4), ref: 00404C40
                                                                                                • SetFileAttributesW.KERNEL32(00406437,00000000), ref: 00404C57
                                                                                                • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00404C69
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C72
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C7E
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00406437,?), ref: 00404C84
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00406437,?,?,?,?,?,?,?,?,?,?,?,?,?,00406437,004177C4), ref: 00404CB2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                                                                                                • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                                                                                                • API String ID: 3007203151-3467708659
                                                                                                • Opcode ID: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                                                                                                • Instruction ID: 7a4c4b622d76ac6c1822c64a370ea4e05d699ec4102568342bfcf68b8c9639ad
                                                                                                • Opcode Fuzzy Hash: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                                                                                                • Instruction Fuzzy Hash: DE416171D01119BADB00EBA5ED85DEEBB78EF44358F50803AF511720E1EB78AE85CB58
                                                                                                APIs
                                                                                                • lstrcmpiW.KERNEL32(00000000,0041442C,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004046DF
                                                                                                  • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                                                                  • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                                                                                                  • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                                                                  • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                                                                                                  • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                                                                  • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                                                                  • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                                                                                                  • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                                                                  • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                                                                  • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                                                                                                  • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                                                                  • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                                                                  • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                                                                                • _wtol.MSVCRT ref: 004047DC
                                                                                                • _wtol.MSVCRT ref: 004047F8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$??2@EnvironmentVariable_wtollstrcmpi$??3@InfoLocalelstrlenwsprintf
                                                                                                • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$Progress$Title$WarningTitle$|wA
                                                                                                • API String ID: 2725485552-3187639848
                                                                                                • Opcode ID: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                                                                                                • Instruction ID: a5d789275b7dd46d140941e9fd319bf554fc7ea6ad5da08365fcb0f0a182a74d
                                                                                                • Opcode Fuzzy Hash: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                                                                                                • Instruction Fuzzy Hash: 4251B5F1A402047EDB10BB619D86EFF36ACDA85308B64443BF904F32C1E6BC5E854A6D
                                                                                                APIs
                                                                                                • GetClassNameA.USER32(?,?,00000040), ref: 00402DD3
                                                                                                • lstrcmpiA.KERNEL32(?,STATIC), ref: 00402DE6
                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00402DF3
                                                                                                  • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                                                                  • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                                                                                  • Part of subcall function 00401A85: CharUpperW.USER32(?,74DEE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                                                                  • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402E20
                                                                                                • GetParent.USER32(?), ref: 00402E2E
                                                                                                • LoadLibraryA.KERNEL32(riched20), ref: 00402E42
                                                                                                • GetMenu.USER32(?), ref: 00402E55
                                                                                                • SetThreadLocale.KERNEL32(00000419), ref: 00402E62
                                                                                                • CreateWindowExW.USER32(00000000,RichEdit20W,0041335C,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 00402E92
                                                                                                • DestroyWindow.USER32(?), ref: 00402EA3
                                                                                                • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 00402EB8
                                                                                                • GetSysColor.USER32(0000000F), ref: 00402EBC
                                                                                                • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00402ECA
                                                                                                • SendMessageW.USER32(00000000,00000461,?,?), ref: 00402EF5
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402EFA
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00402F02
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$??3@MessageSend$CharTextUpper$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                                                                                                • String ID: RichEdit20W$STATIC$riched20${\rtf
                                                                                                • API String ID: 1731037045-2281146334
                                                                                                • Opcode ID: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                                                                                                • Instruction ID: c7c9ca1f65d7473fe19c29f8272bdbb18bb8b251efb89c9ee4785ec66c96c850
                                                                                                • Opcode Fuzzy Hash: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                                                                                                • Instruction Fuzzy Hash: FE316072A40119BFDB01AFA5DD49DEF7BBCEF08745F104036F601B21D1DA789A008B68
                                                                                                APIs
                                                                                                • GetWindowDC.USER32(00000000), ref: 00401CD4
                                                                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                                                                                                • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                                                                                                • GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                                                                                                • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                                                                                                • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                                                                                                • CreateCompatibleDC.GDI32(?), ref: 00401D4B
                                                                                                • CreateCompatibleDC.GDI32(?), ref: 00401D52
                                                                                                • SelectObject.GDI32(00000000,?), ref: 00401D60
                                                                                                • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 00401D76
                                                                                                • SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                                                                                                • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                                                                                                • GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                                                                                                • SelectObject.GDI32(00000000,?), ref: 00401DB3
                                                                                                • SelectObject.GDI32(00000000,?), ref: 00401DB9
                                                                                                • DeleteDC.GDI32(00000000), ref: 00401DC2
                                                                                                • DeleteDC.GDI32(00000000), ref: 00401DC5
                                                                                                • ReleaseDC.USER32(00000000,?), ref: 00401DCC
                                                                                                • ReleaseDC.USER32(00000000,?), ref: 00401DDB
                                                                                                • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 00401DE8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                                                                                                • String ID:
                                                                                                • API String ID: 3462224810-0
                                                                                                • Opcode ID: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                                                                                                • Instruction ID: 24730f8ff9b6a3f8d7f0600a39c6f646a54ca28d21b12e05547a6914d757f366
                                                                                                • Opcode Fuzzy Hash: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                                                                                                • Instruction Fuzzy Hash: 00313976D00208BBDF215FA19C48EEFBFBDEB48752F108066F604B21A0C6758A50EB64
                                                                                                APIs
                                                                                                • GetClassNameA.USER32(?,?,00000040), ref: 00401E05
                                                                                                • lstrcmpiA.KERNEL32(?,STATIC), ref: 00401E1C
                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00401E2F
                                                                                                • GetMenu.USER32(?), ref: 00401E44
                                                                                                  • Part of subcall function 00401BDF: GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                                                                                                  • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                                                                                                  • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                                                                                                  • Part of subcall function 00401BDF: SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                                                                                                  • Part of subcall function 00401BDF: LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                                                                                                  • Part of subcall function 00401BDF: LockResource.KERNEL32(00000000), ref: 00401C41
                                                                                                • GlobalAlloc.KERNEL32(00000040,00000010), ref: 00401E76
                                                                                                • memcpy.MSVCRT(00000000,00000000,00000010), ref: 00401E83
                                                                                                • CoInitialize.OLE32(00000000), ref: 00401E8C
                                                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00401E98
                                                                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,00414C14,?), ref: 00401EBD
                                                                                                • GlobalFree.KERNEL32(00000000), ref: 00401ECD
                                                                                                  • Part of subcall function 00401CC8: GetWindowDC.USER32(00000000), ref: 00401CD4
                                                                                                  • Part of subcall function 00401CC8: GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                                                                                                  • Part of subcall function 00401CC8: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                                                                                                  • Part of subcall function 00401CC8: GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                                                                                                  • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                                                                                                  • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                                                                                                  • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D4B
                                                                                                  • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D52
                                                                                                  • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401D60
                                                                                                  • Part of subcall function 00401CC8: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                                                                                                  • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,00000000), ref: 00401D76
                                                                                                  • Part of subcall function 00401CC8: SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                                                                                                  • Part of subcall function 00401CC8: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                                                                                                  • Part of subcall function 00401CC8: GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                                                                                                  • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB3
                                                                                                  • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB9
                                                                                                  • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC2
                                                                                                  • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC5
                                                                                                  • Part of subcall function 00401CC8: ReleaseDC.USER32(00000000,?), ref: 00401DCC
                                                                                                • GetObjectW.GDI32(00000000,00000018,?), ref: 00401EFF
                                                                                                • SetWindowPos.USER32(00000010,00000000,00000000,00000000,?,?,00000006), ref: 00401F13
                                                                                                • SendMessageW.USER32(00000010,00000172,00000000,?), ref: 00401F25
                                                                                                • GlobalFree.KERNEL32(00000000), ref: 00401F3A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                                                                                                • String ID: IMAGES$STATIC
                                                                                                • API String ID: 4202116410-1168396491
                                                                                                • Opcode ID: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                                                                                                • Instruction ID: 08c73d75f8249df6a552952f3d33af28cabbedea74541c6d0cfd8ce2793c0c4e
                                                                                                • Opcode Fuzzy Hash: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                                                                                                • Instruction Fuzzy Hash: C7417C71A00218BFCB11DFA1DC49DEEBF7DEF08742B008076FA05A61A0DB758A41DB68
                                                                                                APIs
                                                                                                  • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                                                                  • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                                                                                • GetDlgItem.USER32(?,000004B8), ref: 0040816A
                                                                                                • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00408179
                                                                                                • GetDlgItem.USER32(?,000004B5), ref: 004081C0
                                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 004081C5
                                                                                                • GetDlgItem.USER32(?,000004B5), ref: 004081D5
                                                                                                • SetWindowLongW.USER32(00000000), ref: 004081D8
                                                                                                • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 004081FE
                                                                                                • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00408210
                                                                                                • GetDlgItem.USER32(?,000004B4), ref: 0040821A
                                                                                                • SetFocus.USER32(00000000), ref: 0040821D
                                                                                                • SetTimer.USER32(?,00000001,00000000,00000000), ref: 0040824C
                                                                                                • CoCreateInstance.OLE32(00414C34,00000000,00000001,00414808,00000000), ref: 00408277
                                                                                                • GetDlgItem.USER32(?,00000002), ref: 00408294
                                                                                                • IsWindow.USER32(00000000), ref: 00408297
                                                                                                • GetDlgItem.USER32(?,00000002), ref: 004082A7
                                                                                                • EnableWindow.USER32(00000000), ref: 004082AA
                                                                                                • GetDlgItem.USER32(?,000004B5), ref: 004082BE
                                                                                                • ShowWindow.USER32(00000000), ref: 004082C1
                                                                                                  • Part of subcall function 00407134: GetDlgItem.USER32(?,000004B6), ref: 00407142
                                                                                                  • Part of subcall function 00407B33: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                                                                                                  • Part of subcall function 00407B33: GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                                                                                                  • Part of subcall function 00407B33: SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                                                                                                  • Part of subcall function 00407B33: wsprintfW.USER32 ref: 00407BBB
                                                                                                  • Part of subcall function 00407B33: ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                                                                                                  • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                                                                  • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                                                                                                  • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                                                                  • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                                                                  • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                                                                  • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                                                                                                  • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                                                                  • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                                                                  • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                                                                                                  • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: Item$Window$MessageSend$System$EnableHandleLoadLongMenuMetricsModuleShow$??3@CreateFocusIconImageInstanceTimerUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                                                                                • String ID:
                                                                                                • API String ID: 855516470-0
                                                                                                • Opcode ID: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                                                                                                • Instruction ID: 3ce0214ef3d03b0ee840dd4ab9c121ae631e901bc0d6870238ad5b6e85178a64
                                                                                                • Opcode Fuzzy Hash: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                                                                                                • Instruction Fuzzy Hash: 014174B0644748ABDA206F65DD49F5B7BADEB40B05F00847DF552A62E1CB79B800CA1C
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,hAA,00000000), ref: 004030F6
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,hAA,00000000), ref: 004030FE
                                                                                                • strncmp.MSVCRT ref: 004031F1
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00403255
                                                                                                • lstrcmpW.KERNEL32(?,SetEnvironment,00000000), ref: 00403273
                                                                                                • ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$lstrcmpstrncmp
                                                                                                • String ID: GUIFlags$MiscFlags$SetEnvironment$hAA${\rtf
                                                                                                • API String ID: 2881732429-172299233
                                                                                                • Opcode ID: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                                                                                                • Instruction ID: da55d09168dcf28f6e950782b6654b171f18f9ca5632fa18d2c46afc5d57570a
                                                                                                • Opcode Fuzzy Hash: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                                                                                                • Instruction Fuzzy Hash: 23819D31900218ABDF11DFA1CD55BEE7B78AF14305F1040ABE8017B2E6DB78AB05DB59
                                                                                                APIs
                                                                                                • GetDlgItem.USER32(?,000004B3), ref: 00406A69
                                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00406A6E
                                                                                                • GetDlgItem.USER32(?,000004B4), ref: 00406AA5
                                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00406AAA
                                                                                                • GetSystemMetrics.USER32(00000010), ref: 00406B0B
                                                                                                • GetSystemMetrics.USER32(00000011), ref: 00406B11
                                                                                                • GetSystemMetrics.USER32(00000008), ref: 00406B18
                                                                                                • GetSystemMetrics.USER32(00000007), ref: 00406B1F
                                                                                                • GetParent.USER32(?), ref: 00406B43
                                                                                                • GetClientRect.USER32(00000000,?), ref: 00406B55
                                                                                                • ClientToScreen.USER32(?,?), ref: 00406B68
                                                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00406BCE
                                                                                                • GetClientRect.USER32(?,?), ref: 00406C55
                                                                                                • ClientToScreen.USER32(?,?), ref: 00406B71
                                                                                                  • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                                                                                                • GetSystemMetrics.USER32(00000008), ref: 00406CD6
                                                                                                • GetSystemMetrics.USER32(00000007), ref: 00406CDD
                                                                                                  • Part of subcall function 00406A18: GetDlgItem.USER32(?,?), ref: 00406A36
                                                                                                  • Part of subcall function 00406A18: SetWindowPos.USER32(00000000), ref: 00406A3D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: MetricsSystem$ClientItemWindow$LongRectScreen$Parent
                                                                                                • String ID:
                                                                                                • API String ID: 747815384-0
                                                                                                • Opcode ID: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                                                                                                • Instruction ID: 701d8c843d4ec3579feae24e97f284edc15b0bac0439a5efdbaa5111af673c9b
                                                                                                • Opcode Fuzzy Hash: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                                                                                                • Instruction Fuzzy Hash: 7B912D71A00209AFDB14DFB9CD85AEEB7F9EF48704F148529E642F6290D778E9008B64
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                                                                • LoadIconW.USER32(00000000), ref: 00407D33
                                                                                                • GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                                                                • GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                                                                • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                                                                • LoadImageW.USER32(00000000), ref: 00407D54
                                                                                                • SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                                                                • SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                                                                • GetWindow.USER32(?,00000005), ref: 00407E76
                                                                                                • GetWindow.USER32(?,00000005), ref: 00407E92
                                                                                                • GetWindow.USER32(?,00000005), ref: 00407EAA
                                                                                                • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,000004B2,?,000004B7,?,?,?,?,?,0040803E), ref: 00407F0A
                                                                                                • LoadIconW.USER32(00000000), ref: 00407F0D
                                                                                                • GetDlgItem.USER32(?,000004B1), ref: 00407F28
                                                                                                • SendMessageW.USER32(00000000), ref: 00407F2F
                                                                                                  • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                                                                                                  • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                                                                                                  • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                                                                  • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$HandleItemLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                                                                                                • String ID:
                                                                                                • API String ID: 1889686859-0
                                                                                                • Opcode ID: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                                                                                                • Instruction ID: b6a50195b8a608de49edc5b96f3e83ee8a9b90890169e94b1220211b89b9884f
                                                                                                • Opcode Fuzzy Hash: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                                                                                                • Instruction Fuzzy Hash: E861D47064C7096AE9257B61DC4AF3B3699AB40B05F10447FF642B92D2DBBCBC0056AF
                                                                                                APIs
                                                                                                • GetParent.USER32(?), ref: 00406F45
                                                                                                • GetWindowLongW.USER32(00000000), ref: 00406F4C
                                                                                                • DefWindowProcW.USER32(?,?,?,?), ref: 00406F62
                                                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 00406F7F
                                                                                                • GetSystemMetrics.USER32(00000031), ref: 00406F91
                                                                                                • GetSystemMetrics.USER32(00000032), ref: 00406F98
                                                                                                • GetWindowDC.USER32(?), ref: 00406FAA
                                                                                                • GetWindowRect.USER32(?,?), ref: 00406FB7
                                                                                                • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 00406FEB
                                                                                                • ReleaseDC.USER32(?,00000000), ref: 00406FF3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                                                                                                • String ID:
                                                                                                • API String ID: 2586545124-0
                                                                                                • Opcode ID: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                                                                                                • Instruction ID: b1ff7c23223d170b9333fa97acec74f2c9230ee3eabfe87d0be763292bfdf634
                                                                                                • Opcode Fuzzy Hash: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                                                                                                • Instruction Fuzzy Hash: 8E210C7650021ABFCF01AFA8DD48DDF7F69FB08351F008565FA15E21A0C775EA209B64
                                                                                                APIs
                                                                                                • GetDlgItem.USER32(?,000004B3), ref: 0040678E
                                                                                                • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067A1
                                                                                                • GetDlgItem.USER32(?,000004B4), ref: 004067AB
                                                                                                • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067B3
                                                                                                • SendMessageW.USER32(?,00000401,?,00000000), ref: 004067C3
                                                                                                • GetDlgItem.USER32(?,?), ref: 004067CC
                                                                                                • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 004067D4
                                                                                                • GetDlgItem.USER32(?,?), ref: 004067DD
                                                                                                • SetFocus.USER32(00000000,?,000004B4,74DF0E50,00407E06,000004B4,000004B3,00000000,000004B4,00000000,000004B2,?,000004B7), ref: 004067E0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ItemMessageSend$Focus
                                                                                                • String ID:
                                                                                                • API String ID: 3946207451-0
                                                                                                • Opcode ID: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                                                                                                • Instruction ID: e7a8c5b21de344c7c4c5496bf688f1d5cc3ba414acf11b32f4788b893cc62525
                                                                                                • Opcode Fuzzy Hash: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                                                                                                • Instruction Fuzzy Hash: 6FF04F712403087BEA212B61DD86F5BBA6EEF81B45F018425F340650F0CBF7EC109A28
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,00000000), ref: 0040C603
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@
                                                                                                • String ID: IA$IA$IA$IA$IA$IA
                                                                                                • API String ID: 613200358-3743982587
                                                                                                • Opcode ID: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                                                                                                • Instruction ID: 4cebfcab61734def35128a955d6a3e34031d8899c11ca8f9bd2aeb72941b6852
                                                                                                • Opcode Fuzzy Hash: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                                                                                                • Instruction Fuzzy Hash: D2221671900248DFCB24EF65C8D09EEBBB5FF48304F50852EE91AA7291DB38A945CF58
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,00417788,00000000,SetEnvironment), ref: 00408479
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@
                                                                                                • String ID: BeginPrompt$ErrorTitle$FinishMessage$HelpText$SetEnvironment$WarningTitle
                                                                                                • API String ID: 613200358-994561823
                                                                                                • Opcode ID: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                                                                                                • Instruction ID: 5566f9f9667118f06bc812855c9affabb63102f3a10b3971892d5eca1131561f
                                                                                                • Opcode Fuzzy Hash: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                                                                                                • Instruction Fuzzy Hash: CA51D47080420AAACF24AB559E85AFB7774EB20348F54443FF881722E1EF7D5D82D64E
                                                                                                APIs
                                                                                                • memcpy.MSVCRT(?,00417410,00000160), ref: 00406DD1
                                                                                                • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 00406DF0
                                                                                                • GetDC.USER32(00000000), ref: 00406DFB
                                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00406E07
                                                                                                • MulDiv.KERNEL32(?,00000048,00000000), ref: 00406E16
                                                                                                • ReleaseDC.USER32(00000000,?), ref: 00406E24
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00406E4C
                                                                                                • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_0000667A), ref: 00406E81
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystemmemcpy
                                                                                                • String ID:
                                                                                                • API String ID: 2693764856-0
                                                                                                • Opcode ID: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                                                                                                • Instruction ID: b2c1943609947f3a034a1f42a4fd453b3666a2b5c4d4ccfd9a1c2059c5c1cb6f
                                                                                                • Opcode Fuzzy Hash: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                                                                                                • Instruction Fuzzy Hash: C32184B5500218BFDB215F61DC45EEB7B7CFB08746F0040B6F609A1190D7748E948B65
                                                                                                APIs
                                                                                                • GetDC.USER32(?), ref: 0040696E
                                                                                                • GetSystemMetrics.USER32(0000000B), ref: 0040698A
                                                                                                • GetSystemMetrics.USER32(0000003D), ref: 00406993
                                                                                                • GetSystemMetrics.USER32(0000003E), ref: 0040699B
                                                                                                • SelectObject.GDI32(?,?), ref: 004069B8
                                                                                                • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 004069D3
                                                                                                • SelectObject.GDI32(?,?), ref: 004069F9
                                                                                                • ReleaseDC.USER32(?,?), ref: 00406A08
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                                                                                                • String ID:
                                                                                                • API String ID: 2466489532-0
                                                                                                • Opcode ID: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                                                                                                • Instruction ID: 7c755332e1b278278a0584394201b19561512224090c74d51841a9ad660c27ee
                                                                                                • Opcode Fuzzy Hash: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                                                                                                • Instruction Fuzzy Hash: 6B216871900209EFCB119F65DD84A8EBFF4EF08321F10C46AE559A72A0C7359A50DF40
                                                                                                APIs
                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                                                                                                • GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                                                                                                • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                                                                                                • wsprintfW.USER32 ref: 00407BBB
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@ItemMessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                                                                                • String ID: %d%%
                                                                                                • API String ID: 3753976982-1518462796
                                                                                                • Opcode ID: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                                                                                                • Instruction ID: b955b8041d8a67620c3180d4911c799512bd6939d195f5b55c3092177650065a
                                                                                                • Opcode Fuzzy Hash: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                                                                                                • Instruction Fuzzy Hash: 1D31D371904208BBDB11AFA0CC45EDA7BB9EF48708F10847AFA42B61E1D779B904CB59
                                                                                                APIs
                                                                                                • lstrlenW.KERNEL32(hAA,00000020,?,?,00405838,?,?,?,00000000,?), ref: 004040A4
                                                                                                  • Part of subcall function 00401A85: CharUpperW.USER32(?,74DEE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                                                                  • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00404156
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 0040415E
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 0040416D
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00404175
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$CharUpper$lstrlen
                                                                                                • String ID: hAA
                                                                                                • API String ID: 2587799592-1362906312
                                                                                                • Opcode ID: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                                                                                                • Instruction ID: 7f7e13310b21401de90169bcc26cd057e2afddf23eedd5de54135d69024cf91c
                                                                                                • Opcode Fuzzy Hash: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                                                                                                • Instruction Fuzzy Hash: D7212772D40215AACF20ABA4CC46AEB77B9DF90354F10407BEB41BB2E1E7789D848658
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000001,00000000,00000000,00000001,?,00000000), ref: 00404D3E
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DA0
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DB8
                                                                                                  • Part of subcall function 00403354: lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                                                                                                  • Part of subcall function 00403354: GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                                                                                                  • Part of subcall function 00403354: GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                                                                                                  • Part of subcall function 00403354: ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$FileTime$AttributesSystemlstrlen
                                                                                                • String ID: 03A$;!@Install@!UTF-8!$;!@InstallEnd@!
                                                                                                • API String ID: 4038993085-2279431206
                                                                                                • Opcode ID: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                                                                                                • Instruction ID: 637b7b13a9bcd1d52ea1019587bfa2fb4435f6835f564ae220b3123002230846
                                                                                                • Opcode Fuzzy Hash: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                                                                                                • Instruction Fuzzy Hash: CE312D71D0021EEACF05EF92CD429EEBBB4BF44318F10042BE911762E1DB785649DB98
                                                                                                APIs
                                                                                                • EndDialog.USER32(?,00000000), ref: 00407579
                                                                                                • KillTimer.USER32(?,00000001), ref: 0040758A
                                                                                                • SetTimer.USER32(?,00000001,00000000,00000000), ref: 004075B4
                                                                                                • SuspendThread.KERNEL32(00000290), ref: 004075CD
                                                                                                • ResumeThread.KERNEL32(00000290), ref: 004075EA
                                                                                                • EndDialog.USER32(?,00000000), ref: 0040760C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: DialogThreadTimer$KillResumeSuspend
                                                                                                • String ID:
                                                                                                • API String ID: 4151135813-0
                                                                                                • Opcode ID: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                                                                                                • Instruction ID: ebb94c5c4675b2e6542c2b2cb7d5652cccd5624f9a00d71f737e39ca63bd9789
                                                                                                • Opcode Fuzzy Hash: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                                                                                                • Instruction Fuzzy Hash: 9811BF70A08618BBD7212F15EE849E77BBDFB00756B00843AF523A05A0CB39BD00DA1D
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                                                                                                  • Part of subcall function 00404343: ??3@YAXPAX@Z.MSVCRT(?,?,?,004177C4,004177C4,?,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 004043B6
                                                                                                • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                                                                                                • wsprintfA.USER32 ref: 00404EBC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$wsprintf
                                                                                                • String ID: :Language:%u!$;!@Install@!UTF-8!$;!@InstallEnd@!
                                                                                                • API String ID: 2704270482-1550708412
                                                                                                • Opcode ID: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                                                                                                • Instruction ID: afe26c372a183c0ca4a1b7edc16cb7be903c3e4040aad79e05e22cec791dc9d0
                                                                                                • Opcode Fuzzy Hash: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                                                                                                • Instruction Fuzzy Hash: D8115E71B00018BBCF00FB95CC42EFE77ADAB84705B10402EBA15E3182DB78AB028799
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000,00000000), ref: 004038C6
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000), ref: 00403904
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405), ref: 0040392A
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788), ref: 00403932
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@
                                                                                                • String ID: %%T/$%%T\
                                                                                                • API String ID: 613200358-2679640699
                                                                                                • Opcode ID: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                                                                                                • Instruction ID: 53c9ca64f2466311d4136dbbff57d229d1af9e29f5fa76e56e45344ae10c91f3
                                                                                                • Opcode Fuzzy Hash: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                                                                                                • Instruction Fuzzy Hash: 5011DD3190410EBACF05FFA1D857CEDBB79AE00708F50806AB511760E1EF79A785DB98
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403981
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 004039BF
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405), ref: 004039E5
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784), ref: 004039ED
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@
                                                                                                • String ID: %%S/$%%S\
                                                                                                • API String ID: 613200358-358529586
                                                                                                • Opcode ID: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                                                                                                • Instruction ID: c240205f9e12946546b7747d8fd44f392230bc1153c6614d6b8016afa5fd7689
                                                                                                • Opcode Fuzzy Hash: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                                                                                                • Instruction Fuzzy Hash: 1D11AD3190410EBACF05FFA1D856CEDBB79AE00708F51806AB511760E1EF78A789DB98
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403A3C
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 00403A7A
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405), ref: 00403AA0
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784), ref: 00403AA8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@
                                                                                                • String ID: %%M/$%%M\
                                                                                                • API String ID: 613200358-4143866494
                                                                                                • Opcode ID: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                                                                                                • Instruction ID: 5f6947e2f47a7d655e02fb84317d9747a35bc7200d49f7273ebe403b31479b31
                                                                                                • Opcode Fuzzy Hash: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                                                                                                • Instruction Fuzzy Hash: C911AD3190410EBACF05FFA1D956CEDBB79AE00708F51806AB511760E1EF78A789DB58
                                                                                                APIs
                                                                                                • _CxxThrowException.MSVCRT(00000000,00414CFC), ref: 0040E4EE
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionThrow
                                                                                                • String ID: $JA$4JA$DJA$TJA$hJA$xJA
                                                                                                • API String ID: 432778473-803145960
                                                                                                • Opcode ID: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                                                                                                • Instruction ID: 5492ea6659e041f1bcf420c4685f7038b08242b420f8f2c51a6428b2159ddc92
                                                                                                • Opcode Fuzzy Hash: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                                                                                                • Instruction Fuzzy Hash: 7211A5F0541B419BC7308F16E544587FBF8AF907587218A1FD0AA9BA51D3F8A1888B9C
                                                                                                APIs
                                                                                                  • Part of subcall function 0040BA46: ??2@YAPAXI@Z.MSVCRT(0000000C,?,0040C20C,004149B0,00000001,?,?,00000000), ref: 0040BA4B
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,004149B0,00000001,?,?,00000000), ref: 0040C20D
                                                                                                  • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                                                                  • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                                                                  • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,004149B0,00000001,?,?,00000000), ref: 0040C245
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@$??3@$memmove
                                                                                                • String ID: IA$IA$IA
                                                                                                • API String ID: 4294387087-924693538
                                                                                                • Opcode ID: 3ef1446a3f9eae3cfdc2853b922aca3bc2f9cc2cd28dfb990552d7283ffc15f1
                                                                                                • Instruction ID: 38d37476858cbe2739f158cf8086d9562841ccd83740beefedbf55b6536d6dac
                                                                                                • Opcode Fuzzy Hash: 3ef1446a3f9eae3cfdc2853b922aca3bc2f9cc2cd28dfb990552d7283ffc15f1
                                                                                                • Instruction Fuzzy Hash: 20B1C1B1900209DFCB54EFAAC8819DEBBB5BF48304F50852EF919A7291DB38A945CF54
                                                                                                APIs
                                                                                                • _CxxThrowException.MSVCRT(00100EC3,00414CFC), ref: 0040E83C
                                                                                                • ??2@YAPAXI@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E864
                                                                                                • memcpy.MSVCRT(00000000,?,?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?), ref: 0040E88D
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E898
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@??3@ExceptionThrowmemcpy
                                                                                                • String ID: IA
                                                                                                • API String ID: 3462485524-3293647318
                                                                                                • Opcode ID: 6b78721643db57d5e00a8af36ebe01533f1ba9cf87e040577b2ff72779c9c95d
                                                                                                • Instruction ID: e9362666a157510f6fc1816af10740f0f0ab3f4ff6eb75305f8b2a096945a613
                                                                                                • Opcode Fuzzy Hash: 6b78721643db57d5e00a8af36ebe01533f1ba9cf87e040577b2ff72779c9c95d
                                                                                                • Instruction Fuzzy Hash: 6811E5736003009BCB28AF57D880D6BFBE9AB84354714C83FEA59A7290D779E8954794
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: wsprintf$ExitProcesslstrcat
                                                                                                • String ID: 0x%p
                                                                                                • API String ID: 2530384128-1745605757
                                                                                                • Opcode ID: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                                                                                                • Instruction ID: 6c9eba3c29ae2a0cc7ccd16f79f39b6d6218d418ab2b897ff95ca6c62132cda7
                                                                                                • Opcode Fuzzy Hash: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                                                                                                • Instruction Fuzzy Hash: CF019E7580020CAFDB20AFA0DC45FDA777CBF44305F04486AF945A2081D738F6948FAA
                                                                                                APIs
                                                                                                  • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000B), ref: 004071E0
                                                                                                  • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000C), ref: 004071E9
                                                                                                • GetSystemMetrics.USER32(00000007), ref: 00407A51
                                                                                                • GetSystemMetrics.USER32(00000007), ref: 00407A62
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,000004B8,?,?), ref: 00407B29
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: MetricsSystem$??3@
                                                                                                • String ID: 100%%
                                                                                                • API String ID: 2562992111-568723177
                                                                                                • Opcode ID: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                                                                                                • Instruction ID: d2e8aa6d75c6757367bbc63d1236441fd7733528c0e5853e38aed7656a5d7d9b
                                                                                                • Opcode Fuzzy Hash: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                                                                                                • Instruction Fuzzy Hash: 0D31D771A047059FCB24DFA9C9419AEB7F4EF40308B00012EE542A26E1DB78FE44CF99
                                                                                                APIs
                                                                                                • wsprintfW.USER32 ref: 00407A12
                                                                                                  • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                                                                                                  • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                                                                                                • GetDlgItem.USER32(?,000004B3), ref: 004079C6
                                                                                                  • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                                                                  • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 004079E4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: TextWindow$ItemLength$??3@wsprintf
                                                                                                • String ID: (%u%s)
                                                                                                • API String ID: 3595513934-2496177969
                                                                                                • Opcode ID: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                                                                                                • Instruction ID: 1b031bef2a273fddd3247fbc9e57f9590cc69a100d620b238320e5a3a24b3f72
                                                                                                • Opcode Fuzzy Hash: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                                                                                                • Instruction Fuzzy Hash: 1401C8B15042147FDB107B65DC46EAF777CAF44708F10807FF516A21E2DB7CA9448A68
                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,0000003C,?,?,?,?,?,?,00406130,?,00000000,?,?,?), ref: 0040220A
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00402211
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                • String ID: GetNativeSystemInfo$kernel32
                                                                                                • API String ID: 2574300362-3846845290
                                                                                                • Opcode ID: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                                                                                                • Instruction ID: b757a3d5c4c17e34abb063926c294d8abaed4bc4edbc3347b9308a3de004b423
                                                                                                • Opcode Fuzzy Hash: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                                                                                                • Instruction Fuzzy Hash: 88F0B432E1521495CF20BBF48B0D6EF66E89A19349B1004BBD852F31D0E5FCCE8141EE
                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,004061B1,?,?,?), ref: 00402198
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0040219F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                • String ID: Wow64RevertWow64FsRedirection$kernel32
                                                                                                • API String ID: 2574300362-3900151262
                                                                                                • Opcode ID: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                                                                                                • Instruction ID: b94e249185ae4a70534d65e1a66e6cdcdba3a47a1e4784fabdbc91f5644b18b3
                                                                                                • Opcode Fuzzy Hash: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                                                                                                • Instruction Fuzzy Hash: AFD0C934294201DBDB125FA0EE0E7EA3AB9FB04B0BF458035A920A00F0CBBC9644CA5C
                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,0040223A), ref: 004021CA
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 004021D1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                • String ID: Wow64DisableWow64FsRedirection$kernel32
                                                                                                • API String ID: 2574300362-736604160
                                                                                                • Opcode ID: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                                                                                                • Instruction ID: 817513c890d082da38b6284c2862a66e2f32a8da2897575df7e5c1eb8648f331
                                                                                                • Opcode Fuzzy Hash: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                                                                                                • Instruction Fuzzy Hash: 0DD012342443009BDB515FA09E0D7DA3EB4B705B07F508076A520E11D1CBFCA244C7AC
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                                                                                                  • Part of subcall function 0040272E: MultiByteToWideChar.KERNEL32(00000020,00000000,00000024,?,00000000,?,?,00000020,00000024,00000000,00402ACD,?,?,00000000,00000000,00000000), ref: 00402760
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$ByteCharMultiWide
                                                                                                • String ID:
                                                                                                • API String ID: 1731127917-0
                                                                                                • Opcode ID: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                                                                                                • Instruction ID: 3903ebf3ba6088976d83fc344d3b185d6a20d7f45533e28e7dbc13297377a7b4
                                                                                                • Opcode Fuzzy Hash: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                                                                                                • Instruction Fuzzy Hash: 2831B3729041156ACB14FFA6DD81DEFB3BCEF00714B51403FF952B31E1EA38AA458658
                                                                                                APIs
                                                                                                • GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00406437,00000000,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FA8
                                                                                                • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FC5
                                                                                                • wsprintfW.USER32 ref: 00403FFB
                                                                                                • GetFileAttributesW.KERNEL32(?), ref: 00404016
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: PathTemp$AttributesFilewsprintf
                                                                                                • String ID:
                                                                                                • API String ID: 1746483863-0
                                                                                                • Opcode ID: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                                                                                                • Instruction ID: 4b01c17e8612d334da970e7aef70975a1f373095b445c13461924cc76c43a46f
                                                                                                • Opcode Fuzzy Hash: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                                                                                                • Instruction Fuzzy Hash: 1B113672100204BFCB01AF59CC85AADB7F8FF88755F50802EF905972E1DB78AA008B88
                                                                                                APIs
                                                                                                • CharUpperW.USER32(?,74DEE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                                                                • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                                                                                • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B03
                                                                                                • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B13
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: CharUpper
                                                                                                • String ID:
                                                                                                • API String ID: 9403516-0
                                                                                                • Opcode ID: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                                                                                                • Instruction ID: 0ba0c8867aa888139ba8faa8f8ff432121b60ad667f2455bf366b55ac651d143
                                                                                                • Opcode Fuzzy Hash: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                                                                                                • Instruction Fuzzy Hash: 02112E34A11269ABCF108F99C8446BAB7E8FF44356B504467F881E3290D77CDE51EB64
                                                                                                APIs
                                                                                                  • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                                                                                                  • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                                                                  • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                                                                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00407FED
                                                                                                • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 0040800D
                                                                                                • GetDlgItem.USER32(?,000004B7), ref: 00408020
                                                                                                • SetWindowLongW.USER32(00000000,000000FC,Function_00006F37), ref: 0040802E
                                                                                                  • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                                                                  • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                                                                                                  • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                                                                  • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                                                                  • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                                                                  • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                                                                                                  • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                                                                  • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                                                                  • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                                                                                                  • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                                                                                                  • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                                                                                                  • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ItemWindow$System$HandleLoadMessageMetricsModuleSend$DirectoryFileFocusIconImageInfoLongShow
                                                                                                • String ID:
                                                                                                • API String ID: 2538916108-0
                                                                                                • Opcode ID: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                                                                                                • Instruction ID: 9218ed989044434557cb474aaa53437228351995edfdd36a91d94446a14b3a18
                                                                                                • Opcode Fuzzy Hash: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                                                                                                • Instruction Fuzzy Hash: 7D1186B1A402146BCB10BBB99D09F9EB7FDEB84B04F00446EB652E31C0D6B8DA008B54
                                                                                                APIs
                                                                                                • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00406814
                                                                                                • GetSystemMetrics.USER32(00000031), ref: 0040683A
                                                                                                • CreateFontIndirectW.GDI32(?), ref: 00406849
                                                                                                • DeleteObject.GDI32(00000000), ref: 00406878
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                                                                                                • String ID:
                                                                                                • API String ID: 1900162674-0
                                                                                                • Opcode ID: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                                                                                                • Instruction ID: e152b01862f646c7a4819b14062263d5307cf72e2961abd6127bac75ebed32e6
                                                                                                • Opcode Fuzzy Hash: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                                                                                                • Instruction Fuzzy Hash: A9116376A00205AFDB10DF94DC88FEAB7B8EB08300F0180AAED06A7291DB74DE54CF54
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040749F
                                                                                                • SHBrowseForFolderW.SHELL32(?), ref: 004074B8
                                                                                                • SHGetPathFromIDListW.SHELL32(00000000,00000000), ref: 004074D4
                                                                                                • SHGetMalloc.SHELL32(00000000), ref: 004074FE
                                                                                                  • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                                                                                                  • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: BrowseFocusFolderFromItemListMallocPathmemset
                                                                                                • String ID:
                                                                                                • API String ID: 1557639607-0
                                                                                                • Opcode ID: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                                                                                                • Instruction ID: 30b51fec80d89fd3ac1614d0428bedaa433d1aa4d1a510c8e8bcd0531de43efe
                                                                                                • Opcode Fuzzy Hash: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                                                                                                • Instruction Fuzzy Hash: 43112171A00114ABDB10EBA5DD48BDE77FCAB84715F1040A9E505E7280DB78EF05CB75
                                                                                                APIs
                                                                                                • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,00000000), ref: 004027F8
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00402801
                                                                                                  • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                                                                                  • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                                                                                • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,00000001,00000000,?,00000000,00000000,00000000), ref: 00402819
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,00000000,00000000), ref: 00402839
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$EnvironmentExpandStrings$??2@
                                                                                                • String ID:
                                                                                                • API String ID: 612612615-0
                                                                                                • Opcode ID: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                                                                                                • Instruction ID: 71972da321696c7643696fa2d61077c4bfdb6251f9c85b9dd911fab2e4c9aeed
                                                                                                • Opcode Fuzzy Hash: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                                                                                                • Instruction Fuzzy Hash: EF017976D00118BADB04AB55DD41DDEB7BCEF48714B10417BF901B31D1EB746A4086A8
                                                                                                APIs
                                                                                                  • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                                                                  • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00413550,00413558), ref: 00403AFD
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00413550,00413558), ref: 00403B05
                                                                                                • SetWindowTextW.USER32(?,?), ref: 00403B12
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00403B1D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@TextWindow$Length
                                                                                                • String ID:
                                                                                                • API String ID: 2308334395-0
                                                                                                • Opcode ID: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                                                                                                • Instruction ID: 2cc122b1f520d7f8021a056a959bf32eecafdcf33a956e59961b1277582e5a57
                                                                                                • Opcode Fuzzy Hash: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                                                                                                • Instruction Fuzzy Hash: 2EF0FF32D0410DBACF01FBA5DD46CDE7B79EF04705B10406BF501720A1EA79AB559B98
                                                                                                APIs
                                                                                                • GetObjectW.GDI32(?,0000005C,?), ref: 00407045
                                                                                                • CreateFontIndirectW.GDI32(?), ref: 0040705B
                                                                                                • GetDlgItem.USER32(?,000004B5), ref: 0040706F
                                                                                                • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 0040707B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFontIndirectItemMessageObjectSend
                                                                                                • String ID:
                                                                                                • API String ID: 2001801573-0
                                                                                                • Opcode ID: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                                                                                                • Instruction ID: 5c236ef126686a3da9008926c30106754acf3bfa0ff8e01310dffb34f405da6a
                                                                                                • Opcode Fuzzy Hash: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                                                                                                • Instruction Fuzzy Hash: 35F05475900704ABDB209BA4DC09F8B7BFCAB48B01F048139BD51E11D4D7B4E5018B19
                                                                                                APIs
                                                                                                • GetParent.USER32(?), ref: 00401BA8
                                                                                                • GetWindowRect.USER32(?,?), ref: 00401BC1
                                                                                                • ScreenToClient.USER32(00000000,?), ref: 00401BCF
                                                                                                • ScreenToClient.USER32(00000000,?), ref: 00401BD6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: ClientScreen$ParentRectWindow
                                                                                                • String ID:
                                                                                                • API String ID: 2099118873-0
                                                                                                • Opcode ID: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                                                                                                • Instruction ID: 3a6f634f9500a9f0e676680e31990ed58166cb62974d534a535afb1fb6b8d00a
                                                                                                • Opcode Fuzzy Hash: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                                                                                                • Instruction Fuzzy Hash: 09E04F722052116BCB10AFA5AC88C8BBF6DDFC5723700447AF941A2220D7709D109A61
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: _wtol
                                                                                                • String ID: GUIFlags$[G@
                                                                                                • API String ID: 2131799477-2126219683
                                                                                                • Opcode ID: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                                                                                                • Instruction ID: b6302b9691b8fcfec91ee3c39af82f4337802e9cb3a6f407b943601295de961a
                                                                                                • Opcode Fuzzy Hash: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                                                                                                • Instruction Fuzzy Hash: 6DF03C3611C1635AFB342E0994187B6AA9CEB05793FE4443BE9C3F12D0C37C8E82825D
                                                                                                APIs
                                                                                                • GetEnvironmentVariableW.KERNEL32(?O@,?,00000001,004177A0,00000000,00417794,?,?,00404F3F,?,?,?,?,?), ref: 00402F26
                                                                                                • GetEnvironmentVariableW.KERNEL32(?,00000000,?,00000001,00000002,?,?,00404F3F,?,?,?,?,?), ref: 00402F52
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1793079674.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1793065756.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793097629.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793111971.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1793127768.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                                                                                Similarity
                                                                                                • API ID: EnvironmentVariable
                                                                                                • String ID: ?O@
                                                                                                • API String ID: 1431749950-3511380453
                                                                                                • Opcode ID: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                                                                                                • Instruction ID: 315e17eccb05daff3adc91fa9074d23558c2207180d60d9b2b56ce26dbf77fcb
                                                                                                • Opcode Fuzzy Hash: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                                                                                                • Instruction Fuzzy Hash: 24F06272200118BFDB00AFA9DC458AEB7EDEF88764B51402BF904D72A1D7B4AD008B98

                                                                                                Execution Graph

                                                                                                Execution Coverage:6.6%
                                                                                                Dynamic/Decrypted Code Coverage:25.6%
                                                                                                Signature Coverage:5.9%
                                                                                                Total number of Nodes:2000
                                                                                                Total number of Limit Nodes:53
                                                                                                execution_graph 70530 10003200 Sleep 70531 10020254 70530->70531 70532 e010e0 70533 e010ec ___scrt_is_nonwritable_in_current_image 70532->70533 70556 e012dc IsProcessorFeaturePresent ___scrt_uninitialize_crt 70533->70556 70535 e010f3 70536 e01246 70535->70536 70540 e0111d 70535->70540 70571 e015d0 6 API calls 70536->70571 70538 e0124d exit 70539 e01253 _exit 70538->70539 70541 e01121 _initterm_e 70540->70541 70544 e0116a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 70540->70544 70542 e0113c 70541->70542 70543 e0114d _initterm 70541->70543 70543->70544 70545 e011be 70544->70545 70548 e011b6 _register_thread_local_exe_atexit_callback 70544->70548 70557 e016eb memset GetStartupInfoW 70545->70557 70547 e011c3 _get_narrow_winmain_command_line 70558 e01c50 GetCommandLineW CommandLineToArgvW 70547->70558 70548->70545 70550 e011d8 70570 e01721 GetModuleHandleW 70550->70570 70552 e011df 70552->70538 70553 e011e3 70552->70553 70554 e011e7 _cexit 70553->70554 70555 e011ec ___scrt_uninitialize_crt 70553->70555 70554->70555 70555->70542 70556->70535 70557->70547 70559 e01c82 70558->70559 70560 e01c78 70558->70560 70572 e01d6f 70559->70572 70560->70550 70562 e01ca0 70563 e01d1c LocalFree 70562->70563 70564 e01cc1 WideCharToMultiByte 70562->70564 70582 e01000 TCGamerUpdateMain 70563->70582 70566 e01d6f 4 API calls 70564->70566 70567 e01ce1 WideCharToMultiByte 70566->70567 70567->70564 70568 e01d14 70567->70568 70568->70563 70569 e01d35 70569->70550 70570->70552 70571->70538 70573 e01d7d 70572->70573 70574 e01d8f malloc 70573->70574 70575 e01d82 _callnewh 70574->70575 70576 e01d9c 70574->70576 70575->70574 70578 e01d9e 70575->70578 70576->70562 70577 e01e9f 70579 e01ead _CxxThrowException 70577->70579 70578->70577 70580 e01e90 _CxxThrowException 70578->70580 70581 e01ec3 70579->70581 70580->70577 70581->70562 70582->70569 70583 10002d80 ResetEvent InterlockedExchange timeGetTime socket 70584 10002de8 70583->70584 70585 10002dfc lstrlenW WideCharToMultiByte 70583->70585 70637 10006815 70584->70637 70604 100067ff 70585->70604 70589 10002df6 70590 10002e59 ctype 70591 10002e60 htons connect 70590->70591 70592 10002e96 70590->70592 70591->70592 70593 10002eab setsockopt setsockopt setsockopt setsockopt 70591->70593 70594 10006815 ___strgtold12_l 5 API calls 70592->70594 70596 10002f52 InterlockedExchange 70593->70596 70597 10002f24 WSAIoctl 70593->70597 70595 10002ea5 70594->70595 70616 1000721b 70596->70616 70597->70596 70600 1000721b 748 API calls 70601 10002f91 70600->70601 70602 10006815 ___strgtold12_l 5 API calls 70601->70602 70603 10002fa6 70602->70603 70606 10006f17 70604->70606 70607 10002e22 lstrlenW WideCharToMultiByte gethostbyname 70606->70607 70609 10006f3d std::exception::exception 70606->70609 70645 10006e83 70606->70645 70662 10008550 DecodePointer 70606->70662 70607->70590 70614 10006f7b 70609->70614 70663 100073e9 76 API calls __cinit 70609->70663 70611 10006f85 70665 10007836 RaiseException 70611->70665 70664 10006e24 66 API calls std::exception::operator= 70614->70664 70615 10006f96 70617 1000722b 70616->70617 70618 1000723f 70616->70618 70701 1000710d 66 API calls __getptd_noexit 70617->70701 70674 10009754 TlsGetValue 70618->70674 70622 10007230 70702 10008702 11 API calls __lseeki64 70622->70702 70626 100072a2 70703 10006e49 66 API calls 2 library calls 70626->70703 70630 100072a8 70631 10002f79 70630->70631 70704 10007133 66 API calls 2 library calls 70630->70704 70631->70600 70634 10007267 CreateThread 70634->70631 70636 1000729a GetLastError 70634->70636 70762 100071b6 70634->70762 70636->70626 70638 1000681d 70637->70638 70639 1000681f IsDebuggerPresent 70637->70639 70638->70589 71185 1000b5e6 70639->71185 70642 1000794f SetUnhandledExceptionFilter UnhandledExceptionFilter 70643 10007974 GetCurrentProcess TerminateProcess 70642->70643 70644 1000796c __call_reportfault 70642->70644 70643->70589 70644->70643 70646 10006f00 70645->70646 70650 10006e91 70645->70650 70672 10008550 DecodePointer 70646->70672 70648 10006f06 70673 1000710d 66 API calls __getptd_noexit 70648->70673 70652 10006e9c 70650->70652 70653 10006ebf RtlAllocateHeap 70650->70653 70656 10006eec 70650->70656 70660 10006eea 70650->70660 70669 10008550 DecodePointer 70650->70669 70652->70650 70666 10008508 66 API calls 2 library calls 70652->70666 70667 10008359 66 API calls 7 library calls 70652->70667 70668 10008098 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 70652->70668 70653->70650 70654 10006ef8 70653->70654 70654->70606 70670 1000710d 66 API calls __getptd_noexit 70656->70670 70671 1000710d 66 API calls __getptd_noexit 70660->70671 70662->70606 70663->70614 70664->70611 70665->70615 70666->70652 70667->70652 70669->70650 70670->70660 70671->70654 70672->70648 70673->70654 70675 10007245 70674->70675 70676 10009769 DecodePointer TlsSetValue 70674->70676 70677 10009fe4 70675->70677 70676->70675 70679 10009fed 70677->70679 70680 10007251 70679->70680 70681 1000a00b Sleep 70679->70681 70705 1000e555 70679->70705 70680->70626 70683 1000990f 70680->70683 70682 1000a020 70681->70682 70682->70679 70682->70680 70716 10009896 GetLastError 70683->70716 70685 10009917 70686 1000725e 70685->70686 70730 10008315 66 API calls 3 library calls 70685->70730 70688 100097e2 70686->70688 70732 10009db0 70688->70732 70690 100097ee GetModuleHandleW 70733 1000c144 70690->70733 70692 1000982c InterlockedIncrement 70740 10009884 70692->70740 70695 1000c144 __lock 64 API calls 70696 1000984d 70695->70696 70743 1000de7f InterlockedIncrement 70696->70743 70698 1000986b 70755 1000988d 70698->70755 70700 10009878 __lseeki64 70700->70634 70701->70622 70702->70631 70703->70630 70704->70631 70706 1000e561 70705->70706 70711 1000e57c 70705->70711 70707 1000e56d 70706->70707 70706->70711 70714 1000710d 66 API calls __getptd_noexit 70707->70714 70709 1000e58f RtlAllocateHeap 70709->70711 70710 1000e572 70710->70679 70711->70709 70713 1000e5b6 70711->70713 70715 10008550 DecodePointer 70711->70715 70713->70679 70714->70710 70715->70711 70717 10009754 ___set_flsgetvalue 3 API calls 70716->70717 70718 100098ad 70717->70718 70719 10009903 SetLastError 70718->70719 70720 10009fe4 __calloc_crt 62 API calls 70718->70720 70719->70685 70721 100098c1 70720->70721 70721->70719 70722 100098c9 DecodePointer 70721->70722 70723 100098de 70722->70723 70724 100098e2 70723->70724 70725 100098fa 70723->70725 70726 100097e2 __CRT_INIT@12 62 API calls 70724->70726 70731 10006e49 66 API calls 2 library calls 70725->70731 70728 100098ea GetCurrentThreadId 70726->70728 70728->70719 70729 10009900 70729->70719 70731->70729 70732->70690 70734 1000c159 70733->70734 70735 1000c16c EnterCriticalSection 70733->70735 70758 1000c082 66 API calls 7 library calls 70734->70758 70735->70692 70737 1000c15f 70737->70735 70759 10008315 66 API calls 3 library calls 70737->70759 70760 1000c06b LeaveCriticalSection 70740->70760 70742 10009846 70742->70695 70744 1000dea0 70743->70744 70745 1000de9d InterlockedIncrement 70743->70745 70746 1000deaa InterlockedIncrement 70744->70746 70747 1000dead 70744->70747 70745->70744 70746->70747 70748 1000deb7 InterlockedIncrement 70747->70748 70749 1000deba 70747->70749 70748->70749 70750 1000dec4 InterlockedIncrement 70749->70750 70752 1000dec7 70749->70752 70750->70752 70751 1000dee0 InterlockedIncrement 70751->70752 70752->70751 70753 1000def0 InterlockedIncrement 70752->70753 70754 1000defb InterlockedIncrement 70752->70754 70753->70752 70754->70698 70761 1000c06b LeaveCriticalSection 70755->70761 70757 10009894 70757->70700 70758->70737 70760->70742 70761->70757 70763 10009754 ___set_flsgetvalue 3 API calls 70762->70763 70764 100071c1 70763->70764 70777 10009734 TlsGetValue 70764->70777 70767 100071d0 70828 10009788 DecodePointer 70767->70828 70768 100071fa 70779 10009929 70768->70779 70770 10007215 70815 10007175 70770->70815 70773 100071df 70775 100071f0 GetCurrentThreadId 70773->70775 70776 100071e3 GetLastError ExitThread 70773->70776 70775->70770 70778 100071cc 70777->70778 70778->70767 70778->70768 70780 10009935 __lseeki64 70779->70780 70781 1000994d 70780->70781 70782 10009a37 __lseeki64 70780->70782 70829 10006e49 66 API calls 2 library calls 70780->70829 70785 1000995b 70781->70785 70830 10006e49 66 API calls 2 library calls 70781->70830 70782->70770 70787 10009969 70785->70787 70831 10006e49 66 API calls 2 library calls 70785->70831 70788 10009977 70787->70788 70832 10006e49 66 API calls 2 library calls 70787->70832 70790 10009985 70788->70790 70833 10006e49 66 API calls 2 library calls 70788->70833 70792 10009993 70790->70792 70834 10006e49 66 API calls 2 library calls 70790->70834 70794 100099a1 70792->70794 70835 10006e49 66 API calls 2 library calls 70792->70835 70796 100099b2 70794->70796 70836 10006e49 66 API calls 2 library calls 70794->70836 70798 1000c144 __lock 66 API calls 70796->70798 70799 100099ba 70798->70799 70800 100099df 70799->70800 70801 100099c6 InterlockedDecrement 70799->70801 70838 10009a43 LeaveCriticalSection _doexit 70800->70838 70801->70800 70803 100099d1 70801->70803 70803->70800 70837 10006e49 66 API calls 2 library calls 70803->70837 70804 100099ec 70806 1000c144 __lock 66 API calls 70804->70806 70807 100099f3 70806->70807 70808 10009a24 70807->70808 70839 1000df0e 8 API calls 70807->70839 70841 10009a4f LeaveCriticalSection _doexit 70808->70841 70811 10009a31 70842 10006e49 66 API calls 2 library calls 70811->70842 70813 10009a08 70813->70808 70840 1000dfa7 66 API calls 4 library calls 70813->70840 70816 10007181 __lseeki64 70815->70816 70817 1000990f __getptd 66 API calls 70816->70817 70818 10007186 70817->70818 70843 100030c0 70818->70843 70848 10002fb0 70818->70848 70858 100052b0 70818->70858 70869 100052d9 70818->70869 70819 10007190 70880 10007156 70819->70880 70828->70773 70829->70781 70830->70785 70831->70787 70832->70788 70833->70790 70834->70792 70835->70794 70836->70796 70837->70800 70838->70804 70839->70813 70840->70808 70841->70811 70842->70782 70844 100030d4 70843->70844 70845 10003128 70843->70845 70844->70845 70846 100030e8 Sleep 70844->70846 70847 10003104 timeGetTime 70844->70847 70845->70819 70846->70844 70847->70844 70849 100067ff 77 API calls 70848->70849 70855 10002fd3 70849->70855 70850 1000306d 70852 10006815 ___strgtold12_l 5 API calls 70850->70852 70851 10003014 select 70851->70850 70851->70855 70854 10003098 70852->70854 70853 10003032 recv 70853->70855 70854->70819 70855->70850 70855->70851 70855->70853 70857 1000710d 66 API calls __lseeki64 70855->70857 70886 10003350 70855->70886 70857->70855 70859 1000536c RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 70858->70859 70865 100052cc 70858->70865 70860 100053ca 70859->70860 70861 1000543c 70859->70861 70864 10005403 OpenProcess 70860->70864 70867 1000542f Sleep 70860->70867 70968 10005820 70860->70968 70990 3bb0497 70861->70990 70864->70860 70866 10005415 GetExitCodeProcess 70864->70866 70865->70859 70866->70860 70867->70864 70871 100052d2 70869->70871 70870 1000536c RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 70872 100053ca 70870->70872 70873 1000543c 70870->70873 70871->70870 70875 10005820 103 API calls 70872->70875 70876 10005403 OpenProcess 70872->70876 70878 1000542f Sleep 70872->70878 70879 3bb0497 578 API calls 70873->70879 70874 10005442 70874->70819 70875->70872 70876->70872 70877 10005415 GetExitCodeProcess 70876->70877 70877->70872 70878->70876 70879->70874 70881 10009896 __getptd_noexit 66 API calls 70880->70881 70882 10007160 70881->70882 70883 1000716b ExitThread 70882->70883 71184 10009a58 79 API calls __freefls@4 70882->71184 70885 1000716a 70885->70883 70887 10003366 70886->70887 70898 10001100 70887->70898 70889 100034e1 70889->70855 70890 100034c6 70891 100011b0 70 API calls 70890->70891 70892 100034d8 70891->70892 70892->70855 70893 10003403 timeGetTime 70906 100011b0 70893->70906 70895 10003378 _memmove 70895->70889 70895->70890 70895->70893 70896 100011b0 70 API calls 70895->70896 70915 100054c0 70895->70915 70896->70895 70899 10001111 70898->70899 70900 1000110b 70898->70900 70947 10006ba0 70899->70947 70900->70895 70902 10001134 VirtualAlloc 70903 1000116f 70902->70903 70904 10001198 70903->70904 70905 1000118a VirtualFree 70903->70905 70904->70895 70905->70904 70908 100011bd 70906->70908 70907 100011c6 70907->70895 70908->70907 70909 10006ba0 __floor_pentium4 68 API calls 70908->70909 70910 100011ee 70909->70910 70911 10001214 70910->70911 70912 1000121b VirtualAlloc 70910->70912 70911->70895 70913 10001236 70912->70913 70914 10001247 VirtualFree 70913->70914 70914->70895 70916 100054dc 70915->70916 70917 1000580d 70915->70917 70918 10005707 VirtualAlloc 70916->70918 70919 100054e7 RegOpenKeyExW 70916->70919 70917->70895 70921 10005745 70918->70921 70920 10005515 RegQueryValueExW 70919->70920 70926 100055ba 70919->70926 70922 1000553a 70920->70922 70923 100055ad RegCloseKey 70920->70923 70925 100067ff 77 API calls 70921->70925 70924 100067ff 77 API calls 70922->70924 70923->70926 70927 10005540 _memset 70924->70927 70928 10005758 70925->70928 70929 100055f5 70926->70929 70940 100056f8 70926->70940 70931 1000554d RegQueryValueExW 70927->70931 70935 10005788 RegCreateKeyW 70928->70935 70928->70940 70930 100055fe VirtualFree 70929->70930 70941 10005611 _memset 70929->70941 70930->70941 70933 10005569 VirtualAlloc 70931->70933 70934 100055aa 70931->70934 70932 1000721b 736 API calls 70938 100057f3 Sleep 70932->70938 70939 100055a5 70933->70939 70934->70923 70936 100057a3 RegDeleteValueW RegSetValueExW 70935->70936 70937 100057ca RegCloseKey 70935->70937 70936->70937 70937->70940 70965 10002d10 70938->70965 70939->70934 70940->70932 70942 100067ff 77 API calls 70941->70942 70943 100056b1 70942->70943 70944 100056e6 ctype 70943->70944 70961 100060df 70943->70961 70944->70895 70948 10006bad 70947->70948 70951 10007d77 __ctrlfp __floor_pentium4 70947->70951 70949 10006bde 70948->70949 70948->70951 70956 10006c28 70949->70956 70958 10007a9b 67 API calls __lseeki64 70949->70958 70950 10007de5 __floor_pentium4 70955 10007dd2 __ctrlfp 70950->70955 70960 1000bc80 67 API calls 6 library calls 70950->70960 70951->70950 70953 10007dc2 70951->70953 70951->70955 70959 1000bc2b 66 API calls 3 library calls 70953->70959 70955->70902 70956->70902 70958->70956 70959->70955 70960->70955 70962 100060e5 70961->70962 70966 10002d70 70965->70966 70967 10002d21 setsockopt CancelIo InterlockedExchange closesocket SetEvent 70965->70967 70966->70917 70967->70966 70969 1000584e _memset 70968->70969 70970 100058a2 GetSystemDirectoryA 70969->70970 70995 100059e0 95 API calls _vswprintf_s 70970->70995 70972 100058d6 GetFileAttributesA 70973 1000590b CreateProcessA 70972->70973 70974 100058eb 70972->70974 70976 10005940 VirtualAllocEx 70973->70976 70977 10005932 70973->70977 70996 100059e0 95 API calls _vswprintf_s 70974->70996 70979 1000595a WriteProcessMemory 70976->70979 70980 100059ac 70976->70980 70978 10006815 ___strgtold12_l 5 API calls 70977->70978 70982 1000593c 70978->70982 70979->70980 70983 10005972 GetThreadContext 70979->70983 70984 10006815 ___strgtold12_l 5 API calls 70980->70984 70981 10005908 70981->70973 70982->70860 70983->70980 70985 10005991 SetThreadContext 70983->70985 70986 100059b9 70984->70986 70985->70980 70987 100059bd ResumeThread 70985->70987 70986->70860 70988 10006815 ___strgtold12_l 5 API calls 70987->70988 70989 100059d7 70988->70989 70989->70860 70997 3bb00cd GetPEB 70990->70997 70992 3bb04a8 70994 3bb04e0 70992->70994 70999 3bb01cb 70992->70999 70994->70819 70995->70972 70996->70981 70998 3bb00e5 70997->70998 70998->70992 71000 3bb01e6 70999->71000 71005 3bb01df 70999->71005 71001 3bb021e VirtualAlloc 71000->71001 71000->71005 71004 3bb0238 71001->71004 71001->71005 71002 3bb0330 LoadLibraryA 71002->71004 71002->71005 71003 3bb03a3 71003->71005 71007 3d411f2 71003->71007 71004->71002 71004->71003 71005->70994 71008 3d41202 71007->71008 71009 3d411fd 71007->71009 71013 3d410fc 71008->71013 71025 3d48262 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 71009->71025 71012 3d41210 71012->71005 71014 3d41108 _flsall 71013->71014 71015 3d41155 71014->71015 71023 3d411a5 _flsall 71014->71023 71026 3d40f98 71014->71026 71015->71023 71077 3d3e480 71015->71077 71023->71012 71025->71008 71027 3d40fa4 _flsall 71026->71027 71184->70885 71185->70642 71186 6c35a8b0 71187 6c35a930 _Yarn 71186->71187 71188 6c35a8cd _Yarn 71186->71188 71188->71187 71189 6c35aa4b 71188->71189 71190 6c374922 __fread_nolock 45 API calls 71188->71190 71189->71187 71192 6c374922 71189->71192 71190->71188 71195 6c374885 71192->71195 71196 6c374891 ___scrt_is_nonwritable_in_current_image 71195->71196 71197 6c3748a4 __fread_nolock 71196->71197 71198 6c3748db 71196->71198 71207 6c3748c9 71196->71207 71223 6c372f04 14 API calls __dosmaperr 71197->71223 71208 6c3700a9 EnterCriticalSection 71198->71208 71201 6c3748e5 71209 6c37493f 71201->71209 71202 6c3748be 71224 6c373a4e 29 API calls ___std_exception_copy 71202->71224 71207->71187 71208->71201 71213 6c374951 __fread_nolock 71209->71213 71215 6c3748fc 71209->71215 71210 6c37495e 71247 6c372f04 14 API calls __dosmaperr 71210->71247 71212 6c374963 71248 6c373a4e 29 API calls ___std_exception_copy 71212->71248 71213->71210 71213->71215 71218 6c3749af 71213->71218 71225 6c37491a LeaveCriticalSection __fread_nolock 71215->71225 71217 6c374ada __fread_nolock 71322 6c372f04 14 API calls __dosmaperr 71217->71322 71218->71215 71218->71217 71226 6c381ceb 71218->71226 71249 6c374804 29 API calls 4 library calls 71218->71249 71250 6c37f3a2 71218->71250 71257 6c3821f6 71218->71257 71223->71202 71224->71207 71225->71207 71227 6c381cf6 71226->71227 71228 6c381d03 71227->71228 71232 6c381d1b 71227->71232 71353 6c372f04 14 API calls __dosmaperr 71228->71353 71230 6c381d08 71354 6c373a4e 29 API calls ___std_exception_copy 71230->71354 71233 6c381d7a 71232->71233 71241 6c381d13 71232->71241 71355 6c383cff 71232->71355 71235 6c37f3a2 __fread_nolock 29 API calls 71233->71235 71236 6c381d93 71235->71236 71323 6c3820dd 71236->71323 71239 6c37f3a2 __fread_nolock 29 API calls 71240 6c381dcc 71239->71240 71240->71241 71242 6c37f3a2 __fread_nolock 29 API calls 71240->71242 71241->71218 71243 6c381dda 71242->71243 71243->71241 71244 6c37f3a2 __fread_nolock 29 API calls 71243->71244 71245 6c381de8 71244->71245 71246 6c37f3a2 __fread_nolock 29 API calls 71245->71246 71246->71241 71247->71212 71248->71215 71249->71218 71251 6c37f3c3 71250->71251 71252 6c37f3ae 71250->71252 71251->71218 71381 6c372f04 14 API calls __dosmaperr 71252->71381 71254 6c37f3b3 71382 6c373a4e 29 API calls ___std_exception_copy 71254->71382 71256 6c37f3be 71256->71218 71258 6c382208 71257->71258 71259 6c382220 71257->71259 71392 6c372f17 14 API calls __dosmaperr 71258->71392 71261 6c382562 71259->71261 71266 6c382263 71259->71266 71417 6c372f17 14 API calls __dosmaperr 71261->71417 71262 6c38220d 71393 6c372f04 14 API calls __dosmaperr 71262->71393 71265 6c382567 71418 6c372f04 14 API calls __dosmaperr 71265->71418 71267 6c382215 71266->71267 71269 6c38226e 71266->71269 71274 6c38229e 71266->71274 71267->71218 71394 6c372f17 14 API calls __dosmaperr 71269->71394 71271 6c38227b 71419 6c373a4e 29 API calls ___std_exception_copy 71271->71419 71272 6c382273 71395 6c372f04 14 API calls __dosmaperr 71272->71395 71276 6c3822b7 71274->71276 71277 6c3822f2 71274->71277 71278 6c3822c4 71274->71278 71276->71278 71282 6c3822e0 71276->71282 71399 6c37a641 71277->71399 71396 6c372f17 14 API calls __dosmaperr 71278->71396 71281 6c3822c9 71397 6c372f04 14 API calls __dosmaperr 71281->71397 71383 6c3871c6 71282->71383 71286 6c38243e 71289 6c3824b2 71286->71289 71292 6c382457 GetConsoleMode 71286->71292 71288 6c3822d0 71398 6c373a4e 29 API calls ___std_exception_copy 71288->71398 71294 6c3824b6 ReadFile 71289->71294 71290 6c38230c 71407 6c37a607 14 API calls __dosmaperr 71290->71407 71292->71289 71297 6c382468 71292->71297 71295 6c38252a GetLastError 71294->71295 71296 6c3824ce 71294->71296 71299 6c38248e 71295->71299 71300 6c382537 71295->71300 71296->71295 71301 6c3824a7 71296->71301 71297->71294 71302 6c38246e ReadConsoleW 71297->71302 71298 6c382313 71303 6c382338 71298->71303 71304 6c38231d 71298->71304 71319 6c3822db __fread_nolock 71299->71319 71411 6c372f2a 14 API calls __dosmaperr 71299->71411 71415 6c372f04 14 API calls __dosmaperr 71300->71415 71314 6c38250a 71301->71314 71315 6c3824f3 71301->71315 71301->71319 71302->71301 71307 6c382488 GetLastError 71302->71307 71410 6c37fcdb 31 API calls 2 library calls 71303->71410 71408 6c372f04 14 API calls __dosmaperr 71304->71408 71307->71299 71310 6c38253c 71416 6c372f17 14 API calls __dosmaperr 71310->71416 71312 6c382322 71409 6c372f17 14 API calls __dosmaperr 71312->71409 71318 6c382523 71314->71318 71314->71319 71413 6c3825ff 34 API calls 2 library calls 71315->71413 71414 6c3828a3 32 API calls __fread_nolock 71318->71414 71412 6c37a607 14 API calls __dosmaperr 71319->71412 71321 6c382528 71321->71319 71322->71212 71324 6c3820e9 ___scrt_is_nonwritable_in_current_image 71323->71324 71325 6c3820f1 71324->71325 71328 6c38210c 71324->71328 71361 6c372f17 14 API calls __dosmaperr 71325->71361 71327 6c3820f6 71362 6c372f04 14 API calls __dosmaperr 71327->71362 71329 6c382123 71328->71329 71332 6c38215e 71328->71332 71363 6c372f17 14 API calls __dosmaperr 71329->71363 71334 6c38217c 71332->71334 71335 6c382167 71332->71335 71333 6c382128 71364 6c372f04 14 API calls __dosmaperr 71333->71364 71360 6c387171 EnterCriticalSection 71334->71360 71366 6c372f17 14 API calls __dosmaperr 71335->71366 71339 6c382182 71342 6c3821a1 71339->71342 71343 6c3821b6 71339->71343 71340 6c382130 71365 6c373a4e 29 API calls ___std_exception_copy 71340->71365 71341 6c38216c 71367 6c372f04 14 API calls __dosmaperr 71341->71367 71368 6c372f04 14 API calls __dosmaperr 71342->71368 71347 6c3821f6 __fread_nolock 41 API calls 71343->71347 71349 6c3821b1 71347->71349 71348 6c3821a6 71369 6c372f17 14 API calls __dosmaperr 71348->71369 71370 6c3821ee LeaveCriticalSection __wsopen_s 71349->71370 71352 6c381d9b 71352->71239 71352->71241 71353->71230 71354->71241 71371 6c37cf6f 71355->71371 71359 6c383d26 71359->71233 71360->71339 71361->71327 71362->71352 71363->71333 71364->71340 71365->71352 71366->71341 71367->71340 71368->71348 71369->71349 71370->71352 71374 6c37cf7c __Getctype 71371->71374 71372 6c37cfbc 71380 6c372f04 14 API calls __dosmaperr 71372->71380 71373 6c37cfa7 RtlAllocateHeap 71373->71374 71375 6c37cfba 71373->71375 71374->71372 71374->71373 71379 6c3724cf EnterCriticalSection LeaveCriticalSection __Getctype 71374->71379 71378 6c37a607 14 API calls __dosmaperr 71375->71378 71378->71359 71379->71374 71380->71375 71381->71254 71382->71256 71384 6c3871e0 71383->71384 71385 6c3871d3 71383->71385 71388 6c3871ec 71384->71388 71421 6c372f04 14 API calls __dosmaperr 71384->71421 71420 6c372f04 14 API calls __dosmaperr 71385->71420 71387 6c3871d8 71387->71286 71388->71286 71390 6c38720d 71422 6c373a4e 29 API calls ___std_exception_copy 71390->71422 71392->71262 71393->71267 71394->71272 71395->71271 71396->71281 71397->71288 71398->71319 71400 6c37a67f 71399->71400 71404 6c37a64f __Getctype 71399->71404 71424 6c372f04 14 API calls __dosmaperr 71400->71424 71401 6c37a66a RtlAllocateHeap 71403 6c37a67d 71401->71403 71401->71404 71406 6c37a607 14 API calls __dosmaperr 71403->71406 71404->71400 71404->71401 71423 6c3724cf EnterCriticalSection LeaveCriticalSection __Getctype 71404->71423 71406->71290 71407->71298 71408->71312 71409->71319 71410->71282 71411->71319 71412->71267 71413->71319 71414->71321 71415->71310 71416->71319 71417->71265 71418->71271 71419->71267 71420->71387 71421->71390 71422->71387 71423->71404 71424->71403 71425 6c380bfe CreateFileW 71426 6c363d3e 71460 6c36aa0e 71426->71460 71428 6c363d47 _Yarn 71471 6c361070 71428->71471 71430 6c363df7 Sleep 71431 6c36aa0e 3 API calls 71430->71431 71433 6c363e2e 71431->71433 71432 6c363daa error_info_injector 71432->71430 71434 6c364d58 71432->71434 71483 6c365e30 30 API calls 2 library calls 71433->71483 71485 6c373a5e 71434->71485 71443 6c363eba 71443->71434 71484 6c35b390 30 API calls 2 library calls 71443->71484 71461 6c36aa13 ___std_exception_copy 71460->71461 71462 6c36aa2d 71461->71462 71464 6c36aa2f 71461->71464 71490 6c3724cf EnterCriticalSection LeaveCriticalSection __Getctype 71461->71490 71462->71428 71465 6c36c2f8 71464->71465 71466 6c36aa39 Concurrency::cancel_current_task 71464->71466 71492 6c36d2b3 RaiseException 71465->71492 71491 6c36d2b3 RaiseException 71466->71491 71469 6c36c314 71470 6c36b51c 71472 6c361076 71471->71472 71493 6c35b880 71472->71493 71474 6c36112f 71538 6c35a100 71474->71538 71476 6c3610d5 71476->71474 71512 6c3611c0 71476->71512 71477 6c36114d std::ios_base::_Ios_base_dtor 71477->71432 71483->71443 71484->71443 72055 6c373c9d 29 API calls ___std_exception_copy 71485->72055 71487 6c373a6d 72056 6c373a7b 11 API calls __CreateFrameInfo 71487->72056 71489 6c373a7a 71490->71461 71491->71470 71492->71469 71494 6c35b8b5 71493->71494 71544 6c35bd70 71494->71544 71496 6c35b951 71497 6c36aa0e 3 API calls 71496->71497 71498 6c35b989 71497->71498 71561 6c36b2cf 71498->71561 71500 6c35b99d 71573 6c35bb60 71500->71573 71503 6c35ba92 71503->71476 71505 6c35bad1 71582 6c3526d0 30 API calls 3 library calls 71505->71582 71507 6c35bae3 71583 6c36d2b3 RaiseException 71507->71583 71509 6c35baf8 71510 6c35a100 72 API calls 71509->71510 71511 6c35bb0f 71510->71511 71511->71476 71513 6c3611ff 71512->71513 71516 6c361213 71513->71516 71961 6c352060 39 API calls Concurrency::cancel_current_task 71513->71961 71518 6c3612d9 71516->71518 71963 6c352300 38 API calls 71516->71963 71964 6c3526d0 30 API calls 3 library calls 71516->71964 71965 6c36d2b3 RaiseException 71516->71965 71521 6c36110f 71518->71521 71962 6c352d90 39 API calls Concurrency::cancel_current_task 71518->71962 71522 6c3598c0 71521->71522 71523 6c3598d9 71522->71523 71524 6c359909 71522->71524 71966 6c35b030 71523->71966 71526 6c3599cd 71524->71526 71527 6c3599df 71524->71527 71972 6c36aa82 71526->71972 71979 6c352300 38 API calls 71527->71979 71530 6c3599d8 SetFileAttributesA 71530->71474 71532 6c374007 69 API calls 71532->71524 71533 6c359a07 71980 6c352370 30 API calls 71533->71980 71535 6c359a17 71981 6c36d2b3 RaiseException 71535->71981 71537 6c359a22 71539 6c35a13b 71538->71539 71540 6c35a193 71539->71540 71541 6c35b030 69 API calls 71539->71541 71540->71477 71542 6c35a188 71541->71542 71543 6c374007 69 API calls 71542->71543 71543->71540 71545 6c36aa0e 3 API calls 71544->71545 71546 6c35bdce 71545->71546 71547 6c36b2cf 44 API calls 71546->71547 71548 6c35bde2 71547->71548 71584 6c354ca0 67 API calls 3 library calls 71548->71584 71550 6c35be18 71551 6c35be64 71550->71551 71552 6c35be8d 71550->71552 71553 6c35be77 71551->71553 71585 6c36af37 9 API calls 2 library calls 71551->71585 71586 6c352300 38 API calls 71552->71586 71553->71496 71556 6c35beb7 71587 6c352370 30 API calls 71556->71587 71558 6c35becd 71588 6c36d2b3 RaiseException 71558->71588 71560 6c35bed8 71560->71496 71562 6c36b2db __EH_prolog3 71561->71562 71589 6c36ae5e 71562->71589 71567 6c36b2f9 71603 6c36b362 41 API calls std::locale::_Setgloballocale 71567->71603 71568 6c36b354 __DllMainCRTStartup@12 71568->71500 71570 6c36b301 71604 6c36b159 14 API calls 3 library calls 71570->71604 71572 6c36b317 71595 6c36ae8f 71572->71595 71574 6c35bbac 71573->71574 71580 6c35ba46 71573->71580 71609 6c36b3ef 71574->71609 71578 6c35bc52 71618 6c35b4e0 67 API calls 2 library calls 71578->71618 71580->71503 71581 6c352300 38 API calls 71580->71581 71581->71505 71582->71507 71583->71509 71584->71550 71585->71553 71586->71556 71587->71558 71588->71560 71590 6c36ae74 71589->71590 71591 6c36ae6d 71589->71591 71594 6c36ae72 71590->71594 71606 6c36c9db EnterCriticalSection 71590->71606 71605 6c373d74 6 API calls 2 library calls 71591->71605 71594->71572 71602 6c36b1d8 15 API calls std::locale::_Locimp::_Locimp 71594->71602 71596 6c373d82 71595->71596 71597 6c36ae99 71595->71597 71608 6c373d5d LeaveCriticalSection 71596->71608 71598 6c36aeac 71597->71598 71607 6c36c9e9 LeaveCriticalSection 71597->71607 71598->71568 71601 6c373d89 71601->71568 71602->71567 71603->71570 71604->71572 71605->71594 71606->71594 71607->71598 71608->71601 71610 6c36b3f8 71609->71610 71611 6c35bbba 71610->71611 71619 6c373311 71610->71619 71611->71580 71617 6c370063 29 API calls 2 library calls 71611->71617 71615 6c36b467 71615->71611 71642 6c374007 71615->71642 71617->71578 71618->71580 71621 6c37331c ___scrt_is_nonwritable_in_current_image 71619->71621 71620 6c37332f 71660 6c372f04 14 API calls __dosmaperr 71620->71660 71621->71620 71624 6c37334f 71621->71624 71623 6c373334 71661 6c373a4e 29 API calls ___std_exception_copy 71623->71661 71626 6c373354 71624->71626 71627 6c373361 71624->71627 71662 6c372f04 14 API calls __dosmaperr 71626->71662 71646 6c380537 71627->71646 71630 6c36b44c 71630->71611 71638 6c372fb4 71630->71638 71632 6c373371 71663 6c372f04 14 API calls __dosmaperr 71632->71663 71633 6c37337e 71654 6c38069d 71633->71654 71639 6c372fc7 ___std_exception_copy 71638->71639 71794 6c373267 71639->71794 71641 6c372fdc ___std_exception_copy 71641->71615 71643 6c37401a ___std_exception_copy 71642->71643 71895 6c3740c5 71643->71895 71645 6c374026 ___std_exception_copy 71645->71611 71647 6c380543 ___scrt_is_nonwritable_in_current_image 71646->71647 71665 6c373d46 EnterCriticalSection 71647->71665 71649 6c380551 71666 6c3805db 71649->71666 71655 6c3807bc 71654->71655 71688 6c38083f 71655->71688 71658 6c373393 71664 6c3733bc LeaveCriticalSection __fread_nolock 71658->71664 71660->71623 71661->71630 71662->71630 71663->71630 71664->71630 71665->71649 71675 6c3805fe 71666->71675 71667 6c38055e 71679 6c380597 71667->71679 71668 6c380656 71669 6c37cf6f __Getctype 14 API calls 71668->71669 71670 6c38065f 71669->71670 71684 6c37a607 14 API calls __dosmaperr 71670->71684 71673 6c380668 71673->71667 71685 6c37ca3e 6 API calls std::_Locinfo::_Locinfo_dtor 71673->71685 71675->71667 71675->71668 71682 6c3700a9 EnterCriticalSection 71675->71682 71683 6c3700bd LeaveCriticalSection 71675->71683 71676 6c380687 71686 6c3700a9 EnterCriticalSection 71676->71686 71687 6c373d5d LeaveCriticalSection 71679->71687 71681 6c37336a 71681->71632 71681->71633 71682->71675 71683->71675 71684->71673 71685->71676 71686->71667 71687->71681 71689 6c38085e 71688->71689 71690 6c380871 71689->71690 71698 6c380886 71689->71698 71708 6c372f04 14 API calls __dosmaperr 71690->71708 71692 6c380876 71709 6c373a4e 29 API calls ___std_exception_copy 71692->71709 71694 6c3807d2 71694->71658 71705 6c389b59 71694->71705 71696 6c380a57 71714 6c373a4e 29 API calls ___std_exception_copy 71696->71714 71703 6c3809a6 71698->71703 71710 6c389a21 39 API calls 2 library calls 71698->71710 71700 6c3809f6 71700->71703 71711 6c389a21 39 API calls 2 library calls 71700->71711 71702 6c380a14 71702->71703 71712 6c389a21 39 API calls 2 library calls 71702->71712 71703->71694 71713 6c372f04 14 API calls __dosmaperr 71703->71713 71715 6c389f11 71705->71715 71708->71692 71709->71694 71710->71700 71711->71702 71712->71703 71713->71696 71714->71694 71718 6c389f1d ___scrt_is_nonwritable_in_current_image 71715->71718 71716 6c389f24 71735 6c372f04 14 API calls __dosmaperr 71716->71735 71718->71716 71720 6c389f4f 71718->71720 71719 6c389f29 71736 6c373a4e 29 API calls ___std_exception_copy 71719->71736 71726 6c389b79 71720->71726 71725 6c389b74 71725->71658 71738 6c3751ef 71726->71738 71732 6c389baf 71733 6c389be1 71732->71733 71793 6c37a607 14 API calls __dosmaperr 71732->71793 71737 6c389fa6 LeaveCriticalSection __wsopen_s 71733->71737 71735->71719 71736->71725 71737->71725 71739 6c36f6fa __wsopen_s 39 API calls 71738->71739 71740 6c375201 71739->71740 71741 6c375213 71740->71741 71742 6c37c851 __wsopen_s 5 API calls 71740->71742 71743 6c36f7f4 71741->71743 71742->71741 71744 6c36f869 __wsopen_s 17 API calls 71743->71744 71745 6c36f80c 71744->71745 71745->71732 71746 6c389be7 71745->71746 71747 6c38a081 __wsopen_s 29 API calls 71746->71747 71748 6c389c04 71747->71748 71749 6c389c19 71748->71749 71750 6c389c32 71748->71750 71751 6c372f17 __dosmaperr 14 API calls 71749->71751 71752 6c386ded __wsopen_s 18 API calls 71750->71752 71756 6c389c1e 71751->71756 71753 6c389c37 71752->71753 71754 6c389c40 71753->71754 71755 6c389c57 71753->71755 71757 6c372f17 __dosmaperr 14 API calls 71754->71757 71758 6c389fec __wsopen_s CreateFileW 71755->71758 71759 6c372f04 __dosmaperr 14 API calls 71756->71759 71760 6c389c45 71757->71760 71761 6c389c2b 71759->71761 71761->71732 71793->71733 71796 6c373273 ___scrt_is_nonwritable_in_current_image 71794->71796 71795 6c373279 71817 6c373bf7 29 API calls 2 library calls 71795->71817 71796->71795 71798 6c3732bc 71796->71798 71805 6c3700a9 EnterCriticalSection 71798->71805 71799 6c373294 71799->71641 71801 6c3732c8 71806 6c37317b 71801->71806 71803 6c3732de 71818 6c373307 LeaveCriticalSection __fread_nolock 71803->71818 71805->71801 71807 6c3731a1 71806->71807 71808 6c37318e 71806->71808 71819 6c3730a2 71807->71819 71808->71803 71810 6c3731c4 71813 6c3731df 71810->71813 71816 6c373252 71810->71816 71832 6c37ff35 34 API calls 3 library calls 71810->71832 71823 6c37421d 71813->71823 71816->71803 71817->71799 71818->71799 71820 6c3730b3 71819->71820 71822 6c37310b 71819->71822 71820->71822 71833 6c37fcdb 31 API calls 2 library calls 71820->71833 71822->71810 71824 6c374236 71823->71824 71825 6c3731f2 71823->71825 71824->71825 71826 6c37f3a2 __fread_nolock 29 API calls 71824->71826 71829 6c37fd1b 71825->71829 71827 6c374252 71826->71827 71834 6c381438 71827->71834 71876 6c37fe7c 71829->71876 71831 6c37fd34 71831->71816 71832->71813 71833->71822 71835 6c381444 ___scrt_is_nonwritable_in_current_image 71834->71835 71836 6c381485 71835->71836 71837 6c3814cb 71835->71837 71844 6c38144c 71835->71844 71874 6c373bf7 29 API calls 2 library calls 71836->71874 71845 6c387171 EnterCriticalSection 71837->71845 71840 6c3814d1 71841 6c3814ef 71840->71841 71846 6c38121c 71840->71846 71875 6c381541 LeaveCriticalSection __wsopen_s 71841->71875 71844->71825 71845->71840 71847 6c381244 71846->71847 71873 6c381267 __wsopen_s 71846->71873 71848 6c381248 71847->71848 71850 6c3812a3 71847->71850 71849 6c373bf7 ___std_exception_copy 29 API calls 71848->71849 71849->71873 71851 6c3812c1 71850->71851 71852 6c37fd1b __wsopen_s 31 API calls 71850->71852 71853 6c381549 __wsopen_s 40 API calls 71851->71853 71852->71851 71854 6c3812d3 71853->71854 71855 6c3812d9 71854->71855 71856 6c381320 71854->71856 71857 6c381308 71855->71857 71858 6c3812e1 71855->71858 71859 6c381389 WriteFile 71856->71859 71860 6c381334 71856->71860 71861 6c3815c6 __wsopen_s 45 API calls 71857->71861 71865 6c38198d __wsopen_s 6 API calls 71858->71865 71858->71873 71862 6c3813ab GetLastError 71859->71862 71859->71873 71863 6c38133c 71860->71863 71864 6c381375 71860->71864 71872 6c38131b 71861->71872 71862->71873 71867 6c381361 71863->71867 71868 6c381341 71863->71868 71866 6c3819f5 __wsopen_s 7 API calls 71864->71866 71865->71873 71866->71873 71869 6c381bb9 __wsopen_s 8 API calls 71867->71869 71870 6c38134a 71868->71870 71868->71873 71869->71872 71871 6c381ad0 __wsopen_s 7 API calls 71870->71871 71871->71873 71872->71873 71873->71841 71874->71844 71875->71844 71882 6c386d83 71876->71882 71878 6c37fe8e 71879 6c37feaa SetFilePointerEx 71878->71879 71881 6c37fe96 __wsopen_s 71878->71881 71880 6c37fec2 GetLastError 71879->71880 71879->71881 71880->71881 71881->71831 71883 6c386d90 71882->71883 71884 6c386da5 71882->71884 71885 6c372f17 __dosmaperr 14 API calls 71883->71885 71886 6c372f17 __dosmaperr 14 API calls 71884->71886 71888 6c386dca 71884->71888 71887 6c386d95 71885->71887 71889 6c386dd5 71886->71889 71890 6c372f04 __dosmaperr 14 API calls 71887->71890 71888->71878 71891 6c372f04 __dosmaperr 14 API calls 71889->71891 71892 6c386d9d 71890->71892 71893 6c386ddd 71891->71893 71892->71878 71894 6c373a4e ___std_exception_copy 29 API calls 71893->71894 71894->71892 71896 6c3740d1 ___scrt_is_nonwritable_in_current_image 71895->71896 71897 6c3740fe 71896->71897 71898 6c3740db 71896->71898 71905 6c3740f6 71897->71905 71906 6c3700a9 EnterCriticalSection 71897->71906 71921 6c373bf7 29 API calls 2 library calls 71898->71921 71901 6c37411c 71907 6c374037 71901->71907 71903 6c374129 71922 6c374154 LeaveCriticalSection __fread_nolock 71903->71922 71905->71645 71906->71901 71908 6c374067 71907->71908 71909 6c374044 71907->71909 71911 6c37405f 71908->71911 71912 6c37421d ___scrt_uninitialize_crt 64 API calls 71908->71912 71934 6c373bf7 29 API calls 2 library calls 71909->71934 71911->71903 71913 6c37407f 71912->71913 71923 6c37e56c 71913->71923 71916 6c37f3a2 __fread_nolock 29 API calls 71917 6c374093 71916->71917 71927 6c380f92 71917->71927 71921->71905 71922->71905 71924 6c37e583 71923->71924 71925 6c374087 71923->71925 71924->71925 71936 6c37a607 14 API calls __dosmaperr 71924->71936 71925->71916 71928 6c37409a 71927->71928 71930 6c380fbb 71927->71930 71928->71911 71935 6c37a607 14 API calls __dosmaperr 71928->71935 71929 6c38100a 71945 6c373bf7 29 API calls 2 library calls 71929->71945 71930->71929 71932 6c380fe2 71930->71932 71937 6c381035 71932->71937 71934->71911 71935->71911 71936->71925 71938 6c381041 ___scrt_is_nonwritable_in_current_image 71937->71938 71946 6c387171 EnterCriticalSection 71938->71946 71940 6c38104f 71942 6c381080 71940->71942 71947 6c380ef2 71940->71947 71960 6c3810ba LeaveCriticalSection __wsopen_s 71942->71960 71944 6c3810a3 71944->71928 71945->71928 71946->71940 71948 6c386d83 __wsopen_s 29 API calls 71947->71948 71951 6c380f02 71948->71951 71949 6c380f08 71950 6c386f00 __wsopen_s 15 API calls 71949->71950 71951->71949 71953 6c386d83 __wsopen_s 29 API calls 71951->71953 71959 6c380f3a 71951->71959 71952 6c386d83 __wsopen_s 29 API calls 71954 6c380f46 CloseHandle 71952->71954 71956 6c380f31 71953->71956 71954->71949 71958 6c386d83 __wsopen_s 29 API calls 71956->71958 71958->71959 71959->71949 71959->71952 71960->71944 71961->71516 71962->71521 71963->71516 71964->71516 71965->71516 71967 6c35b09e 71966->71967 71970 6c35b04a 71966->71970 71968 6c36aa82 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 71967->71968 71969 6c3598ff 71968->71969 71969->71532 71970->71967 71982 6c374c68 71970->71982 71973 6c36aa8a 71972->71973 71974 6c36aa8b IsProcessorFeaturePresent 71972->71974 71973->71530 71976 6c36c407 71974->71976 72054 6c36c4ed SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 71976->72054 71978 6c36c4ea 71978->71530 71979->71533 71980->71535 71981->71537 71983 6c374c7b ___std_exception_copy 71982->71983 71986 6c374e49 71983->71986 71985 6c374c90 ___std_exception_copy 71985->71967 71987 6c374e57 71986->71987 71992 6c374e7f 71986->71992 71988 6c374e86 71987->71988 71989 6c374e64 71987->71989 71987->71992 71994 6c374f0c 71988->71994 72002 6c373bf7 29 API calls 2 library calls 71989->72002 71992->71985 71995 6c374f18 ___scrt_is_nonwritable_in_current_image 71994->71995 72003 6c3700a9 EnterCriticalSection 71995->72003 71997 6c374f26 72004 6c374ec0 71997->72004 72001 6c374ebe 72001->71985 72002->71992 72003->71997 72012 6c37e39a 72004->72012 72010 6c374f02 72011 6c374f5b LeaveCriticalSection __fread_nolock 72010->72011 72011->72001 72030 6c37e445 72012->72030 72014 6c374ed8 72019 6c374ca2 72014->72019 72015 6c37e3ab 72015->72014 72016 6c37a641 __fread_nolock 15 API calls 72015->72016 72017 6c37e404 72016->72017 72037 6c37a607 14 API calls __dosmaperr 72017->72037 72022 6c374cb4 72019->72022 72024 6c374cdd 72019->72024 72020 6c374cc2 72051 6c373bf7 29 API calls 2 library calls 72020->72051 72022->72020 72022->72024 72027 6c374cf8 _Yarn 72022->72027 72029 6c37e483 64 API calls ___scrt_uninitialize_crt 72024->72029 72025 6c37421d ___scrt_uninitialize_crt 64 API calls 72025->72027 72026 6c37f3a2 __fread_nolock 29 API calls 72026->72027 72027->72024 72027->72025 72027->72026 72028 6c381438 __wsopen_s 64 API calls 72027->72028 72038 6c381e85 72027->72038 72028->72027 72029->72010 72031 6c37e451 72030->72031 72032 6c37e47b 72031->72032 72033 6c37f3a2 __fread_nolock 29 API calls 72031->72033 72032->72015 72034 6c37e46c 72033->72034 72035 6c3871c6 __fread_nolock 29 API calls 72034->72035 72036 6c37e472 72035->72036 72036->72015 72037->72014 72039 6c381f15 72038->72039 72040 6c37f3a2 __fread_nolock 29 API calls 72039->72040 72043 6c381f22 72040->72043 72041 6c381f2e 72041->72027 72042 6c381f7a 72042->72041 72045 6c381fdc 72042->72045 72046 6c37e445 29 API calls 72042->72046 72043->72041 72043->72042 72052 6c381e90 31 API calls __wsopen_s 72043->72052 72053 6c38200b 64 API calls 2 library calls 72045->72053 72048 6c381fcf 72046->72048 72048->72045 72050 6c383cff __fread_nolock 14 API calls 72048->72050 72049 6c381fed 72049->72027 72050->72045 72051->72024 72052->72042 72053->72049 72054->71978 72055->71487 72056->71489 72057 1000638b 72058 10001100 70 API calls 72057->72058 72059 10006390 72058->72059 72060 1000474c lstrlenW 72061 1001fff8 72060->72061 72062 6c36403b 72067 6c364049 error_info_injector 72062->72067 72063 6c364d58 72064 6c373a5e 29 API calls 72063->72064 72065 6c364d5d 72064->72065 72095 6c3526c0 30 API calls 3 library calls 72065->72095 72067->72063 72069 6c36416b WinExec 72067->72069 72068 6c364d69 72096 6c3526c0 30 API calls 3 library calls 72068->72096 72071 6c36aa0e 3 API calls 72069->72071 72073 6c364197 72071->72073 72072 6c364d75 72097 6c3526c0 30 API calls 3 library calls 72072->72097 72093 6c365e30 30 API calls 2 library calls 72073->72093 72076 6c364d81 72098 6c3526c0 30 API calls 3 library calls 72076->72098 72078 6c364d8d 72099 6c3526c0 30 API calls 3 library calls 72078->72099 72080 6c364d99 72100 6c3526c0 30 API calls 3 library calls 72080->72100 72081 6c364204 72081->72063 72094 6c35b390 30 API calls 2 library calls 72081->72094 72084 6c364da5 72101 6c3526c0 30 API calls 3 library calls 72084->72101 72086 6c364db1 72102 6c3526c0 30 API calls 3 library calls 72086->72102 72088 6c364dbd 72103 6c3526c0 30 API calls 3 library calls 72088->72103 72090 6c364dc9 72104 6c3526c0 30 API calls 3 library calls 72090->72104 72092 6c364dd5 72093->72081 72094->72081 72095->72068 72096->72072 72097->72076 72098->72078 72099->72080 72100->72084 72101->72086 72102->72088 72103->72090 72104->72092 72105 6c3688b9 Sleep 72108 6c3687d0 _Yarn error_info_injector _strlen 72105->72108 72106 6c3688f2 _strlen 72111 6c368925 72106->72111 72137 6c3526c0 30 API calls 3 library calls 72106->72137 72108->72105 72108->72106 72109 6c36aa0e RaiseException EnterCriticalSection LeaveCriticalSection 72108->72109 72119 6c3689c9 72108->72119 72122 6c3680f0 CreateToolhelp32Snapshot 72108->72122 72109->72108 72112 6c368962 72111->72112 72113 6c368980 72111->72113 72120 6c36892c _Yarn 72111->72120 72114 6c36aa0e 3 API calls 72112->72114 72115 6c36aa0e 3 API calls 72113->72115 72114->72120 72115->72120 72116 6c373a5e 29 API calls 72118 6c368a23 72116->72118 72119->72116 72121 6c3689f8 error_info_injector 72119->72121 72138 6c368330 41 API calls 3 library calls 72120->72138 72123 6c368303 72122->72123 72124 6c36810c __fread_nolock 72122->72124 72123->72108 72125 6c368122 Process32FirstW 72124->72125 72126 6c3682fc CloseHandle 72125->72126 72136 6c368146 _Yarn error_info_injector _strlen 72125->72136 72126->72123 72127 6c368150 WideCharToMultiByte 72127->72136 72128 6c36831d 72139 6c3526c0 30 API calls 3 library calls 72128->72139 72130 6c368322 72131 6c373a5e 29 API calls 72130->72131 72133 6c368327 72131->72133 72132 6c36aa0e RaiseException EnterCriticalSection LeaveCriticalSection 72132->72136 72134 6c3682e2 Process32NextW 72134->72126 72134->72127 72135 6c368310 CloseHandle 72135->72123 72136->72127 72136->72128 72136->72130 72136->72132 72136->72134 72136->72135 72137->72106 72138->72119 72139->72130 72140 10006013 72141 10006045 72140->72141 72142 10020003 72141->72142 72145 1000608a 72141->72145 72148 10005e07 72141->72148 72146 100060a0 RegOpenKeyExW 72145->72146 72147 10003f35 __wcsrev 72146->72147 72149 1001f0f9 RegQueryValueExW 72148->72149 72150 10003f35 __wcsrev 72149->72150 72151 6c37a9e4 GetLastError 72152 6c37aa00 72151->72152 72153 6c37a9fa 72151->72153 72157 6c37aa04 SetLastError 72152->72157 72174 6c37c981 72152->72174 72179 6c37c942 6 API calls std::_Locinfo::_Locinfo_dtor 72153->72179 72159 6c37cf6f __Getctype 12 API calls 72160 6c37aa31 72159->72160 72161 6c37aa4a 72160->72161 72162 6c37aa39 72160->72162 72163 6c37c981 __Getctype 6 API calls 72161->72163 72164 6c37c981 __Getctype 6 API calls 72162->72164 72165 6c37aa56 72163->72165 72171 6c37aa47 72164->72171 72166 6c37aa71 72165->72166 72167 6c37aa5a 72165->72167 72181 6c37abd0 14 API calls __Getctype 72166->72181 72168 6c37c981 __Getctype 6 API calls 72167->72168 72168->72171 72180 6c37a607 14 API calls __dosmaperr 72171->72180 72172 6c37aa7c 72182 6c37a607 14 API calls __dosmaperr 72172->72182 72183 6c37ccdb 72174->72183 72177 6c37aa1c 72177->72157 72177->72159 72178 6c37c9bb TlsSetValue 72179->72152 72180->72157 72181->72172 72182->72157 72184 6c37cd0b 72183->72184 72188 6c37c99d 72183->72188 72184->72188 72190 6c37cc10 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 72184->72190 72186 6c37cd1f 72187 6c37cd25 GetProcAddress 72186->72187 72186->72188 72187->72188 72189 6c37cd35 std::_Locinfo::_Locinfo_dtor 72187->72189 72188->72177 72188->72178 72189->72188 72190->72186 72191 6c37fc2e 72192 6c37fc56 72191->72192 72193 6c37fc3b 72191->72193 72195 6c37fc65 72192->72195 72213 6c3892f4 30 API calls 2 library calls 72192->72213 72193->72192 72194 6c37fc47 72193->72194 72212 6c372f04 14 API calls __dosmaperr 72194->72212 72200 6c383515 72195->72200 72199 6c37fc4c __fread_nolock 72201 6c38352d 72200->72201 72202 6c383522 72200->72202 72204 6c383535 72201->72204 72210 6c38353e __Getctype 72201->72210 72203 6c37a641 __fread_nolock 15 API calls 72202->72203 72208 6c38352a 72203->72208 72214 6c37a607 14 API calls __dosmaperr 72204->72214 72206 6c383568 RtlReAllocateHeap 72206->72208 72206->72210 72207 6c383543 72215 6c372f04 14 API calls __dosmaperr 72207->72215 72208->72199 72210->72206 72210->72207 72216 6c3724cf EnterCriticalSection LeaveCriticalSection __Getctype 72210->72216 72212->72199 72213->72195 72214->72208 72215->72208 72216->72210 72217 2eb0032 72227 2eb0ae4 GetPEB 72217->72227 72220 2eb0ae4 GetPEB 72223 2eb02a7 72220->72223 72221 2eb04a6 GetNativeSystemInfo 72222 2eb04d3 VirtualAlloc 72221->72222 72225 2eb0a02 72221->72225 72224 2eb04ec 72222->72224 72223->72221 72223->72225 72229 10007813 72224->72229 72228 2eb029b 72227->72228 72228->72220 72230 10007823 72229->72230 72231 1000781e 72229->72231 72235 1000771d 72230->72235 72243 1000b54b GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 72231->72243 72234 10007831 72234->72225 72236 10007729 __lseeki64 72235->72236 72240 100077c6 __lseeki64 72236->72240 72241 10007776 72236->72241 72244 100075b9 72236->72244 72238 100077a6 72239 100075b9 __CRT_INIT@12 149 API calls 72238->72239 72238->72240 72239->72240 72240->72234 72241->72238 72241->72240 72242 100075b9 __CRT_INIT@12 149 API calls 72241->72242 72242->72238 72243->72230 72245 100075c5 __lseeki64 72244->72245 72246 10007647 72245->72246 72247 100075cd 72245->72247 72248 100076a8 72246->72248 72249 1000764d 72246->72249 72295 1000803b HeapCreate 72247->72295 72252 10007706 72248->72252 72253 100076ad 72248->72253 72255 1000766b 72249->72255 72261 100075d6 __lseeki64 72249->72261 72320 10008306 66 API calls _doexit 72249->72320 72251 100075d2 72251->72261 72314 10009ac6 86 API calls 4 library calls 72251->72314 72252->72261 72326 10009a58 79 API calls __freefls@4 72252->72326 72254 10009754 ___set_flsgetvalue 3 API calls 72253->72254 72256 100076b2 72254->72256 72259 1000767f 72255->72259 72321 1000b0e4 67 API calls _free 72255->72321 72262 10009fe4 __calloc_crt 66 API calls 72256->72262 72324 10007692 70 API calls __mtterm 72259->72324 72261->72241 72266 100076be 72262->72266 72263 100075e2 __RTC_Initialize 72267 100075e6 72263->72267 72274 100075f2 GetCommandLineA 72263->72274 72266->72261 72269 100076ca DecodePointer 72266->72269 72315 10008059 HeapDestroy 72267->72315 72268 10007675 72322 100097a5 70 API calls _free 72268->72322 72275 100076df 72269->72275 72272 100075eb 72272->72261 72273 1000767a 72323 10008059 HeapDestroy 72273->72323 72296 1000b468 71 API calls 2 library calls 72274->72296 72278 100076e3 72275->72278 72279 100076fa 72275->72279 72281 100097e2 __CRT_INIT@12 66 API calls 72278->72281 72325 10006e49 66 API calls 2 library calls 72279->72325 72280 10007602 72297 1000ae9f 73 API calls __calloc_crt 72280->72297 72284 100076ea GetCurrentThreadId 72281->72284 72284->72261 72285 1000760c 72286 10007610 72285->72286 72317 1000b3ad 95 API calls 3 library calls 72285->72317 72316 100097a5 70 API calls _free 72286->72316 72289 1000761c 72290 10007630 72289->72290 72298 1000b137 72289->72298 72290->72272 72319 1000b0e4 67 API calls _free 72290->72319 72295->72251 72296->72280 72297->72285 72299 1000b140 72298->72299 72302 1000b145 _strlen 72298->72302 72327 1000de61 94 API calls __setmbcp 72299->72327 72301 10007625 72301->72290 72318 10008119 77 API calls 4 library calls 72301->72318 72302->72301 72303 10009fe4 __calloc_crt 66 API calls 72302->72303 72307 1000b17a _strlen 72303->72307 72304 1000b1c9 72329 10006e49 66 API calls 2 library calls 72304->72329 72306 10009fe4 __calloc_crt 66 API calls 72306->72307 72307->72301 72307->72304 72307->72306 72308 1000b1ef 72307->72308 72311 1000b206 72307->72311 72328 10007f48 66 API calls __lseeki64 72307->72328 72330 10006e49 66 API calls 2 library calls 72308->72330 72331 100086b0 10 API calls __call_reportfault 72311->72331 72313 1000b212 72314->72263 72315->72272 72316->72267 72317->72289 72318->72290 72319->72286 72320->72255 72321->72268 72322->72273 72323->72259 72324->72261 72325->72261 72326->72261 72327->72302 72328->72307 72329->72301 72330->72301 72331->72313 72332 1001f0df 72339 10002c60 WSAStartup CreateEventW InterlockedExchange 72332->72339 72335 1001f0e4 72336 1001f7db 72335->72336 72342 10006f17 72335->72342 72354 10005a20 CreateEventW 72336->72354 72340 10006815 ___strgtold12_l 5 API calls 72339->72340 72341 10002cff 72340->72341 72341->72335 72344 10006f21 72342->72344 72343 10006e83 _malloc 66 API calls 72343->72344 72344->72343 72345 10006f3b 72344->72345 72349 10006f3d std::exception::exception 72344->72349 72382 10008550 DecodePointer 72344->72382 72345->72335 72347 10006f7b 72384 10006e24 66 API calls std::exception::operator= 72347->72384 72349->72347 72383 100073e9 76 API calls __cinit 72349->72383 72350 10006f85 72385 10007836 RaiseException 72350->72385 72353 10006f96 72355 10005a79 72354->72355 72357 10005a83 72354->72357 72392 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 72355->72392 72386 10006410 HeapCreate 72357->72386 72360 10005b12 72393 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 72360->72393 72361 10005b1c CreateEventW 72363 10005b55 72361->72363 72364 10005b5f CreateEventW 72361->72364 72394 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 72363->72394 72366 10005b84 CreateEventW 72364->72366 72367 10005b7a 72364->72367 72369 10005ba9 InitializeCriticalSectionAndSpinCount 72366->72369 72370 10005b9f 72366->72370 72395 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 72367->72395 72372 10005c77 InitializeCriticalSectionAndSpinCount 72369->72372 72373 10005c6d 72369->72373 72396 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 72370->72396 72375 10005c98 InterlockedExchange timeGetTime CreateEventW CreateEventW 72372->72375 72376 10005c8e 72372->72376 72397 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 72373->72397 72378 100067ff 77 API calls 72375->72378 72398 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 72376->72398 72379 10005d2b 72378->72379 72380 100067ff 77 API calls 72379->72380 72381 10005d3b 72380->72381 72382->72344 72383->72347 72384->72350 72385->72353 72387 10006441 72386->72387 72388 10006437 72386->72388 72390 10005af2 InitializeCriticalSectionAndSpinCount 72387->72390 72400 10006e49 66 API calls 2 library calls 72387->72400 72399 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 72388->72399 72390->72360 72390->72361 72392->72357 72393->72361 72394->72364 72395->72366 72396->72369 72397->72372 72398->72375 72399->72387 72400->72390 72401 100032e0 6 API calls 72402 6c364915 72403 6c364923 DeleteFileA 72402->72403 72407 6c36492e error_info_injector 72403->72407 72404 6c373a5e 29 API calls 72405 6c364d5d 72404->72405 72428 6c3526c0 30 API calls 3 library calls 72405->72428 72407->72404 72417 6c364d34 error_info_injector 72407->72417 72408 6c364d69 72429 6c3526c0 30 API calls 3 library calls 72408->72429 72410 6c364d75 72430 6c3526c0 30 API calls 3 library calls 72410->72430 72412 6c364d81 72431 6c3526c0 30 API calls 3 library calls 72412->72431 72414 6c364d8d 72432 6c3526c0 30 API calls 3 library calls 72414->72432 72416 6c364d99 72433 6c3526c0 30 API calls 3 library calls 72416->72433 72419 6c364da5 72434 6c3526c0 30 API calls 3 library calls 72419->72434 72421 6c364db1 72435 6c3526c0 30 API calls 3 library calls 72421->72435 72423 6c364dbd 72436 6c3526c0 30 API calls 3 library calls 72423->72436 72425 6c364dc9 72437 6c3526c0 30 API calls 3 library calls 72425->72437 72427 6c364dd5 72428->72408 72429->72410 72430->72412 72431->72414 72432->72416 72433->72419 72434->72421 72435->72423 72436->72425 72437->72427 72438 6c35aa90 72439 6c35aab3 _Yarn 72438->72439 72440 6c35ab8d _Yarn 72438->72440 72440->72439 72441 6c374c68 69 API calls 72440->72441 72441->72439 72442 6c3700d1 72443 6c3700de 72442->72443 72444 6c37cf6f __Getctype 14 API calls 72443->72444 72445 6c3700f8 72444->72445 72454 6c37a607 14 API calls __dosmaperr 72445->72454 72447 6c370104 72448 6c37cf6f __Getctype 14 API calls 72447->72448 72452 6c37012a 72447->72452 72450 6c37011e 72448->72450 72455 6c37a607 14 API calls __dosmaperr 72450->72455 72453 6c370136 72452->72453 72456 6c37ca3e 6 API calls std::_Locinfo::_Locinfo_dtor 72452->72456 72454->72447 72455->72452 72456->72452 72457 6c369b10 72505 6c351a30 72457->72505 72459 6c369b45 72527 6c3693e0 GetModuleFileNameA 72459->72527 72461 6c369b5b _strlen 72462 6c369bae _Yarn 72461->72462 72905 6c352c20 39 API calls 3 library calls 72461->72905 72550 6c367590 72462->72550 72465 6c369c0b error_info_injector 72466 6c369f77 72465->72466 72498 6c369da2 error_info_injector 72465->72498 72579 6c367eb0 72465->72579 72469 6c373a5e 29 API calls 72466->72469 72467 6c369e27 CreateThread 72473 6c369eb3 72467->72473 72474 6c369e40 WaitForSingleObject 72467->72474 73526 6c3680e0 Sleep 72467->73526 72472 6c369f7c 72469->72472 72471 6c369cbd 72478 6c3693e0 31 API calls 72471->72478 72479 6c3529d0 29 API calls 72472->72479 72635 6c3696a0 GetModuleFileNameA 72473->72635 72474->72473 72475 6c369e55 CloseHandle 72474->72475 72480 6c369e64 72475->72480 72484 6c369e83 error_info_injector 72475->72484 72477 6c369dfd CreateThread 72477->72467 72487 6c369cc9 _strlen 72478->72487 72483 6c369f8f 72479->72483 72480->72466 72480->72484 72481 6c369ed8 72661 6c3692f0 GetModuleFileNameA 72481->72661 72486 6c369eeb 72672 6c366410 72486->72672 72496 6c369d0b _Yarn error_info_injector 72487->72496 72906 6c352c20 39 API calls 3 library calls 72487->72906 72490 6c369f04 72689 6c3699f0 72490->72689 72495 6c369f2c 72714 6c357e80 GetTempPathA 72495->72714 72496->72466 72587 6c375185 72496->72587 72498->72466 72498->72467 72600 6c368a70 72498->72600 72907 6c373ef1 GetSystemTimeAsFileTime 72505->72907 72507 6c351a64 72909 6c375147 72507->72909 72512 6c375159 39 API calls 72513 6c351abf 72512->72513 72915 6c351c70 72513->72915 72516 6c351b08 72517 6c351b78 72516->72517 72928 6c351000 72516->72928 72946 6c3733d3 72516->72946 72954 6c3518c0 72516->72954 72977 6c373423 29 API calls 2 library calls 72516->72977 72518 6c351bb4 error_info_injector 72517->72518 72520 6c373a5e 29 API calls 72517->72520 72518->72459 72521 6c351bdb 72520->72521 72978 6c351c00 29 API calls error_info_injector 72521->72978 72525 6c351bef 72525->72459 72526 6c351b67 Sleep 72526->72516 72526->72517 72528 6c36943f _strlen 72527->72528 72529 6c36965e 72528->72529 72530 6c36944a 72528->72530 73070 6c3526c0 30 API calls 3 library calls 72529->73070 72533 6c3694ac 72530->72533 72534 6c369488 72530->72534 72542 6c369451 _Yarn 72530->72542 72532 6c369663 73071 6c3526c0 30 API calls 3 library calls 72532->73071 72537 6c36aa0e 3 API calls 72533->72537 72536 6c36aa0e 3 API calls 72534->72536 72536->72542 72537->72542 72538 6c373a5e 29 API calls 72539 6c369674 72538->72539 72540 6c3529d0 29 API calls 72539->72540 72541 6c36968f 72540->72541 72541->72461 72542->72532 72544 6c36954a 72542->72544 72549 6c36954f _Yarn 72542->72549 72543 6c36958c error_info_injector 72543->72461 72545 6c3695de 72544->72545 72546 6c3695be 72544->72546 72544->72549 72548 6c36aa0e 3 API calls 72545->72548 72547 6c36aa0e 3 API calls 72546->72547 72547->72549 72548->72549 72549->72538 72549->72543 72551 6c3675e4 72550->72551 73072 6c35c580 72551->73072 72553 6c3675f8 72578 6c367697 error_info_injector 72553->72578 73091 6c367880 72553->73091 72556 6c35a100 72 API calls 72559 6c3677de std::ios_base::_Ios_base_dtor 72556->72559 72559->72465 72560 6c367812 73133 6c3526c0 30 API calls 3 library calls 72560->73133 72561 6c367671 72564 6c3676e4 72561->72564 72565 6c3676cb 72561->72565 72570 6c367676 __fread_nolock 72561->72570 72563 6c367817 72566 6c373a5e 29 API calls 72563->72566 72568 6c36aa0e 3 API calls 72564->72568 72567 6c36aa0e 3 API calls 72565->72567 72569 6c36781c 72566->72569 72567->72570 72568->72570 73134 6c35a050 72 API calls std::ios_base::_Ios_base_dtor 72569->73134 73116 6c367ca0 75 API calls Concurrency::cancel_current_task 72570->73116 72573 6c367838 72573->72465 72574 6c36773c 72575 6c36774b 72574->72575 72576 6c367799 72574->72576 72575->72563 72575->72578 73117 6c359b70 72576->73117 72578->72556 73260 6c356eb0 72579->73260 72581 6c367f15 error_info_injector 72582 6c367fae error_info_injector 72581->72582 72583 6c373a5e 29 API calls 72581->72583 72582->72471 72584 6c367fdc 72583->72584 72585 6c3529d0 29 API calls 72584->72585 72586 6c367fef 72585->72586 72586->72471 72588 6c375193 72587->72588 72589 6c37519d 72587->72589 72590 6c38357e 16 API calls 72588->72590 72591 6c3751ef __wsopen_s 39 API calls 72589->72591 72592 6c37519a 72590->72592 72593 6c3751b7 72591->72593 72592->72498 73414 6c366110 72600->73414 72602 6c368b24 72604 6c368b70 _Yarn error_info_injector 72602->72604 73425 6c352c20 39 API calls 3 library calls 72602->73425 72606 6c368cd1 GetFileAttributesA 72604->72606 72630 6c369163 error_info_injector 72604->72630 72605 6c373a5e 29 API calls 72607 6c3691ef 72605->72607 72609 6c368ce1 SHGetFolderPathA 72606->72609 72606->72630 73429 6c3526c0 30 API calls 3 library calls 72607->73429 72614 6c368cfd _strlen 72609->72614 72609->72630 72610 6c3691fb 72612 6c3529d0 29 API calls 72610->72612 72611 6c3691c5 error_info_injector 72611->72477 72613 6c369212 72612->72613 72613->72477 72614->72607 72615 6c368d6e 72614->72615 72616 6c368d8d 72614->72616 72619 6c368d2a _Yarn 72614->72619 72617 6c36aa0e 3 API calls 72615->72617 72618 6c36aa0e 3 API calls 72616->72618 72617->72619 72618->72619 72622 6c368e04 72619->72622 73426 6c352c20 39 API calls 3 library calls 72619->73426 72621 6c368eac _Yarn 72625 6c368f4d error_info_injector 72621->72625 73428 6c352c20 39 API calls 3 library calls 72621->73428 72622->72621 73427 6c352c20 39 API calls 3 library calls 72622->73427 72626 6c369091 GetFileAttributesA 72625->72626 72625->72630 72627 6c3690a1 CoInitialize CoCreateInstance 72626->72627 72626->72630 72628 6c36915d CoUninitialize 72627->72628 72629 6c3690c9 MultiByteToWideChar 72627->72629 72628->72630 72633 6c369103 72629->72633 72630->72605 72630->72611 72632 6c36914b 72632->72628 72633->72632 72634 6c369126 MultiByteToWideChar 72633->72634 72634->72632 72636 6c3696ff _strlen 72635->72636 72637 6c36999f 72636->72637 72638 6c36970a 72636->72638 73431 6c3526c0 30 API calls 3 library calls 72637->73431 72641 6c369766 72638->72641 72642 6c369748 72638->72642 72648 6c369711 _Yarn 72638->72648 72640 6c3699a4 73432 6c355880 72640->73432 72645 6c36aa0e 3 API calls 72641->72645 72644 6c36aa0e 3 API calls 72642->72644 72644->72648 72645->72648 72646 6c3699b0 73435 6c3526c0 30 API calls 3 library calls 72646->73435 72648->72640 72652 6c369877 72648->72652 72660 6c3698b9 error_info_injector 72648->72660 72649 6c373a5e 29 API calls 72650 6c3699c1 72649->72650 72651 6c3529d0 29 API calls 72650->72651 72653 6c3699df 72651->72653 72652->72646 72654 6c369896 72652->72654 72653->72481 72655 6c369926 72654->72655 72656 6c369906 72654->72656 72659 6c36989d _Yarn 72654->72659 72658 6c36aa0e 3 API calls 72655->72658 72657 6c36aa0e 3 API calls 72656->72657 72657->72659 72658->72659 72659->72649 72659->72660 72660->72481 72662 6c36932b _strlen 72661->72662 72663 6c369336 72662->72663 72664 6c3693ce 72662->72664 72666 6c36933d _Yarn 72663->72666 72667 6c369397 72663->72667 72668 6c36936e 72663->72668 73437 6c3526c0 30 API calls 3 library calls 72664->73437 72666->72486 72671 6c36aa0e 3 API calls 72667->72671 72670 6c36aa0e 3 API calls 72668->72670 72669 6c3693d3 72670->72666 72671->72666 72673 6c366434 _strlen 72672->72673 72674 6c36643f 72673->72674 72675 6c3664c9 72673->72675 72677 6c366446 _Yarn 72674->72677 72678 6c366497 72674->72678 72679 6c366477 72674->72679 73438 6c3526c0 30 API calls 3 library calls 72675->73438 72677->72490 72682 6c36aa0e 3 API calls 72678->72682 72681 6c36aa0e 3 API calls 72679->72681 72680 6c3664f9 error_info_injector 72680->72490 72681->72677 72682->72677 72683 6c3664ce 72683->72680 72684 6c373a5e 29 API calls 72683->72684 72686 6c36652c 72684->72686 72685 6c366559 error_info_injector 72685->72490 72686->72685 72687 6c373a5e 29 API calls 72686->72687 72688 6c366592 72687->72688 72690 6c369a07 72689->72690 72691 6c369a09 GetModuleHandleA 72689->72691 72690->72691 72692 6c369a85 72691->72692 72693 6c369a1b __fread_nolock 72691->72693 72705 6c3529d0 72692->72705 72694 6c369a2c GetModuleFileNameA 72693->72694 72694->72692 72695 6c369a43 _strlen 72694->72695 72696 6c369a65 72695->72696 72697 6c369b01 72695->72697 72700 6c369ab3 72696->72700 72701 6c369aca 72696->72701 72704 6c369a6c _Yarn 72696->72704 73439 6c3526c0 30 API calls 3 library calls 72697->73439 72699 6c369b06 72702 6c36aa0e 3 API calls 72700->72702 72703 6c36aa0e 3 API calls 72701->72703 72702->72704 72703->72704 72704->72692 72706 6c3529dc 72705->72706 72707 6c352a03 error_info_injector 72705->72707 72706->72707 72708 6c373a5e 29 API calls 72706->72708 72707->72495 72709 6c352a26 _Yarn 72708->72709 72710 6c352b92 error_info_injector 72709->72710 72711 6c373a5e 29 API calls 72709->72711 72710->72495 72712 6c352bdf 72711->72712 72713 6c3529d0 29 API calls 72712->72713 72716 6c357ef7 _strlen 72714->72716 72715 6c3595b7 73465 6c3526c0 30 API calls 3 library calls 72715->73465 72716->72715 72718 6c357f60 72716->72718 72719 6c357f49 72716->72719 72724 6c357f09 _Yarn 72716->72724 72722 6c36aa0e 3 API calls 72718->72722 72721 6c36aa0e 3 API calls 72719->72721 72721->72724 72722->72724 72731 6c357fe0 72724->72731 73446 6c352c20 39 API calls 3 library calls 72724->73446 72905->72462 72906->72496 72908 6c373f2a __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 72907->72908 72908->72507 72979 6c37a893 GetLastError 72909->72979 72912 6c375159 72913 6c37a893 __Getctype 39 API calls 72912->72913 72914 6c351a9c 72913->72914 72914->72512 72916 6c351de5 72915->72916 72917 6c351ccb 72915->72917 73011 6c351df0 30 API calls 2 library calls 72916->73011 72919 6c351d24 72917->72919 72920 6c351ce2 72917->72920 72926 6c351cfe _Yarn 72917->72926 72923 6c36aa0e 3 API calls 72919->72923 72920->72916 72922 6c351cee 72920->72922 72921 6c373a5e 29 API calls 72924 6c351def 72921->72924 72925 6c36aa0e 3 API calls 72922->72925 72923->72926 72925->72926 72926->72921 72927 6c351db3 error_info_injector 72926->72927 72927->72516 72929 6c35100d 72928->72929 72930 6c351039 72928->72930 72929->72930 72932 6c3511b0 39 API calls 72929->72932 73012 6c3511b0 72930->73012 72932->72929 72933 6c351048 72934 6c351136 72933->72934 72938 6c3511b0 39 API calls 72933->72938 72935 6c351169 72934->72935 72937 6c3511b0 39 API calls 72934->72937 72936 6c3511b0 39 API calls 72935->72936 72939 6c351178 72936->72939 72937->72934 72938->72933 72940 6c3511b0 39 API calls 72939->72940 72941 6c35118a 72940->72941 73022 6c3515d0 72941->73022 72944 6c3511b0 39 API calls 72945 6c3511a2 72944->72945 72945->72516 72947 6c3733df ___scrt_is_nonwritable_in_current_image 72946->72947 73045 6c373d46 EnterCriticalSection 72947->73045 72949 6c3733e6 73046 6c373691 72949->73046 72955 6c3518e7 72954->72955 72956 6c35193c 72955->72956 72962 6c351b16 72955->72962 72958 6c375159 39 API calls 72956->72958 72960 6c3519a2 72956->72960 72957 6c3518c0 95 API calls 72959 6c351b67 Sleep 72957->72959 72961 6c351978 72958->72961 72959->72962 72969 6c351b78 72959->72969 72964 6c36aa82 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 72960->72964 72963 6c375159 39 API calls 72961->72963 72962->72957 72965 6c351000 75 API calls 72962->72965 72968 6c3733d3 28 API calls 72962->72968 73068 6c373423 29 API calls 2 library calls 72962->73068 72966 6c351984 72963->72966 72967 6c351a1f 72964->72967 72965->72962 72966->72960 72971 6c351c70 30 API calls 72966->72971 72967->72526 72968->72962 72970 6c351bb4 error_info_injector 72969->72970 72972 6c373a5e 29 API calls 72969->72972 72970->72526 72971->72960 72973 6c351bdb 72972->72973 73069 6c351c00 29 API calls error_info_injector 72973->73069 72976 6c351bef 72976->72526 72977->72516 72978->72525 72980 6c37a8af 72979->72980 72981 6c37a8a9 72979->72981 72982 6c37c981 __Getctype 6 API calls 72980->72982 73004 6c37a8b3 SetLastError 72980->73004 73006 6c37c942 6 API calls std::_Locinfo::_Locinfo_dtor 72981->73006 72984 6c37a8cb 72982->72984 72986 6c37cf6f __Getctype 14 API calls 72984->72986 72984->73004 72987 6c37a8e0 72986->72987 72990 6c37a8f9 72987->72990 72991 6c37a8e8 72987->72991 72988 6c351a6d 72988->72912 72989 6c37a948 73010 6c373fb8 39 API calls __CreateFrameInfo 72989->73010 72994 6c37c981 __Getctype 6 API calls 72990->72994 72993 6c37c981 __Getctype 6 API calls 72991->72993 72996 6c37a8f6 72993->72996 72997 6c37a905 72994->72997 73007 6c37a607 14 API calls __dosmaperr 72996->73007 72998 6c37a920 72997->72998 72999 6c37a909 72997->72999 73008 6c37abd0 14 API calls __Getctype 72998->73008 73000 6c37c981 __Getctype 6 API calls 72999->73000 73000->72996 73003 6c37a92b 73009 6c37a607 14 API calls __dosmaperr 73003->73009 73004->72988 73004->72989 73006->72980 73007->73004 73008->73003 73009->73004 73011->72926 73013 6c3511e8 _strlen 73012->73013 73021 6c351259 73013->73021 73034 6c352060 39 API calls Concurrency::cancel_current_task 73013->73034 73017 6c3514a6 73017->72933 73018 6c351493 73018->73017 73035 6c352d90 39 API calls Concurrency::cancel_current_task 73018->73035 73021->73018 73036 6c352300 38 API calls 73021->73036 73037 6c3526d0 30 API calls 3 library calls 73021->73037 73038 6c36d2b3 RaiseException 73021->73038 73023 6c35160f 73022->73023 73024 6c35164d 73023->73024 73032 6c351623 73023->73032 73039 6c352060 39 API calls Concurrency::cancel_current_task 73023->73039 73024->73032 73040 6c352eb0 67 API calls 2 library calls 73024->73040 73027 6c351197 73027->72944 73028 6c35175d 73028->73027 73041 6c352d90 39 API calls Concurrency::cancel_current_task 73028->73041 73032->73028 73042 6c352300 38 API calls 73032->73042 73043 6c3526d0 30 API calls 3 library calls 73032->73043 73044 6c36d2b3 RaiseException 73032->73044 73034->73021 73035->73017 73036->73021 73037->73021 73038->73021 73039->73024 73040->73032 73041->73027 73042->73032 73043->73032 73044->73032 73045->72949 73047 6c3736af 73046->73047 73048 6c3736be 73047->73048 73063 6c380a69 CreateFileW ___initconin 73047->73063 73051 6c36aa82 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 73048->73051 73050 6c3736cb 73050->73048 73064 6c380ada 5 API calls ___initconin 73050->73064 73052 6c3733f4 73051->73052 73060 6c37341a 73052->73060 73054 6c3736dc 73054->73048 73055 6c373709 __alloca_probe_16 73054->73055 73056 6c37a641 __fread_nolock 15 API calls 73054->73056 73059 6c373746 73054->73059 73055->73059 73065 6c380b20 5 API calls ___initconin 73055->73065 73056->73055 73066 6c36cb0b 14 API calls ___std_exception_destroy 73059->73066 73067 6c373d5d LeaveCriticalSection 73060->73067 73062 6c373405 73062->72516 73063->73050 73064->73054 73065->73059 73066->73048 73067->73062 73068->72962 73069->72976 73070->72532 73071->72549 73073 6c35c5b5 73072->73073 73074 6c35bd70 77 API calls 73073->73074 73075 6c35c656 73074->73075 73076 6c36aa0e 3 API calls 73075->73076 73077 6c35c68e 73076->73077 73078 6c36b2cf 44 API calls 73077->73078 73079 6c35c6a2 73078->73079 73080 6c35bb60 118 API calls 73079->73080 73081 6c35c74b 73080->73081 73082 6c35c785 73081->73082 73135 6c352300 38 API calls 73081->73135 73082->72553 73084 6c35c7bf 73136 6c3526d0 30 API calls 3 library calls 73084->73136 73086 6c35c7d1 73137 6c36d2b3 RaiseException 73086->73137 73088 6c35c7e6 73089 6c35a100 72 API calls 73088->73089 73090 6c35c7ff 73089->73090 73090->72553 73092 6c3678bf 73091->73092 73138 6c35cd30 73092->73138 73095 6c36761b 73097 6c367a10 73095->73097 73098 6c367b55 73097->73098 73099 6c367a79 73097->73099 73251 6c352300 38 API calls 73098->73251 73101 6c35cd30 75 API calls 73099->73101 73103 6c367aa1 73101->73103 73102 6c367b7e 73252 6c352370 30 API calls 73102->73252 73106 6c367ab5 73103->73106 73115 6c35ac40 70 API calls 73103->73115 73105 6c367b90 73253 6c36d2b3 RaiseException 73105->73253 73111 6c367651 73106->73111 73254 6c352300 38 API calls 73106->73254 73109 6c367bca 73255 6c3526d0 30 API calls 3 library calls 73109->73255 73111->72560 73111->72561 73112 6c367be5 73256 6c36d2b3 RaiseException 73112->73256 73114 6c367bfa 73115->73106 73116->72574 73118 6c359b89 73117->73118 73119 6c359bb9 73117->73119 73120 6c35b030 69 API calls 73118->73120 73121 6c359c7a 73119->73121 73123 6c359c8c 73119->73123 73122 6c359baf 73120->73122 73124 6c36aa82 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 73121->73124 73125 6c374007 69 API calls 73122->73125 73257 6c352300 38 API calls 73123->73257 73126 6c359c85 73124->73126 73125->73119 73126->72578 73128 6c359cbc 73258 6c352370 30 API calls 73128->73258 73130 6c359ccc 73259 6c36d2b3 RaiseException 73130->73259 73132 6c359cd7 73133->72563 73134->72573 73135->73084 73136->73086 73137->73088 73139 6c35cda1 73138->73139 73140 6c35cd6c 73138->73140 73143 6c35cdb2 73139->73143 73169 6c352060 39 API calls Concurrency::cancel_current_task 73139->73169 73142 6c35cd9a 73140->73142 73171 6c352300 38 API calls 73140->73171 73142->73095 73156 6c35ac40 73142->73156 73143->73142 73170 6c354ca0 67 API calls 3 library calls 73143->73170 73145 6c35cf7f 73172 6c352370 30 API calls 73145->73172 73147 6c35cf8e 73173 6c36d2b3 RaiseException 73147->73173 73151 6c35cfcb 73175 6c352370 30 API calls 73151->73175 73153 6c35cfe1 73176 6c36d2b3 RaiseException 73153->73176 73155 6c35cdec 73155->73142 73174 6c352300 38 API calls 73155->73174 73157 6c35ac92 73156->73157 73158 6c35acdc 73156->73158 73159 6c35b030 69 API calls 73157->73159 73160 6c36aa82 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 73158->73160 73161 6c35ac9d 73159->73161 73162 6c35acfe 73160->73162 73161->73158 73163 6c35acb9 73161->73163 73177 6c372fee 73161->73177 73162->73095 73163->73158 73181 6c374614 73163->73181 73166 6c35acd1 73166->73158 73167 6c35ad0a 73166->73167 73168 6c36aa82 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 73167->73168 73168->73162 73169->73143 73170->73155 73171->73145 73172->73147 73173->73155 73174->73151 73175->73153 73176->73142 73178 6c373001 ___std_exception_copy 73177->73178 73179 6c373267 67 API calls 73178->73179 73180 6c373016 ___std_exception_copy 73179->73180 73180->73163 73182 6c374634 73181->73182 73183 6c37461f 73181->73183 73185 6c374651 73182->73185 73186 6c37463c 73182->73186 73199 6c372f04 14 API calls __dosmaperr 73183->73199 73195 6c37feff 73185->73195 73201 6c372f04 14 API calls __dosmaperr 73186->73201 73188 6c374624 73200 6c373a4e 29 API calls ___std_exception_copy 73188->73200 73190 6c374641 73202 6c373a4e 29 API calls ___std_exception_copy 73190->73202 73191 6c37464c 73191->73166 73194 6c37462f 73194->73166 73196 6c37ff13 ___std_exception_copy 73195->73196 73203 6c3804a8 73196->73203 73198 6c37ff1f ___std_exception_copy 73198->73191 73199->73188 73200->73194 73201->73190 73202->73191 73204 6c3804b4 ___scrt_is_nonwritable_in_current_image 73203->73204 73205 6c3804bb 73204->73205 73206 6c3804de 73204->73206 73229 6c373bf7 29 API calls 2 library calls 73205->73229 73214 6c3700a9 EnterCriticalSection 73206->73214 73209 6c3804d4 73209->73198 73210 6c3804ec 73215 6c380307 73210->73215 73212 6c3804fb 73230 6c38052d LeaveCriticalSection __fread_nolock 73212->73230 73214->73210 73216 6c38033e 73215->73216 73217 6c380316 73215->73217 73218 6c37f3a2 __fread_nolock 29 API calls 73216->73218 73234 6c373bf7 29 API calls 2 library calls 73217->73234 73220 6c380347 73218->73220 73231 6c37fd39 73220->73231 73223 6c3803f1 73235 6c37ff91 34 API calls 4 library calls 73223->73235 73225 6c380408 73226 6c380331 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 73225->73226 73236 6c38013c 33 API calls 2 library calls 73225->73236 73226->73212 73227 6c380400 73227->73226 73229->73209 73230->73209 73237 6c37fd57 73231->73237 73234->73226 73235->73227 73236->73226 73239 6c37fd63 ___scrt_is_nonwritable_in_current_image 73237->73239 73238 6c37fda6 73249 6c373bf7 29 API calls 2 library calls 73238->73249 73239->73238 73241 6c37fdec 73239->73241 73247 6c37fd52 73239->73247 73248 6c387171 EnterCriticalSection 73241->73248 73243 6c37fdf2 73244 6c37fe13 73243->73244 73245 6c37fe7c __fread_nolock 31 API calls 73243->73245 73250 6c37fe74 LeaveCriticalSection __wsopen_s 73244->73250 73245->73244 73247->73223 73247->73225 73247->73226 73248->73243 73249->73247 73250->73247 73251->73102 73252->73105 73253->73106 73254->73109 73255->73112 73256->73114 73257->73128 73258->73130 73259->73132 73309 6c356520 73260->73309 73262 6c356eee _Yarn 73263 6c356faf CryptAcquireContextW 73262->73263 73264 6c3573c2 73263->73264 73265 6c356fdc CryptImportKey 73263->73265 73333 6c36d87e 29 API calls 2 library calls 73264->73333 73267 6c357032 CryptSetKeyParam 73265->73267 73268 6c35742a CryptReleaseContext 73265->73268 73271 6c357494 CryptDestroyKey CryptReleaseContext 73267->73271 73272 6c35704a CryptSetKeyParam 73267->73272 73335 6c36d87e 29 API calls 2 library calls 73268->73335 73270 6c357404 73334 6c36d2b3 RaiseException 73270->73334 73337 6c36d87e 29 API calls 2 library calls 73271->73337 73276 6c357507 CryptDestroyKey CryptReleaseContext 73272->73276 73277 6c357070 73272->73277 73273 6c35746e 73336 6c36d2b3 RaiseException 73273->73336 73339 6c36d87e 29 API calls 2 library calls 73276->73339 73282 6c3575d8 73277->73282 73286 6c3570d7 73277->73286 73287 6c3570b3 73277->73287 73297 6c3570bc _Yarn 73277->73297 73279 6c3574e1 73338 6c36d2b3 RaiseException 73279->73338 73281 6c357422 73343 6c3526c0 30 API calls 3 library calls 73281->73343 73344 6c357640 54 API calls 4 library calls 73282->73344 73283 6c357115 CryptDecrypt CryptDestroyKey CryptReleaseContext 73290 6c357574 73283->73290 73301 6c357147 __fread_nolock 73283->73301 73285 6c357551 73340 6c36d2b3 RaiseException 73285->73340 73294 6c36aa0e 3 API calls 73286->73294 73293 6c36aa0e 3 API calls 73287->73293 73341 6c36d87e 29 API calls 2 library calls 73290->73341 73293->73297 73294->73297 73295 6c3575dd 73345 6c356720 73295->73345 73296 6c3575aa 73342 6c36d2b3 RaiseException 73296->73342 73297->73283 73300 6c3575ef 73300->72581 73301->73281 73302 6c357212 73301->73302 73303 6c35722b 73301->73303 73306 6c3571cf _Yarn error_info_injector 73301->73306 73305 6c36aa0e 3 API calls 73302->73305 73304 6c36aa0e 3 API calls 73303->73304 73304->73306 73305->73306 73307 6c373a5e 29 API calls 73306->73307 73308 6c357398 error_info_injector 73306->73308 73307->73264 73308->72581 73310 6c356561 CryptStringToBinaryA 73309->73310 73311 6c35655f 73309->73311 73312 6c35657e 73310->73312 73313 6c35662b 73310->73313 73311->73310 73314 6c3565b3 __fread_nolock 73312->73314 73316 6c356691 73312->73316 73320 6c3565cd 73312->73320 73321 6c3565aa 73312->73321 73390 6c3566c0 29 API calls 2 library calls 73313->73390 73319 6c356600 CryptStringToBinaryA 73314->73319 73394 6c357640 54 API calls 4 library calls 73316->73394 73317 6c35663a 73391 6c36d2b3 RaiseException 73317->73391 73324 6c356645 73319->73324 73325 6c356618 73319->73325 73327 6c36aa0e 3 API calls 73320->73327 73326 6c36aa0e 3 API calls 73321->73326 73323 6c356699 73328 6c356720 46 API calls 73323->73328 73392 6c36d87e 29 API calls 2 library calls 73324->73392 73325->73262 73326->73314 73327->73314 73330 6c3566af 73328->73330 73330->73262 73331 6c356672 73393 6c36d2b3 RaiseException 73331->73393 73333->73270 73334->73281 73335->73273 73336->73281 73337->73279 73338->73281 73339->73285 73340->73281 73341->73296 73342->73281 73343->73282 73344->73295 73346 6c35672a 73345->73346 73347 6c35674a error_info_injector 73345->73347 73346->73347 73348 6c373a5e 29 API calls 73346->73348 73347->73300 73349 6c356775 CryptAcquireContextW 73348->73349 73351 6c356e09 73349->73351 73357 6c356814 __fread_nolock 73349->73357 73405 6c36d87e 29 API calls 2 library calls 73351->73405 73353 6c35685e CryptCreateHash 73356 6c356d1c CryptReleaseContext 73353->73356 73353->73357 73354 6c3569e8 CryptReleaseContext 73386 6c356a0a _Yarn error_info_injector 73354->73386 73355 6c356e42 73406 6c36d2b3 RaiseException 73355->73406 73401 6c36d87e 29 API calls 2 library calls 73356->73401 73357->73353 73357->73354 73359 6c356884 CryptHashData 73357->73359 73370 6c3568e7 CryptHashData 73357->73370 73380 6c356980 CryptGetHashParam CryptDestroyHash 73357->73380 73359->73357 73362 6c356d8d CryptDestroyHash CryptReleaseContext 73359->73362 73361 6c356d60 73402 6c36d2b3 RaiseException 73361->73402 73403 6c36d87e 29 API calls 2 library calls 73362->73403 73363 6c356720 30 API calls 73366 6c356e7f 73363->73366 73368 6c356720 30 API calls 73366->73368 73367 6c356dda 73404 6c36d2b3 RaiseException 73367->73404 73373 6c356904 CryptGetHashParam 73370->73373 73374 6c356c5a CryptDestroyHash CryptReleaseContext 73370->73374 73372 6c356c52 73372->73363 73373->73357 73375 6c356cbb CryptDestroyHash CryptReleaseContext 73373->73375 73397 6c36d87e 29 API calls 2 library calls 73374->73397 73399 6c36d87e 29 API calls 2 library calls 73375->73399 73377 6c356c9b 73398 6c36d2b3 RaiseException 73377->73398 73380->73357 73383 6c356c02 CryptReleaseContext 73380->73383 73381 6c356cfc 73400 6c36d2b3 RaiseException 73381->73400 73395 6c36d87e 29 API calls 2 library calls 73383->73395 73385 6c356c3a 73396 6c36d2b3 RaiseException 73385->73396 73387 6c356bdf error_info_injector 73386->73387 73388 6c373a5e 29 API calls 73386->73388 73387->73300 73388->73351 73390->73317 73391->73324 73392->73331 73393->73316 73394->73323 73395->73385 73396->73372 73397->73377 73398->73372 73399->73381 73400->73372 73401->73361 73402->73372 73403->73367 73404->73372 73405->73355 73406->73372 73415 6c36614e 73414->73415 73416 6c3662cc 73415->73416 73417 6c3661ba 73415->73417 73424 6c366152 _Yarn 73415->73424 73430 6c3526c0 30 API calls 3 library calls 73416->73430 73419 6c366252 73417->73419 73421 6c3661da 73417->73421 73423 6c36aa0e 3 API calls 73419->73423 73420 6c3662d1 73420->72602 73422 6c36aa0e 3 API calls 73421->73422 73422->73424 73423->73424 73424->72602 73425->72604 73426->72622 73427->72621 73428->72625 73429->72610 73430->73420 73431->72640 73436 6c36b53d 30 API calls 2 library calls 73432->73436 73435->72659 73437->72669 73438->72683 73439->72699 73446->72731 73527 1001f927 73528 1001fb9a 73527->73528 73532 100060df 71 API calls 73528->73532 73533 10005ef8 73528->73533 73537 1001f997 73528->73537 73529 1001fb9c 73532->73529 73535 10005f68 73533->73535 73534 1001f9b7 73535->73534 73536 10001100 70 API calls 73535->73536 73536->73535 73539 10005f68 73537->73539 73538 10001100 70 API calls 73538->73539 73539->73538 73540 1001f9b7 73539->73540 73541 6c36d159 73542 6c36d167 73541->73542 73543 6c36d162 73541->73543 73547 6c36d04e 73542->73547 73558 6c36d17c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 73543->73558 73548 6c36d05a ___scrt_is_nonwritable_in_current_image 73547->73548 73549 6c36d083 dllmain_raw 73548->73549 73553 6c36d07e __DllMainCRTStartup@12 73548->73553 73555 6c36d069 73548->73555 73550 6c36d09d dllmain_crt_dispatch 73549->73550 73549->73555 73550->73553 73550->73555 73551 6c36d0ef 73552 6c36d0f8 dllmain_crt_dispatch 73551->73552 73551->73555 73554 6c36d10b dllmain_raw 73552->73554 73552->73555 73553->73551 73559 6c36cf22 114 API calls 4 library calls 73553->73559 73554->73555 73557 6c36d0e4 dllmain_raw 73557->73551 73558->73542 73559->73557 73560 10005eb2 Sleep 73561 10006f17 77 API calls 73560->73561 73562 10005ec9 73561->73562 73563 10004274 73564 1001f814 CreateThread 73563->73564 73566 10006110 73564->73566 73566->73566 73567 1001f63d send 73568 6c362a4b 73569 6c36aa0e 3 API calls 73568->73569 73570 6c362a5b _Yarn 73569->73570 73571 6c361070 131 API calls 73570->73571 73573 6c362ac1 error_info_injector 73571->73573 73572 6c362b08 Sleep 73583 6c362b23 _Yarn _strlen 73572->73583 73573->73572 73574 6c364d58 73573->73574 73575 6c373a5e 29 API calls 73574->73575 73576 6c364d5d 73575->73576 73640 6c3526c0 30 API calls 3 library calls 73576->73640 73578 6c364d75 73642 6c3526c0 30 API calls 3 library calls 73578->73642 73579 6c364d69 73641 6c3526c0 30 API calls 3 library calls 73579->73641 73582 6c364d81 73643 6c3526c0 30 API calls 3 library calls 73582->73643 73583->73578 73587 6c36aa0e 3 API calls 73583->73587 73585 6c364d8d 73644 6c3526c0 30 API calls 3 library calls 73585->73644 73592 6c362c36 73587->73592 73588 6c364d99 73645 6c3526c0 30 API calls 3 library calls 73588->73645 73590 6c364da5 73646 6c3526c0 30 API calls 3 library calls 73590->73646 73592->73582 73619 6c360d50 73592->73619 73593 6c364db1 73647 6c3526c0 30 API calls 3 library calls 73593->73647 73595 6c364dbd 73648 6c3526c0 30 API calls 3 library calls 73595->73648 73598 6c364dc9 73649 6c3526c0 30 API calls 3 library calls 73598->73649 73600 6c364dd5 73601 6c362d71 _Yarn error_info_injector _strlen 73601->73574 73601->73585 73602 6c36aa0e 3 API calls 73601->73602 73603 6c362f73 73602->73603 73603->73588 73604 6c360d50 131 API calls 73603->73604 73605 6c36309a error_info_injector 73604->73605 73605->73574 73605->73590 73606 6c363267 73605->73606 73607 6c363297 73605->73607 73608 6c36aa0e 3 API calls 73606->73608 73609 6c36aa0e 3 API calls 73607->73609 73610 6c36327a _Yarn error_info_injector _strlen 73608->73610 73609->73610 73610->73574 73610->73593 73611 6c361070 131 API calls 73610->73611 73614 6c363daa error_info_injector 73611->73614 73612 6c363df7 Sleep 73613 6c36aa0e 3 API calls 73612->73613 73615 6c363e2e 73613->73615 73614->73574 73614->73612 73638 6c365e30 30 API calls 2 library calls 73615->73638 73617 6c363eba 73617->73574 73639 6c35b390 30 API calls 2 library calls 73617->73639 73626 6c360d94 73619->73626 73620 6c360e2c 73620->73601 73621 6c361035 73622 6c355880 30 API calls 73621->73622 73623 6c361041 73622->73623 73627 6c35b880 130 API calls 73623->73627 73624 6c360e70 73633 6c360e7c _Yarn 73624->73633 73650 6c365c90 30 API calls 2 library calls 73624->73650 73626->73620 73626->73621 73626->73624 73628 6c3610d5 73627->73628 73629 6c36112f 73628->73629 73632 6c3611c0 39 API calls 73628->73632 73630 6c35a100 72 API calls 73629->73630 73631 6c36114d std::ios_base::_Ios_base_dtor 73630->73631 73631->73601 73634 6c36110f 73632->73634 73633->73601 73635 6c3598c0 81 API calls 73634->73635 73636 6c361116 SetFileAttributesA 73635->73636 73636->73629 73638->73617 73639->73617 73640->73579 73641->73578 73642->73582 73643->73585 73644->73588 73645->73590 73646->73593 73647->73595 73648->73598 73649->73600 73650->73633

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 0 3d35430-3d354b7 call 3d3f707 call 3d46770 * 3 gethostname gethostbyname 9 3d354bd-3d35504 inet_ntoa call 3d403cf * 2 0->9 10 3d3555c-3d3569d MultiByteToWideChar * 2 GetLastInputInfo GetTickCount wsprintfW MultiByteToWideChar * 2 call 3d37490 GetSystemInfo wsprintfW call 3d36c50 call 3d36ee0 GetForegroundWindow 0->10 9->10 19 3d35506-3d35508 9->19 23 3d356b2-3d356c0 10->23 24 3d3569f-3d356ac GetWindowTextW 10->24 21 3d35510-3d3555a inet_ntoa call 3d403cf * 2 19->21 21->10 26 3d356c2 23->26 27 3d356cc-3d356f0 lstrlenW call 3d36d70 23->27 24->23 26->27 33 3d35702-3d35726 call 3d3f876 27->33 34 3d356f2-3d356ff call 3d3f876 27->34 39 3d35732-3d35756 lstrlenW call 3d36d70 33->39 40 3d35728 33->40 34->33 43 3d35768-3d357b9 GetModuleHandleW GetProcAddress 39->43 44 3d35758-3d35765 call 3d3f876 39->44 40->39 46 3d357c6-3d357cd GetSystemInfo 43->46 47 3d357bb-3d357c4 GetNativeSystemInfo 43->47 44->43 49 3d357d3-3d357e1 46->49 47->49 50 3d357e3-3d357eb 49->50 51 3d357ed-3d357f2 49->51 50->51 52 3d357f4 50->52 53 3d357f9-3d35820 wsprintfW call 3d36a70 GetCurrentProcessId 51->53 52->53 56 3d35822-3d3583c OpenProcess 53->56 57 3d35885-3d3588c call 3d36690 53->57 56->57 59 3d3583e-3d35853 K32GetProcessImageFileNameW 56->59 65 3d3589e-3d358ab 57->65 66 3d3588e-3d3589c 57->66 61 3d35855-3d3585c 59->61 62 3d3585e-3d35866 call 3d380f0 59->62 63 3d3587f CloseHandle 61->63 67 3d3586b-3d3586d 62->67 63->57 68 3d358ac-3d359a1 call 3d3f876 call 3d36490 call 3d36150 call 3d3fc0e GetTickCount call 3d4043c call 3d403a8 wsprintfW GetLocaleInfoW GetSystemDirectoryW GetCurrentHwProfileW 65->68 66->68 69 3d35878-3d3587e 67->69 70 3d3586f-3d35876 67->70 83 3d359a3-3d359c8 68->83 84 3d359ca-3d359e9 68->84 69->63 70->63 85 3d359ea-3d35a0f call 3d35a30 call 3d33160 83->85 84->85 88 3d35a11-3d35a2e call 3d3efff call 3d3f00a 85->88
                                                                                                APIs
                                                                                                  • Part of subcall function 03D3F707: _malloc.LIBCMT ref: 03D3F721
                                                                                                • _memset.LIBCMT ref: 03D3546C
                                                                                                • _memset.LIBCMT ref: 03D35485
                                                                                                • _memset.LIBCMT ref: 03D35495
                                                                                                • gethostname.WS2_32(?,00000032), ref: 03D354A3
                                                                                                • gethostbyname.WS2_32(?), ref: 03D354AD
                                                                                                • inet_ntoa.WS2_32 ref: 03D354C5
                                                                                                • _strcat_s.LIBCMT ref: 03D354D8
                                                                                                • _strcat_s.LIBCMT ref: 03D354F1
                                                                                                • inet_ntoa.WS2_32 ref: 03D3551A
                                                                                                • _strcat_s.LIBCMT ref: 03D3552D
                                                                                                • _strcat_s.LIBCMT ref: 03D35546
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 03D35573
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000002,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 03D35587
                                                                                                • GetLastInputInfo.USER32(?), ref: 03D3559A
                                                                                                • GetTickCount.KERNEL32 ref: 03D355A0
                                                                                                • wsprintfW.USER32 ref: 03D355D5
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 03D355E8
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000296,00000000), ref: 03D355FC
                                                                                                • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 03D35653
                                                                                                • wsprintfW.USER32 ref: 03D3566C
                                                                                                • GetForegroundWindow.USER32 ref: 03D35695
                                                                                                • GetWindowTextW.USER32(00000000,000006CE,000000FA), ref: 03D356AC
                                                                                                • lstrlenW.KERNEL32(000008CC), ref: 03D356D3
                                                                                                • lstrlenW.KERNEL32(00000994), ref: 03D35739
                                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,GetNativeSystemInfo), ref: 03D357AA
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 03D357B1
                                                                                                • GetNativeSystemInfo.KERNEL32(?), ref: 03D357C2
                                                                                                • GetSystemInfo.KERNEL32(?), ref: 03D357CD
                                                                                                • wsprintfW.USER32 ref: 03D35806
                                                                                                • GetCurrentProcessId.KERNEL32 ref: 03D35818
                                                                                                • OpenProcess.KERNEL32(00000400,00000000,00000000), ref: 03D3582E
                                                                                                • K32GetProcessImageFileNameW.KERNEL32(00000000,?,00000104), ref: 03D3584B
                                                                                                • CloseHandle.KERNEL32(03D55164), ref: 03D3587F
                                                                                                • GetTickCount.KERNEL32 ref: 03D358E9
                                                                                                • __time64.LIBCMT ref: 03D358F8
                                                                                                • __localtime64.LIBCMT ref: 03D3592F
                                                                                                • wsprintfW.USER32 ref: 03D35968
                                                                                                • GetLocaleInfoW.KERNEL32(00000800,00000002,00000F46,00000040), ref: 03D3597D
                                                                                                • GetSystemDirectoryW.KERNEL32(00001184,00000032), ref: 03D3598C
                                                                                                • GetCurrentHwProfileW.ADVAPI32(?), ref: 03D35999
                                                                                                  • Part of subcall function 03D380F0: GetLogicalDriveStringsW.KERNEL32(000003E8,?,75BF73E0,00000AD4,00000000), ref: 03D38132
                                                                                                  • Part of subcall function 03D380F0: lstrcmpiW.KERNEL32(?,A:\), ref: 03D38166
                                                                                                  • Part of subcall function 03D380F0: lstrcmpiW.KERNEL32(?,B:\), ref: 03D38176
                                                                                                  • Part of subcall function 03D380F0: QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 03D381A6
                                                                                                  • Part of subcall function 03D380F0: lstrlenW.KERNEL32(?), ref: 03D381B7
                                                                                                  • Part of subcall function 03D380F0: __wcsnicmp.LIBCMT ref: 03D381CE
                                                                                                  • Part of subcall function 03D380F0: lstrcpyW.KERNEL32(00000AD4,?), ref: 03D38204
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Info$ByteCharMultiSystemWide_strcat_swsprintf$Process_memsetlstrlen$CountCurrentHandleTickWindowinet_ntoalstrcmpi$AddressCloseDeviceDirectoryDriveFileForegroundImageInputLastLocaleLogicalModuleNameNativeOpenProcProfileQueryStringsText__localtime64__time64__wcsnicmp_mallocgethostbynamegethostnamelstrcpy
                                                                                                • String ID: %d min$1.0$2024.12. 8$AppEvents$GROUP$GetNativeSystemInfo$Network$REMARK$X86$X86 %s$kernel32.dll$x64$x86
                                                                                                • API String ID: 1101047656-235578928
                                                                                                • Opcode ID: b26b9442b08c01f612667f77a7297dbcc6135675fcbd1e8f0bd715f52b1f76c7
                                                                                                • Instruction ID: e53522db38479fa1d03e90debb9b375a423ec811dc1895255a07394ac4ac7bc9
                                                                                                • Opcode Fuzzy Hash: b26b9442b08c01f612667f77a7297dbcc6135675fcbd1e8f0bd715f52b1f76c7
                                                                                                • Instruction Fuzzy Hash: 58F1B5F6940304AFDB24EB64DC85FDBB7B9EF45700F004558F61AA7281EA70AA48CF65
                                                                                                APIs
                                                                                                • GetTempPathA.KERNEL32(00000104,?), ref: 6C357ED6
                                                                                                • _strlen.LIBCMT ref: 6C357EF2
                                                                                                • _strlen.LIBCMT ref: 6C3581F6
                                                                                                • _strlen.LIBCMT ref: 6C3587FD
                                                                                                • _strlen.LIBCMT ref: 6C358A61
                                                                                                • CopyFileA.KERNEL32(6C369F47,?,00000000), ref: 6C358C17
                                                                                                • _strlen.LIBCMT ref: 6C358C7B
                                                                                                • CopyFileA.KERNEL32(00000000,?,00000000), ref: 6C358E42
                                                                                                • _strlen.LIBCMT ref: 6C35848C
                                                                                                  • Part of subcall function 6C3511B0: _strlen.LIBCMT ref: 6C3511E3
                                                                                                • _strlen.LIBCMT ref: 6C358EDD
                                                                                                • OpenProcess.KERNEL32(00000410,00000000,00000000,00000000,?,00000001,00000040,00000001), ref: 6C359143
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 6C35914E
                                                                                                • CreateProcessA.KERNEL32 ref: 6C359199
                                                                                                • _strlen.LIBCMT ref: 6C3591C3
                                                                                                • CloseHandle.KERNEL32(?,?,00000002,00000040,00000001), ref: 6C359417
                                                                                                • CloseHandle.KERNEL32(?), ref: 6C35941F
                                                                                                • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C35946E
                                                                                                • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C3594BD
                                                                                                • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C359596
                                                                                                Strings
                                                                                                • set "ProcessName=, xrefs: 6C358151
                                                                                                • .pid, xrefs: 6C3592DF
                                                                                                • set "BackupProcessPath=, xrefs: 6C3581C3
                                                                                                • echo Process file not found, restoring from backup..., xrefs: 6C3586C9
                                                                                                • cmd.exe /B /c "%s", xrefs: 6C35899C
                                                                                                • if %ERRORLEVEL% neq 0 (, xrefs: 6C358769
                                                                                                • set "DLLPath=, xrefs: 6C358422
                                                                                                • tor., xrefs: 6C3592E7
                                                                                                • if not exist "%DLLPath%" (, xrefs: 6C358705
                                                                                                • start "" "%ProcessPath%", xrefs: 6C35877D
                                                                                                • set "ProcessPath=, xrefs: 6C358186
                                                                                                • Failed to create backup EXE. Please check the EXE path: , xrefs: 6C358E56
                                                                                                • copy /Y "%BackupDLLPath%" "%DLLPath%", xrefs: 6C35872D
                                                                                                • :CheckProcess, xrefs: 6C35813D
                                                                                                • goto CheckProcess, xrefs: 6C3587B9
                                                                                                • copy /Y "%BackupProcessPath%" "%ProcessPath%", xrefs: 6C3586DD
                                                                                                • @echo off, xrefs: 6C358129
                                                                                                • Failed to create backup DLL. Please check the DLL path: , xrefs: 6C358C2B
                                                                                                • tasklist /FI "IMAGENAME eq %ProcessName%" | findstr /I "%ProcessName%" >nul, xrefs: 6C358755
                                                                                                • b79l, xrefs: 6C358B3E
                                                                                                • if not exist "%ProcessPath%" (, xrefs: 6C3586BB
                                                                                                • set "BackupDLLPath=, xrefs: 6C358459
                                                                                                • timeout /t 30 /nobreak >nul, xrefs: 6C3587A5
                                                                                                • echo DLL file not found, restoring from backup..., xrefs: 6C358719
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen$CloseHandleIos_base_dtorstd::ios_base::_$CopyFileProcess$CreateOpenPathTemp
                                                                                                • String ID: copy /Y "%BackupDLLPath%" "%DLLPath%"$ copy /Y "%BackupProcessPath%" "%ProcessPath%"$ echo DLL file not found, restoring from backup...$ echo Process file not found, restoring from backup...$ start "" "%ProcessPath%"$.pid$:CheckProcess$@echo off$Failed to create backup DLL. Please check the DLL path: $Failed to create backup EXE. Please check the EXE path: $b79l$cmd.exe /B /c "%s"$goto CheckProcess$if %ERRORLEVEL% neq 0 ($if not exist "%DLLPath%" ($if not exist "%ProcessPath%" ($set "BackupDLLPath=$set "BackupProcessPath=$set "DLLPath=$set "ProcessName=$set "ProcessPath=$tasklist /FI "IMAGENAME eq %ProcessName%" | findstr /I "%ProcessName%" >nul$timeout /t 30 /nobreak >nul$tor.
                                                                                                • API String ID: 321380216-3707476029
                                                                                                • Opcode ID: 30e9a15902ef31d4de487e6fee93a9195b1e5693754cfed816a9f9910bdde6a9
                                                                                                • Instruction ID: 76d06deb41e1d10edf198075a83c21cdd4461d2e78c52944cf538e0a0cc1f703
                                                                                                • Opcode Fuzzy Hash: 30e9a15902ef31d4de487e6fee93a9195b1e5693754cfed816a9f9910bdde6a9
                                                                                                • Instruction Fuzzy Hash: 24E2AEB1510B408BE324CF34C884BA7B7E6BF95308F444A2DD49A8BB81E775E559CF92
                                                                                                APIs
                                                                                                • GetNativeSystemInfo.KERNEL32(?), ref: 02EB04AE
                                                                                                • VirtualAlloc.KERNEL32(?,?,00003000,00000004), ref: 02EB04DE
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3556845860.0000000002EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_2eb0000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocInfoNativeSystemVirtual
                                                                                                • String ID: A$A$Cach$F$Fu$G$Li$Lo$P$Rt$S$Syst$Ta$Vi$Via$a$a$a$a$b$b$ctio$ee$fo$iv$mI$o$oc$otec$p$st$t$tNat$tu$tu$ucti$ushI$yA
                                                                                                • API String ID: 2032221330-2899676511
                                                                                                • Opcode ID: 82ef88a58992c726dca534e4f3eff6f5ce2a19202078a525a2214f4ed1b422dd
                                                                                                • Instruction ID: cdecba79d141958df7d0edf7cd11b10bdcb1631ebeafb2bc0721f404c43e3ac5
                                                                                                • Opcode Fuzzy Hash: 82ef88a58992c726dca534e4f3eff6f5ce2a19202078a525a2214f4ed1b422dd
                                                                                                • Instruction Fuzzy Hash: 94629B715483858FD732CF24C840BABBBE4FF95708F04992DE9C99B251E770A948CB96

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 726 3d3df10-3d3df72 call 3d40542 Sleep 729 3d3df97-3d3df9d 726->729 730 3d3df74-3d3df91 call 3d3f707 call 3d3fa29 CloseHandle 726->730 732 3d3dfa4-3d3e019 GetLocalTime wsprintfW SetUnhandledExceptionFilter call 3d3fa29 CloseHandle call 3d3f707 729->732 733 3d3df9f call 3d37620 729->733 730->729 742 3d3e01b-3d3e026 call 3d32c90 732->742 743 3d3e028 732->743 733->732 744 3d3e02c-3d3e046 call 3d3f707 742->744 743->744 749 3d3e054 744->749 750 3d3e048-3d3e049 call 3d39730 744->750 752 3d3e058 749->752 753 3d3e04e-3d3e052 750->753 754 3d3e063-3d3e06f call 3d3ce00 752->754 753->752 757 3d3e071-3d3e0b7 call 3d3f876 * 2 754->757 758 3d3e0b9-3d3e0fa call 3d3f876 * 2 754->758 767 3d3e100-3d3e110 757->767 758->767 768 3d3e152-3d3e15a 767->768 769 3d3e112-3d3e14c call 3d3ce00 call 3d3f876 * 2 767->769 771 3d3e162-3d3e169 768->771 772 3d3e15c-3d3e15e 768->772 769->768 773 3d3e177-3d3e17b 771->773 774 3d3e16b-3d3e175 771->774 772->771 776 3d3e181-3d3e187 773->776 774->776 778 3d3e1c6-3d3e1ee call 3d40542 call 3d32da0 776->778 779 3d3e189-3d3e1a3 EnumWindows 776->779 787 3d3e200-3d3e2ac call 3d40542 CreateEventA call 3d3f876 call 3d3ca70 778->787 788 3d3e1f0-3d3e1fb Sleep 778->788 779->778 781 3d3e1a5-3d3e1c4 Sleep EnumWindows 779->781 781->778 781->781 796 3d3e2b7-3d3e2bd 787->796 788->754 797 3d3e318-3d3e32c call 3d35430 796->797 798 3d3e2bf-3d3e2f3 Sleep RegOpenKeyExW 796->798 802 3d3e331-3d3e337 797->802 799 3d3e311-3d3e316 798->799 800 3d3e2f5-3d3e30b RegQueryValueExW 798->800 799->796 799->797 800->799 803 3d3e36a-3d3e370 802->803 804 3d3e339-3d3e365 CloseHandle 802->804 805 3d3e372-3d3e38e call 3d3fa29 803->805 806 3d3e390 803->806 804->754 808 3d3e394 805->808 806->808 811 3d3e396-3d3e39d 808->811 812 3d3e39f-3d3e3ae Sleep 811->812 813 3d3e40d-3d3e420 811->813 812->811 814 3d3e3b0-3d3e3b7 812->814 817 3d3e432-3d3e46c call 3d40542 Sleep CloseHandle 813->817 818 3d3e422-3d3e42c WaitForSingleObject CloseHandle 813->818 814->813 815 3d3e3b9-3d3e3cb 814->815 822 3d3e3dd-3d3e408 Sleep CloseHandle 815->822 823 3d3e3cd-3d3e3d7 WaitForSingleObject CloseHandle 815->823 817->754 818->817 822->754 823->822
                                                                                                APIs
                                                                                                  • Part of subcall function 03D40542: __fassign.LIBCMT ref: 03D40538
                                                                                                • Sleep.KERNEL32(00000000), ref: 03D3DF64
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 03D3DF91
                                                                                                • GetLocalTime.KERNEL32(?), ref: 03D3DFA9
                                                                                                • wsprintfW.USER32 ref: 03D3DFE0
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(03D375B0), ref: 03D3DFEE
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 03D3E007
                                                                                                  • Part of subcall function 03D3F707: _malloc.LIBCMT ref: 03D3F721
                                                                                                • EnumWindows.USER32(03D35CC0,?), ref: 03D3E19D
                                                                                                • Sleep.KERNEL32(00004E20,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 03D3E1AA
                                                                                                • EnumWindows.USER32(03D35CC0,?), ref: 03D3E1BE
                                                                                                • Sleep.KERNEL32(00000BB8), ref: 03D3E1F5
                                                                                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 03D3E241
                                                                                                • Sleep.KERNEL32(00000FA0), ref: 03D3E2C4
                                                                                                • RegOpenKeyExW.KERNEL32(80000001,Console,00000000,00020019,?), ref: 03D3E2EB
                                                                                                • RegQueryValueExW.KERNEL32(?,IpDatespecial,00000000,?,00000000,?), ref: 03D3E30B
                                                                                                • CloseHandle.KERNEL32(?), ref: 03D3E35D
                                                                                                • Sleep.KERNEL32(000003E8,?,?), ref: 03D3E3A4
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?), ref: 03D3E3D0
                                                                                                • CloseHandle.KERNEL32(?,?,?), ref: 03D3E3D7
                                                                                                • Sleep.KERNEL32(000003E8,?,?), ref: 03D3E3E2
                                                                                                • CloseHandle.KERNEL32(?), ref: 03D3E400
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?), ref: 03D3E425
                                                                                                • CloseHandle.KERNEL32(?,?,?), ref: 03D3E42C
                                                                                                • Sleep.KERNEL32(00000000,?,?,?), ref: 03D3E446
                                                                                                • CloseHandle.KERNEL32(?), ref: 03D3E464
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseHandleSleep$EnumObjectSingleWaitWindows$CreateEventExceptionFilterLocalOpenQueryTimeUnhandledValue__fassign_mallocwsprintf
                                                                                                • String ID: %4d.%2d.%2d-%2d:%2d:%2d$156.251.17.243$156.251.17.243$156.251.17.243$156.251.17.243$17093$17093$17094$17095$Console$IpDatespecial
                                                                                                • API String ID: 1511462596-327302196
                                                                                                • Opcode ID: 29b454360fa4ed015d24cfb28f054b40b862a714ebbf77cfd221076266b50911
                                                                                                • Instruction ID: ac3ec4c6246f756372952e19bfa8886c84c327720922fdfb6ad7425e0a30b105
                                                                                                • Opcode Fuzzy Hash: 29b454360fa4ed015d24cfb28f054b40b862a714ebbf77cfd221076266b50911
                                                                                                • Instruction Fuzzy Hash: 06D1E7B69483409FD320FF64DC46E6AB7A9FBC6B04F044A1DF56596384D7709A08CB63

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • GetDesktopWindow.USER32 ref: 03D3BC8F
                                                                                                • GetDC.USER32(00000000), ref: 03D3BC9C
                                                                                                • CreateCompatibleDC.GDI32(00000000), ref: 03D3BCA2
                                                                                                • GetDC.USER32(00000000), ref: 03D3BCAD
                                                                                                • GetDeviceCaps.GDI32(00000000,00000008), ref: 03D3BCBA
                                                                                                • GetDeviceCaps.GDI32(00000000,00000076), ref: 03D3BCC2
                                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 03D3BCD3
                                                                                                • GetSystemMetrics.USER32(0000004E), ref: 03D3BCF8
                                                                                                • GetSystemMetrics.USER32(0000004F), ref: 03D3BD26
                                                                                                • GetSystemMetrics.USER32(0000004C), ref: 03D3BD78
                                                                                                • GetSystemMetrics.USER32(0000004D), ref: 03D3BD8D
                                                                                                • CreateCompatibleBitmap.GDI32(?,?,00000000), ref: 03D3BDA6
                                                                                                • SelectObject.GDI32(?,00000000), ref: 03D3BDB4
                                                                                                • SetStretchBltMode.GDI32(?,00000003), ref: 03D3BDC0
                                                                                                • GetSystemMetrics.USER32(0000004F), ref: 03D3BDCD
                                                                                                • GetSystemMetrics.USER32(0000004E), ref: 03D3BDE0
                                                                                                • StretchBlt.GDI32(?,00000000,00000000,?,00000000,?,?,?,00000000,?,00000000), ref: 03D3BE07
                                                                                                • _memset.LIBCMT ref: 03D3BE7A
                                                                                                • GetDIBits.GDI32(?,?,00000000,00000000,?,00000028,00000000), ref: 03D3BE97
                                                                                                • _memset.LIBCMT ref: 03D3BEAF
                                                                                                  • Part of subcall function 03D3F707: _malloc.LIBCMT ref: 03D3F721
                                                                                                • DeleteObject.GDI32(?), ref: 03D3BF23
                                                                                                • DeleteObject.GDI32(?), ref: 03D3BF2D
                                                                                                • ReleaseDC.USER32(00000000,?), ref: 03D3BF39
                                                                                                • DeleteObject.GDI32(?), ref: 03D3BFDF
                                                                                                • DeleteObject.GDI32(?), ref: 03D3BFE9
                                                                                                • ReleaseDC.USER32(00000000,?), ref: 03D3BFF5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: MetricsSystem$Object$Delete$Release$CapsCompatibleCreateDeviceStretch_memset$BitmapBitsDesktopModeSelectWindow_malloc
                                                                                                • String ID: ($6$gfff$gfff
                                                                                                • API String ID: 3293817703-713438465
                                                                                                • Opcode ID: db58d1dbef851d44c2fffd19f8d37cd680f738d1d3199e43be33ca4f39408084
                                                                                                • Instruction ID: 2fd71d44b9902882ed8bd9b6beb26001cb1465b27be4a62be0aaec4a4595e81e
                                                                                                • Opcode Fuzzy Hash: db58d1dbef851d44c2fffd19f8d37cd680f738d1d3199e43be33ca4f39408084
                                                                                                • Instruction Fuzzy Hash: A0D16CB6D01308AFDB14EFE9E885A9EBBB9FF49700F144529F505AB340D770A905CBA1

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 963 6c356720-6c356728 964 6c35676d-6c35676f 963->964 965 6c35672a-6c356734 963->965 966 6c356736-6c356748 965->966 967 6c35674f-6c356766 call 6c36aa43 965->967 968 6c356770-6c35680e call 6c373a5e CryptAcquireContextW 966->968 969 6c35674a-6c35674d 966->969 967->964 975 6c356814-6c35684e 968->975 976 6c356e09-6c356e67 call 6c36d87e call 6c36d2b3 968->976 969->967 977 6c356850-6c356858 975->977 1001 6c356e6a-6c356e8b call 6c356720 * 2 976->1001 979 6c35685e-6c356874 CryptCreateHash 977->979 980 6c3569e8-6c356a08 CryptReleaseContext 977->980 984 6c356d1c-6c356d88 CryptReleaseContext call 6c36d87e call 6c36d2b3 979->984 985 6c35687a-6c356882 979->985 982 6c356a2f-6c356a38 980->982 983 6c356a0a-6c356a2d call 6c357d60 call 6c36f020 980->983 990 6c356a64-6c356a76 call 6c36f020 982->990 991 6c356a3a-6c356a5a call 6c36f020 * 2 982->991 1022 6c356a5d-6c356a62 983->1022 984->1001 988 6c356884-6c356895 CryptHashData 985->988 989 6c35689b-6c3568a1 985->989 988->989 997 6c356d8d-6c356e02 CryptDestroyHash CryptReleaseContext call 6c36d87e call 6c36d2b3 988->997 998 6c3568a3-6c3568a6 989->998 999 6c3568ad-6c3568b3 989->999 1012 6c356a79-6c356a93 990->1012 991->1022 997->1001 998->999 1007 6c3568b5 999->1007 1008 6c3568b7-6c3568d6 call 6c357650 999->1008 1007->1008 1024 6c3568e7-6c3568fe CryptHashData 1008->1024 1025 6c3568d8-6c3568e2 call 6c357840 1008->1025 1019 6c356a95-6c356aaf call 6c357d60 1012->1019 1020 6c356ab1-6c356aba 1012->1020 1041 6c356ae3-6c356aed call 6c36f020 1019->1041 1029 6c356abc-6c356ae2 call 6c36f020 1020->1029 1030 6c356aef-6c356afc call 6c36f020 1020->1030 1022->1012 1033 6c356904-6c356929 CryptGetHashParam 1024->1033 1034 6c356c5a-6c356cb6 CryptDestroyHash CryptReleaseContext call 6c36d87e call 6c36d2b3 1024->1034 1025->1024 1029->1041 1043 6c356aff-6c356b07 1030->1043 1038 6c35692f-6c35694a 1033->1038 1039 6c356cbb-6c356d17 CryptDestroyHash CryptReleaseContext call 6c36d87e call 6c36d2b3 1033->1039 1034->1001 1044 6c356960 1038->1044 1045 6c35694c 1038->1045 1039->1001 1041->1043 1049 6c356b35-6c356b3a 1043->1049 1050 6c356b09-6c356b13 1043->1050 1053 6c356980-6c3569a1 CryptGetHashParam CryptDestroyHash 1044->1053 1054 6c356962-6c356969 1044->1054 1051 6c35694e-6c356951 1045->1051 1060 6c356b76-6c356b7e 1049->1060 1061 6c356b3c-6c356b46 1049->1061 1057 6c356b15-6c356b20 1050->1057 1058 6c356b2b-6c356b32 call 6c36aa43 1050->1058 1051->1053 1065 6c3569a7-6c3569cf call 6c357b50 1053->1065 1066 6c356c02-6c356c55 CryptReleaseContext call 6c36d87e call 6c36d2b3 1053->1066 1062 6c3569d4-6c3569e3 call 6c36f5a0 1054->1062 1063 6c35696b-6c356978 call 6c357a40 1054->1063 1071 6c356e04 call 6c373a5e 1057->1071 1072 6c356b26-6c356b29 1057->1072 1058->1049 1068 6c356b80-6c356b8d 1060->1068 1069 6c356baf-6c356bb4 1060->1069 1074 6c356b65-6c356b6f call 6c36aa43 1061->1074 1075 6c356b48-6c356b53 1061->1075 1062->1051 1063->1053 1065->977 1066->1001 1081 6c356ba5-6c356bac call 6c36aa43 1068->1081 1082 6c356b8f-6c356b9a 1068->1082 1084 6c356bb6-6c356bc0 1069->1084 1085 6c356bee-6c356c01 1069->1085 1071->976 1072->1058 1074->1060 1075->1071 1088 6c356b59-6c356b63 1075->1088 1081->1069 1082->1071 1092 6c356ba0-6c356ba3 1082->1092 1094 6c356be4-6c356beb call 6c36aa43 1084->1094 1095 6c356bc2-6c356bd9 1084->1095 1088->1074 1092->1081 1094->1085 1095->1071 1099 6c356bdf-6c356be2 1095->1099 1099->1094
                                                                                                APIs
                                                                                                • CryptAcquireContextW.ADVAPI32 ref: 6C356806
                                                                                                • CryptCreateHash.ADVAPI32(00000000,00008003,00000000,00000000,00000000), ref: 6C35686C
                                                                                                • CryptHashData.ADVAPI32(00000000,00000000,00000000,00000000), ref: 6C35688D
                                                                                                • CryptHashData.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 6C3568F6
                                                                                                • CryptGetHashParam.ADVAPI32(00000000,00000004,00000000,00000004,00000000), ref: 6C356921
                                                                                                • CryptGetHashParam.ADVAPI32(00000000,00000002,00000000,00000000,00000000), ref: 6C35698E
                                                                                                • CryptDestroyHash.ADVAPI32(00000000), ref: 6C356999
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Crypt$Hash$DataParam$AcquireContextCreateDestroy
                                                                                                • String ID: P~5l$g99l$o89l
                                                                                                • API String ID: 2113037386-4058109380
                                                                                                • Opcode ID: 76bfcff349b6b16e4a525c0e6c03b7717d00021bfa85d448c0d31b53ed59ba98
                                                                                                • Instruction ID: 6d130e54158737667f60498bf5600dd04dc81b494b5c498aeca71478ee1e2d01
                                                                                                • Opcode Fuzzy Hash: 76bfcff349b6b16e4a525c0e6c03b7717d00021bfa85d448c0d31b53ed59ba98
                                                                                                • Instruction Fuzzy Hash: C32278B2E002189FDF14CFA4CD45BEEBBB9BF49304F144158E505A7740EB7699588FA1

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1102 6c356eb0-6c356f1b call 6c356520 1105 6c356f65-6c356fd6 call 6c356780 CryptAcquireContextW 1102->1105 1106 6c356f1d-6c356f2e 1102->1106 1112 6c3573c2-6c357425 call 6c36d87e call 6c36d2b3 1105->1112 1113 6c356fdc-6c35702c CryptImportKey 1105->1113 1106->1105 1107 6c356f30-6c356f62 call 6c357b50 call 6c36f020 1106->1107 1107->1105 1134 6c3575cc-6c3575d3 call 6c3526c0 1112->1134 1116 6c357032-6c357044 CryptSetKeyParam 1113->1116 1117 6c35742a-6c35748f CryptReleaseContext call 6c36d87e call 6c36d2b3 1113->1117 1121 6c357494-6c357502 CryptDestroyKey CryptReleaseContext call 6c36d87e call 6c36d2b3 1116->1121 1122 6c35704a-6c35706a CryptSetKeyParam 1116->1122 1117->1134 1121->1134 1126 6c357507-6c357572 CryptDestroyKey CryptReleaseContext call 6c36d87e call 6c36d2b3 1122->1126 1127 6c357070-6c35709e 1122->1127 1126->1134 1132 6c3570a0-6c3570a2 1127->1132 1133 6c3570d3-6c3570d5 1127->1133 1135 6c3575d8-6c3575f3 call 6c357640 call 6c356720 1132->1135 1136 6c3570a8-6c3570b1 1132->1136 1138 6c357115-6c357141 CryptDecrypt CryptDestroyKey CryptReleaseContext 1133->1138 1134->1135 1141 6c3570d7-6c3570e0 call 6c36aa0e 1136->1141 1142 6c3570b3-6c3570d1 call 6c36aa0e 1136->1142 1146 6c357574-6c3575c9 call 6c36d87e call 6c36d2b3 1138->1146 1147 6c357147-6c357156 1138->1147 1165 6c3570e2-6c357112 call 6c36f020 1141->1165 1142->1165 1146->1134 1153 6c357161 1147->1153 1154 6c357158-6c35715f 1147->1154 1160 6c3571a8-6c3571c4 1153->1160 1161 6c357163-6c35716a 1153->1161 1154->1160 1160->1134 1166 6c3571ca-6c3571cd 1160->1166 1162 6c35716c-6c357186 call 6c357a40 1161->1162 1163 6c357188-6c3571a6 call 6c36f5a0 1161->1163 1162->1160 1163->1160 1165->1138 1171 6c3571cf-6c3571e8 call 6c36f020 1166->1171 1172 6c3571ea-6c357210 1166->1172 1184 6c35725a-6c357262 1171->1184 1178 6c357212-6c357229 call 6c36aa0e 1172->1178 1179 6c35722b-6c357237 call 6c36aa0e 1172->1179 1186 6c357239-6c357258 call 6c36f020 1178->1186 1179->1186 1187 6c357264-6c35726e 1184->1187 1188 6c35729b-6c3572a0 1184->1188 1186->1184 1190 6c357291-6c357298 call 6c36aa43 1187->1190 1191 6c357270-6c357286 1187->1191 1192 6c3572a2-6c3572b6 1188->1192 1193 6c3572eb-6c3572f0 1188->1193 1190->1188 1197 6c3573bd call 6c373a5e 1191->1197 1198 6c35728c-6c35728f 1191->1198 1200 6c3572b8-6c3572cf 1192->1200 1201 6c3572da-6c3572e4 call 6c36aa43 1192->1201 1195 6c357336-6c35733b 1193->1195 1196 6c3572f2-6c357306 1193->1196 1206 6c35733d-6c357347 1195->1206 1207 6c357378-6c35737d 1195->1207 1203 6c357325-6c35732f call 6c36aa43 1196->1203 1204 6c357308-6c357313 1196->1204 1197->1112 1198->1190 1200->1197 1209 6c3572d5-6c3572d8 1200->1209 1201->1193 1203->1195 1204->1197 1213 6c357319-6c357323 1204->1213 1215 6c357367-6c357371 call 6c36aa43 1206->1215 1216 6c357349-6c357360 1206->1216 1211 6c3573a7-6c3573bc 1207->1211 1212 6c35737f-6c357389 1207->1212 1209->1201 1217 6c35739d-6c3573a4 call 6c36aa43 1212->1217 1218 6c35738b-6c357396 1212->1218 1213->1203 1215->1207 1216->1197 1220 6c357362-6c357365 1216->1220 1217->1211 1218->1197 1223 6c357398-6c35739b 1218->1223 1220->1215 1223->1217
                                                                                                APIs
                                                                                                  • Part of subcall function 6C356520: CryptStringToBinaryA.CRYPT32(n5l,00000000,00000001,00000000,00000000,00000000,00000000), ref: 6C356570
                                                                                                  • Part of subcall function 6C356520: CryptStringToBinaryA.CRYPT32(n5l,00000000,00000001,00000000,00000000,00000000,00000000), ref: 6C35660E
                                                                                                • CryptAcquireContextW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000008), ref: 6C356FCE
                                                                                                • CryptImportKey.ADVAPI32(00000000,00000208,00000014,00000000,00000000,00000000), ref: 6C357024
                                                                                                • CryptSetKeyParam.ADVAPI32(00000000,00000001,00000000,00000000), ref: 6C35703C
                                                                                                • CryptSetKeyParam.ADVAPI32(00000000,00000004,00000001,00000000), ref: 6C357062
                                                                                                • CryptDecrypt.ADVAPI32(00000000,00000000,00000001,00000000,00000000,?), ref: 6C357123
                                                                                                • CryptDestroyKey.ADVAPI32(00000000), ref: 6C35712E
                                                                                                • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 6C357139
                                                                                                • ___std_exception_copy.LIBVCRUNTIME ref: 6C3573FF
                                                                                                  • Part of subcall function 6C36D2B3: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?), ref: 6C36D314
                                                                                                  • Part of subcall function 6C3526C0: _strlen.LIBCMT ref: 6C352718
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Crypt$BinaryContextParamString$AcquireDecryptDestroyExceptionImportRaiseRelease___std_exception_copy_strlen
                                                                                                • String ID: 499l$O99l$Salt$ed__$o89l
                                                                                                • API String ID: 1577403515-3977143112
                                                                                                • Opcode ID: fb8df7eee9a6894bfec2bc6ab564c56e50d90fa44603aea23e9dfbe94b6a95c4
                                                                                                • Instruction ID: 57b468aed1df44217cd3b80108ff0e7ca2f9a6ffbbe7b562035a7755496db334
                                                                                                • Opcode Fuzzy Hash: fb8df7eee9a6894bfec2bc6ab564c56e50d90fa44603aea23e9dfbe94b6a95c4
                                                                                                • Instruction Fuzzy Hash: CB22E1B2D102189FEB14CFA4CC45BEEBBB5FF45314F148159E809A7780EB759A488FA1
                                                                                                APIs
                                                                                                • GetLogicalDriveStringsW.KERNEL32(000003E8,?,75BF73E0,00000AD4,00000000), ref: 03D38132
                                                                                                • lstrcmpiW.KERNEL32(?,A:\), ref: 03D38166
                                                                                                • lstrcmpiW.KERNEL32(?,B:\), ref: 03D38176
                                                                                                • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 03D381A6
                                                                                                • lstrlenW.KERNEL32(?), ref: 03D381B7
                                                                                                • __wcsnicmp.LIBCMT ref: 03D381CE
                                                                                                • lstrcpyW.KERNEL32(00000AD4,?), ref: 03D38204
                                                                                                • lstrcpyW.KERNEL32(?,?), ref: 03D38228
                                                                                                • lstrcatW.KERNEL32(?,00000000), ref: 03D38233
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: lstrcmpilstrcpy$DeviceDriveLogicalQueryStrings__wcsnicmplstrcatlstrlen
                                                                                                • String ID: A:\$B:\
                                                                                                • API String ID: 950920757-1009255891
                                                                                                • Opcode ID: 609ed3e478698530effc046395194ad098bbde1187988142cd435c734815293a
                                                                                                • Instruction ID: 052327fe27adabcab36804552971021be012fdcb1aba514aa8bc293cd7d5e6ad
                                                                                                • Opcode Fuzzy Hash: 609ed3e478698530effc046395194ad098bbde1187988142cd435c734815293a
                                                                                                • Instruction Fuzzy Hash: A6416476A012189BDB20DF64DD84BEEB3BCEF45710F044599E90AA7244E770EE0DDBA4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: $'$jIk$6
                                                                                                • API String ID: 0-3404073836
                                                                                                • Opcode ID: 35aae919c54773ca8a754c1dfb37a2bf8940e93550c72f94958906ed323100fc
                                                                                                • Instruction ID: 58ce7fbaded738cf8043a32ecc1da916ccae4cb1c1989ee72a35a3544faf19dd
                                                                                                • Opcode Fuzzy Hash: 35aae919c54773ca8a754c1dfb37a2bf8940e93550c72f94958906ed323100fc
                                                                                                • Instruction Fuzzy Hash: 53C2CD71D102688BEB24CF25CC947EDBBB2BF46308F158298D4496BB85DB715AC8CF91
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: $,$jIk$6
                                                                                                • API String ID: 4218353326-1611763776
                                                                                                • Opcode ID: 33072046d92c3b23b961a467dfb6951f32e92b34a6489304aa2a337558573442
                                                                                                • Instruction ID: cf65811e2701b93a8193182234b91a0d2ea747188dd63d8cdea6606e04813c2e
                                                                                                • Opcode Fuzzy Hash: 33072046d92c3b23b961a467dfb6951f32e92b34a6489304aa2a337558573442
                                                                                                • Instruction Fuzzy Hash: 8CB2CD71D102688BEB24CF25CC947EDBBB2BF46308F158298D449ABB85DB715AC4CF91
                                                                                                APIs
                                                                                                  • Part of subcall function 03D35320: InterlockedDecrement.KERNEL32(00000008), ref: 03D3536F
                                                                                                  • Part of subcall function 03D35320: SysFreeString.OLEAUT32(00000000), ref: 03D35384
                                                                                                  • Part of subcall function 03D35320: SysAllocString.OLEAUT32(03D55148), ref: 03D353D5
                                                                                                • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,?,03D55148,03D369A4,03D55148,00000000,75BF73E0), ref: 03D367F4
                                                                                                • GetLastError.KERNEL32 ref: 03D367FE
                                                                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 03D36816
                                                                                                • HeapAlloc.KERNEL32(00000000), ref: 03D3681D
                                                                                                • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,?,?), ref: 03D3683F
                                                                                                • LookupAccountSidW.ADVAPI32(00000000,?,?,00000100,?,00000100,?), ref: 03D36871
                                                                                                • GetLastError.KERNEL32 ref: 03D3687B
                                                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 03D368E6
                                                                                                • HeapFree.KERNEL32(00000000), ref: 03D368ED
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Heap$AllocErrorFreeInformationLastProcessStringToken$AccountDecrementInterlockedLookup
                                                                                                • String ID: NONE_MAPPED
                                                                                                • API String ID: 1317816589-2950899194
                                                                                                • Opcode ID: a6a78f382e56cf45c11d8e2e172698c35d9bcd0540558a4ea3f3f0f08a82a859
                                                                                                • Instruction ID: 5052795edc5fdec48dedc2b291a3de33e2fd9c03d033ee67c739990a101e36d1
                                                                                                • Opcode Fuzzy Hash: a6a78f382e56cf45c11d8e2e172698c35d9bcd0540558a4ea3f3f0f08a82a859
                                                                                                • Instruction Fuzzy Hash: 9C4188B6A00318AFDB20DB64DC84FEE777DEB8A700F404598F609A7140DA709E898F75
                                                                                                APIs
                                                                                                • GetDriveTypeW.KERNEL32(?,74DEDF80,00000000,75BF73E0), ref: 03D36C8B
                                                                                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 03D36CAA
                                                                                                • _memset.LIBCMT ref: 03D36CE1
                                                                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 03D36CF4
                                                                                                • swprintf.LIBCMT ref: 03D36D39
                                                                                                • swprintf.LIBCMT ref: 03D36D4C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: swprintf$DiskDriveFreeGlobalMemorySpaceStatusType_memset
                                                                                                • String ID: %sFree%d Gb $:$@$HDD:%d
                                                                                                • API String ID: 3202570353-3501811827
                                                                                                • Opcode ID: 08ac6349cc274600a00228909088b86328b61528ed5d8137e7e5c5f6b4514030
                                                                                                • Instruction ID: 8c52267c98aaa2ab12ae92cdc0dadc89e22a4889cc095449c21639c9e6d9583a
                                                                                                • Opcode Fuzzy Hash: 08ac6349cc274600a00228909088b86328b61528ed5d8137e7e5c5f6b4514030
                                                                                                • Instruction Fuzzy Hash: 80315EB6E0030C9BDB14DFE5DC45BEEB7B9FB49700F50421DE91AA7241D6746905CB50
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: $,$jIk
                                                                                                • API String ID: 4218353326-2946808363
                                                                                                • Opcode ID: 6981441c7ec7932385ddb91d0c54d98ac3e1c19543942318fc918e7912f9155c
                                                                                                • Instruction ID: a35db618e2d3161dcdcc09ead580cee24921633405965f7c0c36ca23cfd04437
                                                                                                • Opcode Fuzzy Hash: 6981441c7ec7932385ddb91d0c54d98ac3e1c19543942318fc918e7912f9155c
                                                                                                • Instruction Fuzzy Hash: 89A2CD71D102688BEB24CF25CC947EDBBB2BF46308F158298D449ABA85DB715EC4CF91
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: $,$jIk
                                                                                                • API String ID: 4218353326-2946808363
                                                                                                • Opcode ID: a90a2d9121b300a10a9141698bc042c2470f23b030e06093a7334c34084d359a
                                                                                                • Instruction ID: 74604d01f62ca4f7051d090477628c19ba8af30f87a92b5565bd61eedf4af9d6
                                                                                                • Opcode Fuzzy Hash: a90a2d9121b300a10a9141698bc042c2470f23b030e06093a7334c34084d359a
                                                                                                • Instruction Fuzzy Hash: 49B2CD71D102688BEB24CF25CC947EDBBB2BF46308F158298D449ABA85DB715EC4CF91
                                                                                                APIs
                                                                                                • CreateDXGIFactory.DXGI(03D5579C,?,E832A845,74DEDF80,00000000,75BF73E0), ref: 03D36F4A
                                                                                                • swprintf.LIBCMT ref: 03D3711E
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 03D371C7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateFactoryXinvalid_argumentstd::_swprintf
                                                                                                • String ID: %s%s %d %d $%s%s %d*%d $vector<T> too long
                                                                                                • API String ID: 3803070356-257307503
                                                                                                • Opcode ID: dec22b9dc41a8daeca446b79dfb413a3ff57f1b2c40d82b897b2c30f1fdef33e
                                                                                                • Instruction ID: 175844b5dfdfeb03a0bd66f9f0f9ed25f08d8536acb2e0e73d16362b4837f86e
                                                                                                • Opcode Fuzzy Hash: dec22b9dc41a8daeca446b79dfb413a3ff57f1b2c40d82b897b2c30f1fdef33e
                                                                                                • Instruction Fuzzy Hash: 78E174B1E006259FDF24CE64CC80BEEB3B5FB46700F1442E9E959A7284D770AE858F91
                                                                                                APIs
                                                                                                  • Part of subcall function 6C361070: SetFileAttributesA.KERNEL32(?,00000001,?,0000000A,00000000,?,00000022,00000040,00000001), ref: 6C361124
                                                                                                  • Part of subcall function 6C361070: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C36115F
                                                                                                • Sleep.KERNEL32(000000C8), ref: 6C362B0D
                                                                                                • _strlen.LIBCMT ref: 6C362B53
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesFileIos_base_dtorSleep_strlenstd::ios_base::_
                                                                                                • String ID: $,$jIk
                                                                                                • API String ID: 3921760320-2946808363
                                                                                                • Opcode ID: 1835a1463d4ddf6e1588ca2ed03227142b4c02ade42b39e40f6782f84ec6f47d
                                                                                                • Instruction ID: 07b71f2e032246ac4524bedcccdeec185f1797e660131d96354f8036f1129272
                                                                                                • Opcode Fuzzy Hash: 1835a1463d4ddf6e1588ca2ed03227142b4c02ade42b39e40f6782f84ec6f47d
                                                                                                • Instruction Fuzzy Hash: 99A2CB71D102688BEB24CF25CC947EDBBB2BF46308F158298D449ABA85DB715EC4CF91
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: $,$SPV$jIk
                                                                                                • API String ID: 4218353326-3917736278
                                                                                                • Opcode ID: 8f1dc0e72407a631ff1e6e506e6270808504b0ce4ef36ab2fb82f1c6354f2878
                                                                                                • Instruction ID: d1774e9dcfb863c6e3fa5db3e078af366212b088c780d6f73ef9342a48456e30
                                                                                                • Opcode Fuzzy Hash: 8f1dc0e72407a631ff1e6e506e6270808504b0ce4ef36ab2fb82f1c6354f2878
                                                                                                • Instruction Fuzzy Hash: 5B92CC71D102688BEB24CF65CC943EDBBB2BF46308F158298D449ABA85DB715EC4CF91
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,GetNativeSystemInfo,?,?,?,?,?,?,?,?,03D37523), ref: 03D3743D
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 03D37444
                                                                                                • GetNativeSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,03D37523), ref: 03D37452
                                                                                                • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,03D37523), ref: 03D3745A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InfoSystem$AddressHandleModuleNativeProc
                                                                                                • String ID: GetNativeSystemInfo$kernel32.dll
                                                                                                • API String ID: 3433367815-192647395
                                                                                                • Opcode ID: 036b42e125acd63040f686d1827d20fe35cf2bc763a657af9e6bb3857dfe0f34
                                                                                                • Instruction ID: 78876777462c15e8fdd1d7127f56a16bd4e16a197824d971eedf6e1792cdcf33
                                                                                                • Opcode Fuzzy Hash: 036b42e125acd63040f686d1827d20fe35cf2bc763a657af9e6bb3857dfe0f34
                                                                                                • Instruction Fuzzy Hash: 19014BB1D003099FCF50EFB89944AAEBBF5EB09700F5449A9E959E3240EB359A04CF61
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 03D3607C
                                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00000000), ref: 03D36088
                                                                                                • Process32FirstW.KERNEL32(00000000,00000000), ref: 03D360B9
                                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 03D3610F
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 03D36116
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memset
                                                                                                • String ID:
                                                                                                • API String ID: 2526126748-0
                                                                                                • Opcode ID: b161ee86d2e692e534607d16236cf1ffa5c646cc5230c28a6cf6a951fb48013d
                                                                                                • Instruction ID: 487147458744d9f1b4a4731b544786249e767b24abfd4dcd29a43bfd5f84196f
                                                                                                • Opcode Fuzzy Hash: b161ee86d2e692e534607d16236cf1ffa5c646cc5230c28a6cf6a951fb48013d
                                                                                                • Instruction Fuzzy Hash: FA21C932A01219ABDB20EF74DC96BEEB379EF1A710F044695DC0A97280EB31DF18C651
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Time_memmovetime
                                                                                                • String ID:
                                                                                                • API String ID: 1463837790-0
                                                                                                • Opcode ID: c624ab2e228b54d0b00b8994f762377aefdcf4ab7489f3d45f1a9591cce54d4a
                                                                                                • Instruction ID: 3e7da1fca991f4bfb8ef9664deff2e88739d54c2a8d6cec5122af90cc8d8b52f
                                                                                                • Opcode Fuzzy Hash: c624ab2e228b54d0b00b8994f762377aefdcf4ab7489f3d45f1a9591cce54d4a
                                                                                                • Instruction Fuzzy Hash: 8F51B27AB002069FD711DF79CAC0A6AB7A9FF46214718866CE9198B704DB31FC55CB90

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 902 100054c0-100054d6 903 100054dc-100054e1 902->903 904 1000580e-10005813 902->904 905 10005707-1000575f VirtualAlloc call 1000c880 call 100067ff 903->905 906 100054e7-1000550f RegOpenKeyExW 903->906 927 10005761-100057a1 call 1000c880 RegCreateKeyW 905->927 928 100057dd-100057ec 905->928 907 10005515-10005538 RegQueryValueExW 906->907 908 100055ba-100055bf 906->908 910 1000553a-10005567 call 100067ff call 1000c800 RegQueryValueExW 907->910 911 100055ad-100055b7 RegCloseKey 907->911 913 100055c2-100055c8 908->913 936 10005569-100055a8 VirtualAlloc call 1000c880 910->936 937 100055aa 910->937 911->908 916 100055e8-100055ea 913->916 917 100055ca-100055cd 913->917 920 100055ed-100055ef 916->920 918 100055e4-100055e6 917->918 919 100055cf-100055d7 917->919 918->920 919->916 923 100055d9-100055e2 919->923 924 100055f5-100055fc 920->924 925 100056f8-10005702 920->925 923->913 923->918 930 10005611-100056d4 call 1000c800 * 3 call 100067ff call 1000c880 924->930 931 100055fe-1000560b VirtualFree 924->931 929 100057ee-1000580b call 1000721b Sleep call 10002d10 925->929 939 100057a3-100057c4 RegDeleteValueW RegSetValueExW 927->939 940 100057ca-100057d5 RegCloseKey call 100072bb 927->940 928->929 948 1000580d 929->948 956 100056e6-100056f5 call 1000680a 930->956 957 100056d6-100056e3 930->957 931->930 936->937 937->911 939->940 947 100057da 940->947 947->928 948->904 960 100056e4 call 100060df 957->960 961 100056e4 call 100031ef 957->961 960->956 961->956
                                                                                                APIs
                                                                                                • RegOpenKeyExW.KERNEL32(80000001,Console\0,00000000,00020019,?), ref: 10005507
                                                                                                • RegQueryValueExW.ADVAPI32(?,9e9e85e05ee16fc372a0c7df6549fbd4,00000000,00000003,00000000,00000003), ref: 1000552E
                                                                                                • _memset.LIBCMT ref: 10005548
                                                                                                • RegQueryValueExW.ADVAPI32(?,9e9e85e05ee16fc372a0c7df6549fbd4,00000000,00000003,00000000,00000003), ref: 10005563
                                                                                                • VirtualAlloc.KERNEL32(00000000,000311BF,00003000,00000040), ref: 10005586
                                                                                                • RegCloseKey.ADVAPI32(?), ref: 100055B1
                                                                                                • VirtualFree.KERNEL32(03BB0000,00000000,00008000), ref: 10005605
                                                                                                • _memset.LIBCMT ref: 10005669
                                                                                                • _memset.LIBCMT ref: 1000568D
                                                                                                • _memset.LIBCMT ref: 1000569F
                                                                                                • VirtualAlloc.KERNEL32(00000000,000311BF,00003000,00000040), ref: 10005726
                                                                                                • RegCreateKeyW.ADVAPI32(80000001,Console\0,?), ref: 10005799
                                                                                                • RegDeleteValueW.KERNEL32(?,9e9e85e05ee16fc372a0c7df6549fbd4), ref: 100057AC
                                                                                                • RegSetValueExW.KERNEL32(?,9e9e85e05ee16fc372a0c7df6549fbd4,00000000,00000003,00000000,00000065), ref: 100057C4
                                                                                                • RegCloseKey.KERNEL32(?), ref: 100057CE
                                                                                                • Sleep.KERNEL32(00000BB8), ref: 100057FE
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Value_memset$Virtual$AllocCloseQuery$CreateDeleteFreeOpenSleep
                                                                                                • String ID: !jWW$.$0d3b34577c0a66584d5bdc849e214016$9e9e85e05ee16fc372a0c7df6549fbd4$Console\0$_$e$i$l${vU_
                                                                                                • API String ID: 354323817-737951744
                                                                                                • Opcode ID: be3d857457f6c34cc49a9ce7b94368c024c206f60fa141a8346ca6c642e4ce58
                                                                                                • Instruction ID: 005816a77294032e0ea7aedf6318117014c310f5a4f2017eaf50af4860f80873
                                                                                                • Opcode Fuzzy Hash: be3d857457f6c34cc49a9ce7b94368c024c206f60fa141a8346ca6c642e4ce58
                                                                                                • Instruction Fuzzy Hash: 5891D475A00718ABF710CF60CC84FAB77BAFB88741F508158FA089B245DB75EA40CB51

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1226 3d39e50-3d39e85 GdipGetImagePixelFormat 1227 3d39e87 1226->1227 1228 3d39e8a-3d39eb1 1226->1228 1227->1228 1229 3d39eb3-3d39ec3 1228->1229 1230 3d39ec9-3d39ecf 1228->1230 1229->1230 1231 3d39ed1-3d39ee1 1230->1231 1232 3d39eeb-3d39f04 GdipGetImageHeight 1230->1232 1231->1232 1233 3d39f06 1232->1233 1234 3d39f09-3d39f2c GdipGetImageWidth 1232->1234 1233->1234 1235 3d39f31-3d39f4e call 3d39c30 1234->1235 1236 3d39f2e 1234->1236 1239 3d3a055-3d3a05a 1235->1239 1240 3d39f54-3d39f68 1235->1240 1236->1235 1241 3d3a2a4-3d3a2ba call 3d3f00a 1239->1241 1242 3d3a0cf-3d3a0d7 1240->1242 1243 3d39f6e-3d39f87 GdipGetImagePaletteSize 1240->1243 1247 3d3a20a-3d3a27b GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 1242->1247 1248 3d3a0dd-3d3a11a GdipBitmapLockBits 1242->1248 1244 3d39f89 1243->1244 1245 3d39f8c-3d39f98 1243->1245 1244->1245 1250 3d39fb2-3d39fba 1245->1250 1251 3d39f9a-3d39fa5 call 3d39650 1245->1251 1249 3d3a281-3d3a283 1247->1249 1253 3d3a14a-3d3a177 1248->1253 1254 3d3a11c-3d3a121 1248->1254 1255 3d3a2a2 1249->1255 1256 3d3a285 1249->1256 1260 3d39fd0-3d39fd5 call 3d31280 1250->1260 1261 3d39fbc-3d39fca call 3d3f673 1250->1261 1251->1250 1273 3d39fa7-3d39fb0 call 3d4c660 1251->1273 1257 3d3a179-3d3a18e call 3d407f2 1253->1257 1258 3d3a1bf-3d3a1de GdipBitmapUnlockBits 1253->1258 1262 3d3a123 1254->1262 1263 3d3a140-3d3a145 1254->1263 1255->1241 1264 3d3a28d-3d3a2a0 call 3d3f639 1256->1264 1279 3d3a200-3d3a205 call 3d31280 1257->1279 1280 3d3a190-3d3a197 1257->1280 1258->1249 1267 3d3a1e4-3d3a1e7 1258->1267 1276 3d39fda-3d39fe5 1260->1276 1261->1276 1282 3d39fcc-3d39fce 1261->1282 1269 3d3a12b-3d3a13e call 3d3f639 1262->1269 1263->1241 1264->1255 1287 3d3a287 1264->1287 1267->1249 1269->1263 1284 3d3a125 1269->1284 1277 3d39fe7-3d39fe9 1273->1277 1276->1277 1285 3d3a016-3d3a030 GdipGetImagePalette 1277->1285 1286 3d39feb-3d39fed 1277->1286 1279->1247 1280->1279 1288 3d3a1f6-3d3a1fb call 3d31280 1280->1288 1289 3d3a19e-3d3a1bd 1280->1289 1290 3d3a1ec-3d3a1f1 call 3d31280 1280->1290 1282->1277 1284->1269 1295 3d3a032-3d3a038 1285->1295 1296 3d3a03b-3d3a040 1285->1296 1293 3d39fef 1286->1293 1294 3d3a00c-3d3a011 1286->1294 1287->1264 1288->1279 1289->1257 1289->1258 1290->1288 1299 3d39ff7-3d3a00a call 3d3f639 1293->1299 1294->1241 1295->1296 1300 3d3a042-3d3a048 1296->1300 1301 3d3a04a-3d3a050 call 3d3cca0 1296->1301 1299->1294 1310 3d39ff1 1299->1310 1300->1301 1303 3d3a05f-3d3a063 1300->1303 1301->1239 1305 3d3a0a0-3d3a0c9 call 3d39d80 SetDIBColorTable call 3d3a320 1303->1305 1306 3d3a065 1303->1306 1305->1242 1308 3d3a068-3d3a098 1306->1308 1308->1308 1311 3d3a09a 1308->1311 1310->1299 1311->1305
                                                                                                APIs
                                                                                                • GdipGetImagePixelFormat.GDIPLUS(Function_00009A30,?,?,00000000), ref: 03D39E7B
                                                                                                • GdipGetImageHeight.GDIPLUS(Function_00009A30,?,?,00000000), ref: 03D39EFC
                                                                                                • GdipGetImageWidth.GDIPLUS(Function_00009A30,?,?,00000000), ref: 03D39F24
                                                                                                • GdipGetImagePaletteSize.GDIPLUS(Function_00009A30,?,?,00000000), ref: 03D39F7F
                                                                                                • _malloc.LIBCMT ref: 03D39FC0
                                                                                                  • Part of subcall function 03D3F673: __FF_MSGBANNER.LIBCMT ref: 03D3F68C
                                                                                                  • Part of subcall function 03D3F673: __NMSG_WRITE.LIBCMT ref: 03D3F693
                                                                                                  • Part of subcall function 03D3F673: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,03D44500,00000000,00000001,00000000,?,03D48DE6,00000018,03D56448,0000000C,03D48E76), ref: 03D3F6B8
                                                                                                • _free.LIBCMT ref: 03D3A000
                                                                                                • GdipGetImagePalette.GDIPLUS(?,00000008,?,?,00000000), ref: 03D3A028
                                                                                                • SetDIBColorTable.GDI32(?,00000000,?,?,?,00000000), ref: 03D3A0B7
                                                                                                • GdipBitmapLockBits.GDIPLUS(Function_00009A30,?,00000001,?,?,?,00000000), ref: 03D3A112
                                                                                                • _free.LIBCMT ref: 03D3A134
                                                                                                • _memcpy_s.LIBCMT ref: 03D3A183
                                                                                                • GdipBitmapUnlockBits.GDIPLUS(?,?,?,00000000), ref: 03D3A1D0
                                                                                                • GdipCreateBitmapFromScan0.GDIPLUS(?,?,03D55A78,00022009,?,00000000,?,00000000), ref: 03D3A22C
                                                                                                • GdipGetImageGraphicsContext.GDIPLUS(00000000,00022009,?,00000000), ref: 03D3A24C
                                                                                                • GdipDrawImageI.GDIPLUS(00000000,Function_00009A30,00000000,00000000,?,00000000), ref: 03D3A267
                                                                                                • GdipDeleteGraphics.GDIPLUS(?,?,00000000), ref: 03D3A274
                                                                                                • GdipDisposeImage.GDIPLUS(00000000,?,00000000), ref: 03D3A27B
                                                                                                • _free.LIBCMT ref: 03D3A296
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Gdip$Image$Bitmap_free$BitsGraphicsPalette$AllocateColorContextCreateDeleteDisposeDrawFormatFromHeapHeightLockPixelScan0SizeTableUnlockWidth_malloc_memcpy_s
                                                                                                • String ID: &
                                                                                                • API String ID: 640422297-3042966939
                                                                                                • Opcode ID: 432c31a4ae4f6237fea00e540cdf0583a7a159e0e693437c460fc04acfe0c2e7
                                                                                                • Instruction ID: f11d881bd2a596cba5aeb1a4d0c63c1cda2b85c8433591f771bdcceddc4e295c
                                                                                                • Opcode Fuzzy Hash: 432c31a4ae4f6237fea00e540cdf0583a7a159e0e693437c460fc04acfe0c2e7
                                                                                                • Instruction Fuzzy Hash: 75D171F5A002199FDB20DF55CC90B9AB3B8FF49704F0485ADE609A7201D774AE85CFA5

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • ResetEvent.KERNEL32(?), ref: 10002D9B
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 10002DA7
                                                                                                • timeGetTime.WINMM ref: 10002DAD
                                                                                                • socket.WS2_32(00000002,00000001,00000006), ref: 10002DDA
                                                                                                • lstrlenW.KERNEL32(?,00000000,00000000,00000000,00000000), ref: 10002E06
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000), ref: 10002E12
                                                                                                • lstrlenW.KERNEL32(?,00000000,000000CA,00000000,00000000), ref: 10002E31
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000), ref: 10002E3D
                                                                                                • gethostbyname.WS2_32(00000000), ref: 10002E4B
                                                                                                • htons.WS2_32(?), ref: 10002E6D
                                                                                                • connect.WS2_32(?,?,00000010), ref: 10002E8B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWidelstrlen$EventExchangeInterlockedResetTimeconnectgethostbynamehtonssockettime
                                                                                                • String ID: 0u
                                                                                                • API String ID: 640718063-3203441087
                                                                                                • Opcode ID: 94c689521af4947466c8b86645af49a3b04e56d54b71338c9307917d991564e9
                                                                                                • Instruction ID: d5696d751933d4553be470da2890fc26df070c3c16b6f4ec0f7763c80930fe30
                                                                                                • Opcode Fuzzy Hash: 94c689521af4947466c8b86645af49a3b04e56d54b71338c9307917d991564e9
                                                                                                • Instruction Fuzzy Hash: 136152B1A40304BFE710DFA4CC85FAAB7B9FF49711F104629F646AB2D0D7B1A9048B64

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • ResetEvent.KERNEL32(?), ref: 03D32DBB
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 03D32DC7
                                                                                                • timeGetTime.WINMM ref: 03D32DCD
                                                                                                • socket.WS2_32(00000002,00000001,00000006), ref: 03D32DFA
                                                                                                • lstrlenW.KERNEL32(?,00000000,00000000,00000000,00000000), ref: 03D32E26
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000), ref: 03D32E32
                                                                                                • lstrlenW.KERNEL32(?,00000000,000000CA,00000000,00000000), ref: 03D32E51
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000), ref: 03D32E5D
                                                                                                • gethostbyname.WS2_32(00000000), ref: 03D32E6B
                                                                                                • htons.WS2_32(?), ref: 03D32E8D
                                                                                                • connect.WS2_32(?,?,00000010), ref: 03D32EAB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWidelstrlen$EventExchangeInterlockedResetTimeconnectgethostbynamehtonssockettime
                                                                                                • String ID: 0u
                                                                                                • API String ID: 640718063-3203441087
                                                                                                • Opcode ID: 97628d6fa66b5c414380ff4f7f44716be5acf3e914921f98a36b25c3acd55278
                                                                                                • Instruction ID: 962b6449e6a1878a14e664442c4f17d05bffb7478313cc7f14f9bebde03b1020
                                                                                                • Opcode Fuzzy Hash: 97628d6fa66b5c414380ff4f7f44716be5acf3e914921f98a36b25c3acd55278
                                                                                                • Instruction Fuzzy Hash: 33613E72A40304AFE720EFA4DC45FABB7B8FF49B10F10451DF655AB2D0D6B0A9098B64

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1359 3d36a70-3d36ae3 call 3d3eff4 GetCurrentProcessId wsprintfW call 3d36910 call 3d46770 GetVersionExW 1366 3d36be6-3d36bec 1359->1366 1367 3d36ae9-3d36af0 1359->1367 1368 3d36c14-3d36c21 wsprintfW 1366->1368 1367->1366 1369 3d36af6-3d36afd 1367->1369 1371 3d36c24-3d36c26 1368->1371 1369->1366 1370 3d36b03-3d36b21 GetCurrentProcess OpenProcessToken 1369->1370 1370->1366 1372 3d36b27-3d36b47 GetTokenInformation 1370->1372 1373 3d36c31-3d36c46 call 3d3f00a 1371->1373 1374 3d36c28-3d36c2e call 3d3fac9 1371->1374 1375 3d36bbb-3d36bce CloseHandle 1372->1375 1376 3d36b49-3d36b52 GetLastError 1372->1376 1374->1373 1381 3d36bd0 1375->1381 1382 3d36bf6-3d36bfc 1375->1382 1376->1375 1379 3d36b54-3d36b6b LocalAlloc 1376->1379 1379->1375 1384 3d36b6d-3d36b8d GetTokenInformation 1379->1384 1385 3d36bd2-3d36bd4 1381->1385 1386 3d36bee-3d36bf4 1381->1386 1387 3d36c0e-3d36c0f 1382->1387 1388 3d36bfe-3d36c04 1382->1388 1390 3d36b8f-3d36bac GetSidSubAuthorityCount GetSidSubAuthority 1384->1390 1391 3d36bae-3d36bb5 LocalFree 1384->1391 1385->1366 1392 3d36bd6-3d36bdc 1385->1392 1386->1368 1387->1368 1388->1371 1389 3d36c06-3d36c0c 1388->1389 1389->1368 1390->1391 1391->1375 1392->1371 1393 3d36bde-3d36be4 1392->1393 1393->1368
                                                                                                APIs
                                                                                                • GetCurrentProcessId.KERNEL32(75BF73E0), ref: 03D36A94
                                                                                                • wsprintfW.USER32 ref: 03D36AA7
                                                                                                  • Part of subcall function 03D36910: GetCurrentProcessId.KERNEL32(E832A845,00000000,00000000,75BF73E0,?,00000000,03D510DB,000000FF,?,03D36AB3,00000000), ref: 03D36938
                                                                                                  • Part of subcall function 03D36910: OpenProcess.KERNEL32(00000400,00000000,00000000,?,00000000,03D510DB,000000FF,?,03D36AB3,00000000), ref: 03D36947
                                                                                                  • Part of subcall function 03D36910: OpenProcessToken.ADVAPI32(00000000,00000008,00000000,?,00000000,03D510DB,000000FF,?,03D36AB3,00000000), ref: 03D36960
                                                                                                  • Part of subcall function 03D36910: CloseHandle.KERNEL32(00000000,?,00000000,03D510DB,000000FF,?,03D36AB3,00000000), ref: 03D3696B
                                                                                                • _memset.LIBCMT ref: 03D36AC2
                                                                                                • GetVersionExW.KERNEL32(?), ref: 03D36ADB
                                                                                                • GetCurrentProcess.KERNEL32(00000008,?), ref: 03D36B12
                                                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 03D36B19
                                                                                                • GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,00000000,?), ref: 03D36B3F
                                                                                                • GetLastError.KERNEL32 ref: 03D36B49
                                                                                                • LocalAlloc.KERNEL32(00000040,?), ref: 03D36B5D
                                                                                                • GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,?,?), ref: 03D36B85
                                                                                                • GetSidSubAuthorityCount.ADVAPI32 ref: 03D36B98
                                                                                                • GetSidSubAuthority.ADVAPI32(00000000), ref: 03D36BA6
                                                                                                • LocalFree.KERNEL32(?), ref: 03D36BB5
                                                                                                • CloseHandle.KERNEL32(?), ref: 03D36BC2
                                                                                                • wsprintfW.USER32 ref: 03D36C1B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$Token$CurrentOpen$AuthorityCloseHandleInformationLocalwsprintf$AllocCountErrorFreeLastVersion_memset
                                                                                                • String ID: -N/$NO/$None/%s
                                                                                                • API String ID: 3036438616-3095023699
                                                                                                • Opcode ID: 67952fb3a3fe2ffef4c30c009da962b41c2f9a440821adc5a558252db34d89be
                                                                                                • Instruction ID: 0a01159cc03f7e4dde8415b01aa771ffb520527aa6663808addd1e6b03216bef
                                                                                                • Opcode Fuzzy Hash: 67952fb3a3fe2ffef4c30c009da962b41c2f9a440821adc5a558252db34d89be
                                                                                                • Instruction Fuzzy Hash: EF41B572900314BFDB21DB64DCC8FEA7B78EB0A711F084495F54696241DA34DD98CF61

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1394 3d3ad10-3d3ad2b 1395 3d3ad84-3d3ad8f 1394->1395 1396 3d3ad2d-3d3ad5b RegOpenKeyExW 1394->1396 1399 3d3b845-3d3b84b call 3d3ce00 1395->1399 1400 3d3ad95-3d3ad9c 1395->1400 1397 3d3ad79-3d3ad7e 1396->1397 1398 3d3ad5d-3d3ad73 RegQueryValueExW 1396->1398 1397->1395 1401 3d3b84e-3d3b854 1397->1401 1398->1397 1399->1401 1402 3d3afe3-3d3b09b call 3d3f707 call 3d46770 call 3d3eff4 call 3d47660 call 3d3f707 call 3d3cf20 call 3d3eff4 1400->1402 1403 3d3adea-3d3adf1 1400->1403 1452 3d3b162-3d3b189 call 3d3fa29 CloseHandle 1402->1452 1453 3d3b0a1-3d3b0ee call 3d47660 RegCreateKeyW 1402->1453 1403->1401 1406 3d3adf7-3d3ae29 call 3d3f707 call 3d46770 1403->1406 1417 3d3ae42-3d3ae4e 1406->1417 1418 3d3ae2b-3d3ae3f wsprintfW 1406->1418 1420 3d3ae50 1417->1420 1421 3d3ae9a-3d3aef1 call 3d3eff4 call 3d47660 call 3d32ba0 call 3d3efff * 2 1417->1421 1418->1417 1424 3d3ae54-3d3ae5f 1420->1424 1427 3d3ae60-3d3ae66 1424->1427 1428 3d3ae86-3d3ae88 1427->1428 1429 3d3ae68-3d3ae6b 1427->1429 1434 3d3ae8b-3d3ae8d 1428->1434 1432 3d3ae82-3d3ae84 1429->1432 1433 3d3ae6d-3d3ae75 1429->1433 1432->1434 1433->1428 1437 3d3ae77-3d3ae80 1433->1437 1438 3d3aef4-3d3af09 1434->1438 1439 3d3ae8f-3d3ae98 1434->1439 1437->1427 1437->1432 1442 3d3af10-3d3af16 1438->1442 1439->1421 1439->1424 1445 3d3af36-3d3af38 1442->1445 1446 3d3af18-3d3af1b 1442->1446 1451 3d3af3b-3d3af3d 1445->1451 1449 3d3af32-3d3af34 1446->1449 1450 3d3af1d-3d3af25 1446->1450 1449->1451 1450->1445 1456 3d3af27-3d3af30 1450->1456 1457 3d3af3f-3d3af41 1451->1457 1458 3d3afae-3d3afe0 call 3d3fa29 CloseHandle call 3d3efff 1451->1458 1467 3d3b0f0-3d3b13f call 3d3eff4 call 3d35a30 RegDeleteValueW RegSetValueExW 1453->1467 1468 3d3b14a-3d3b15f RegCloseKey call 3d3fac9 1453->1468 1456->1442 1456->1449 1463 3d3af43-3d3af4e call 3d3efff 1457->1463 1464 3d3af55-3d3af5c 1457->1464 1463->1464 1471 3d3af70-3d3af74 1464->1471 1472 3d3af5e-3d3af69 call 3d3fac9 1464->1472 1467->1468 1490 3d3b141-3d3b147 call 3d3fac9 1467->1490 1468->1452 1475 3d3af76-3d3af7f call 3d3efff 1471->1475 1476 3d3af85-3d3afa9 call 3d3f020 1471->1476 1472->1471 1475->1476 1476->1421 1490->1468
                                                                                                APIs
                                                                                                • RegOpenKeyExW.KERNELBASE(80000001,Console,00000000,00020019,?), ref: 03D3AD53
                                                                                                • RegQueryValueExW.KERNEL32(?,IpDatespecial,00000000,?,00000000,?), ref: 03D3AD73
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: OpenQueryValue
                                                                                                • String ID: %s_bin$Console$Console\0$IpDatespecial
                                                                                                • API String ID: 4153817207-1338088003
                                                                                                • Opcode ID: d0a45cc09220abd19cfe82084274832ed97c378d8431e4b7e96649537c52a581
                                                                                                • Instruction ID: 15df80de29ae146f16060d2cdc11e681cbf0c1ca1ee14da2d12ece1bd9039dbe
                                                                                                • Opcode Fuzzy Hash: d0a45cc09220abd19cfe82084274832ed97c378d8431e4b7e96649537c52a581
                                                                                                • Instruction Fuzzy Hash: 0DC1E4B6B003009BE710EF24DC45F6BB3A9EF95B14F080568F985AB281E771ED15C7A2

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1493 3d36150-3d361a5 call 3d46770 call 3d4004b 1498 3d36201-3d36228 CoCreateInstance 1493->1498 1499 3d361a7-3d361ae 1493->1499 1500 3d36422-3d3642f lstrlenW 1498->1500 1501 3d3622e-3d36282 1498->1501 1502 3d361b0-3d361b2 call 3d36050 1499->1502 1504 3d36441-3d36450 1500->1504 1505 3d36431-3d3643b lstrcatW 1500->1505 1511 3d3640a-3d36418 1501->1511 1512 3d36288-3d362a2 1501->1512 1509 3d361b7-3d361b9 1502->1509 1506 3d36452-3d36457 1504->1506 1507 3d3645a-3d3647a call 3d3f00a 1504->1507 1505->1504 1506->1507 1513 3d361db-3d361ff call 3d4004b 1509->1513 1514 3d361bb-3d361d9 lstrcatW * 2 1509->1514 1511->1500 1516 3d3641a-3d3641f 1511->1516 1512->1511 1520 3d362a8-3d362b4 1512->1520 1513->1498 1513->1502 1514->1513 1516->1500 1521 3d362c0-3d36363 call 3d46770 wsprintfW RegOpenKeyExW 1520->1521 1524 3d363e9-3d363ff 1521->1524 1525 3d36369-3d363ba call 3d46770 RegQueryValueExW 1521->1525 1528 3d36402-3d36404 1524->1528 1529 3d363dc-3d363e3 RegCloseKey 1525->1529 1530 3d363bc-3d363da lstrcatW * 2 1525->1530 1528->1511 1528->1521 1529->1524 1530->1529
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 03D3618B
                                                                                                • lstrcatW.KERNEL32(03D61F10,03D5510C,?,E832A845,00000AD4,00000000,75BF73E0), ref: 03D361CD
                                                                                                • lstrcatW.KERNEL32(03D61F10,03D5535C,?,E832A845,00000AD4,00000000,75BF73E0), ref: 03D361D9
                                                                                                • CoCreateInstance.OLE32(03D52480,00000000,00000017,03D5578C,?,?,E832A845,00000AD4,00000000,75BF73E0), ref: 03D36220
                                                                                                • _memset.LIBCMT ref: 03D362CE
                                                                                                • wsprintfW.USER32 ref: 03D36336
                                                                                                • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,?), ref: 03D3635F
                                                                                                • _memset.LIBCMT ref: 03D36376
                                                                                                  • Part of subcall function 03D36050: _memset.LIBCMT ref: 03D3607C
                                                                                                  • Part of subcall function 03D36050: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00000000), ref: 03D36088
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _memset$Createlstrcat$InstanceOpenSnapshotToolhelp32wsprintf
                                                                                                • String ID: CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}$Windows Defender IOfficeAntiVirus implementation
                                                                                                • API String ID: 1221949200-1583895642
                                                                                                • Opcode ID: 39c180f8dca81d5da33f3775476a77590ca675a51a96ce35f08174df6d84da01
                                                                                                • Instruction ID: 4611dee9c7331e81ba18ce59d21ce2f4875279651ff4aa42cdc51df2fcd1fe34
                                                                                                • Opcode Fuzzy Hash: 39c180f8dca81d5da33f3775476a77590ca675a51a96ce35f08174df6d84da01
                                                                                                • Instruction Fuzzy Hash: 238165B2A00228AFDB20DB64CC81FAEB77CEB49704F0445C9F659A7255D7B4AE44CF64

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1531 3d35f40-3d35f7b CreateMutexW GetLastError 1532 3d35f9b-3d35fa2 1531->1532 1533 3d35f7d 1531->1533 1535 3d36003-3d3602d GetModuleHandleW GetConsoleWindow call 3d3e4f0 1532->1535 1536 3d35fa4-3d35faa 1532->1536 1534 3d35f80-3d35f99 Sleep CreateMutexW GetLastError 1533->1534 1534->1532 1534->1534 1541 3d36048-3d3604f call 3d3e850 1535->1541 1542 3d3602f-3d36045 call 3d3f00a 1535->1542 1538 3d35fb0-3d35fe1 call 3d46770 lstrlenW call 3d36d70 1536->1538 1550 3d35ff3-3d36001 Sleep 1538->1550 1551 3d35fe3-3d35ff1 lstrcmpW 1538->1551 1550->1535 1550->1538 1551->1535 1551->1550
                                                                                                APIs
                                                                                                • CreateMutexW.KERNEL32(00000000,00000000,2024.12. 8), ref: 03D35F66
                                                                                                • GetLastError.KERNEL32 ref: 03D35F6E
                                                                                                • Sleep.KERNEL32(000003E8), ref: 03D35F85
                                                                                                • CreateMutexW.KERNEL32(00000000,00000000,2024.12. 8), ref: 03D35F90
                                                                                                • GetLastError.KERNEL32 ref: 03D35F92
                                                                                                • _memset.LIBCMT ref: 03D35FB9
                                                                                                • lstrlenW.KERNEL32(?), ref: 03D35FC6
                                                                                                • lstrcmpW.KERNEL32(?,03D55328), ref: 03D35FED
                                                                                                • Sleep.KERNEL32(000003E8), ref: 03D35FF8
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 03D36005
                                                                                                • GetConsoleWindow.KERNEL32 ref: 03D3600F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateErrorLastMutexSleep$ConsoleHandleModuleWindow_memsetlstrcmplstrlen
                                                                                                • String ID: 2024.12. 8$key$open
                                                                                                • API String ID: 2922109467-247484233
                                                                                                • Opcode ID: b8ccb35ad68b57b26d8126222e929c446f2f28ac5055a7df2cede14fbf92e5ec
                                                                                                • Instruction ID: 62cf7effa3bf05d3f0b70ebac09f67020857001a42390741e1fb064de7740f7c
                                                                                                • Opcode Fuzzy Hash: b8ccb35ad68b57b26d8126222e929c446f2f28ac5055a7df2cede14fbf92e5ec
                                                                                                • Instruction Fuzzy Hash: E621D6779443059BE614FB74EC86B5EB398EB86B00F140819F605972C0DBB0EA09CBA3

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1552 6c368a70-6c368b30 call 6c366110 1555 6c368b34-6c368b46 1552->1555 1556 6c368b32 1552->1556 1557 6c368b78-6c368b8a 1555->1557 1558 6c368b48-6c368b76 call 6c352c20 1555->1558 1556->1555 1560 6c368b92-6c368ba9 call 6c36f020 1557->1560 1561 6c368b8c 1557->1561 1564 6c368baf-6c368bda 1558->1564 1560->1564 1561->1560 1566 6c368bdc-6c368beb 1564->1566 1567 6c368c1a-6c368c3e 1564->1567 1568 6c368c10-6c368c17 call 6c36aa43 1566->1568 1569 6c368bed-6c368c03 1566->1569 1570 6c368c40-6c368c4f 1567->1570 1571 6c368c7e-6c368c87 1567->1571 1568->1567 1572 6c3691ea call 6c373a5e 1569->1572 1573 6c368c09-6c368c0e 1569->1573 1575 6c368c74-6c368c7b call 6c36aa43 1570->1575 1576 6c368c51-6c368c67 1570->1576 1577 6c368cc3-6c368cc7 1571->1577 1578 6c368c89-6c368c98 1571->1578 1590 6c3691ef-6c369216 call 6c3526c0 call 6c3529d0 1572->1590 1573->1568 1575->1571 1576->1572 1582 6c368c6d-6c368c72 1576->1582 1580 6c368cce 1577->1580 1581 6c368cc9-6c368ccc 1577->1581 1585 6c368c9a-6c368ca5 1578->1585 1586 6c368cb9-6c368cc0 call 6c36aa43 1578->1586 1588 6c368cd1-6c368cdb GetFileAttributesA 1580->1588 1581->1588 1582->1575 1585->1572 1591 6c368cab-6c368cb7 1585->1591 1586->1577 1594 6c369197-6c36919d 1588->1594 1595 6c368ce1-6c368cf7 SHGetFolderPathA 1588->1595 1591->1586 1597 6c3691d6-6c3691e9 1594->1597 1598 6c36919f-6c3691ab 1594->1598 1595->1594 1599 6c368cfd-6c368d1d call 6c3757a0 1595->1599 1601 6c3691cc-6c3691d3 call 6c36aa43 1598->1601 1602 6c3691ad-6c3691c3 1598->1602 1599->1590 1609 6c368d23-6c368d28 1599->1609 1601->1597 1602->1572 1605 6c3691c5-6c3691ca 1602->1605 1605->1601 1610 6c368d2a-6c368d47 call 6c36f020 1609->1610 1611 6c368d49-6c368d6c 1609->1611 1620 6c368dc3-6c368dce 1610->1620 1612 6c368d6e-6c368d8b call 6c36aa0e 1611->1612 1613 6c368d8d-6c368d9f call 6c36aa0e 1611->1613 1621 6c368da1-6c368dc1 call 6c36f020 1612->1621 1613->1621 1622 6c368dd0-6c368e0a call 6c352c20 1620->1622 1623 6c368e0c-6c368e2a 1620->1623 1621->1620 1628 6c368e37-6c368e69 1622->1628 1626 6c368e2f-6c368e33 1623->1626 1627 6c368e2c 1623->1627 1626->1628 1627->1626 1631 6c368e6d-6c368e7f 1628->1631 1632 6c368e6b 1628->1632 1633 6c368eb0-6c368ec1 1631->1633 1634 6c368e81-6c368eae call 6c352c20 1631->1634 1632->1631 1636 6c368ec3 1633->1636 1637 6c368ec9-6c368ed8 call 6c36f020 1633->1637 1640 6c368edc-6c368f17 1634->1640 1636->1637 1637->1640 1642 6c368f4f-6c368f63 1640->1642 1643 6c368f19-6c368f4d call 6c352c20 1640->1643 1644 6c368f65 1642->1644 1645 6c368f6b-6c368f72 1642->1645 1647 6c368f77-6c368fa2 1643->1647 1644->1645 1645->1647 1649 6c368fd7-6c368ffb 1647->1649 1650 6c368fa4-6c368fb3 1647->1650 1653 6c369030-6c369051 1649->1653 1654 6c368ffd-6c36900c 1649->1654 1651 6c368fb5-6c368fc0 1650->1651 1652 6c368fcd-6c368fd4 call 6c36aa43 1650->1652 1651->1572 1657 6c368fc6-6c368fcb 1651->1657 1652->1649 1655 6c369083-6c369087 1653->1655 1656 6c369053-6c36905f 1653->1656 1659 6c369026-6c36902d call 6c36aa43 1654->1659 1660 6c36900e-6c369019 1654->1660 1663 6c36908e 1655->1663 1664 6c369089-6c36908c 1655->1664 1661 6c369061-6c36906c 1656->1661 1662 6c369079-6c369080 call 6c36aa43 1656->1662 1657->1652 1659->1653 1660->1572 1666 6c36901f-6c369024 1660->1666 1661->1572 1668 6c369072-6c369077 1661->1668 1662->1655 1670 6c369091-6c36909b GetFileAttributesA 1663->1670 1664->1670 1666->1659 1668->1662 1673 6c369163-6c369169 1670->1673 1674 6c3690a1-6c3690c3 CoInitialize CoCreateInstance 1670->1674 1673->1594 1677 6c36916b-6c369177 1673->1677 1675 6c36915d CoUninitialize 1674->1675 1676 6c3690c9-6c3690cd 1674->1676 1675->1673 1680 6c3690d4 1676->1680 1681 6c3690cf-6c3690d2 1676->1681 1678 6c36918d-6c369194 call 6c36aa43 1677->1678 1679 6c369179-6c369184 1677->1679 1678->1594 1679->1572 1682 6c369186-6c36918b 1679->1682 1684 6c3690d7-6c369116 MultiByteToWideChar 1680->1684 1681->1684 1682->1678 1688 6c369154-6c369159 1684->1688 1689 6c369118-6c36911c 1684->1689 1688->1675 1690 6c369123 1689->1690 1691 6c36911e-6c369121 1689->1691 1692 6c369126-6c369147 MultiByteToWideChar 1690->1692 1691->1692 1693 6c36914b-6c369150 1692->1693 1693->1688
                                                                                                APIs
                                                                                                • GetFileAttributesA.KERNEL32(?), ref: 6C368CD2
                                                                                                • SHGetFolderPathA.SHELL32 ref: 6C368CEF
                                                                                                • _strlen.LIBCMT ref: 6C368D13
                                                                                                • GetFileAttributesA.KERNEL32(?), ref: 6C369092
                                                                                                • CoInitialize.OLE32(00000000), ref: 6C3690A3
                                                                                                • CoCreateInstance.OLE32(6C38F3C0,00000000,00000001,6C38EC50,?), ref: 6C3690BB
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000104), ref: 6C3690EA
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000104), ref: 6C369139
                                                                                                • CoUninitialize.COMBASE ref: 6C36915D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesByteCharFileMultiWide$CreateFolderInitializeInstancePathUninitialize_strlen
                                                                                                • String ID: \$e\$n79l
                                                                                                • API String ID: 1074249417-697121670
                                                                                                • Opcode ID: adc07487fdc361d05d897be7825df8e842b675633a0e793602c9b7a966e3a125
                                                                                                • Instruction ID: ba49eed500f2c709fe1ab03204b5fdd3d2a13c33c4c14adb52ce106889ddb9f9
                                                                                                • Opcode Fuzzy Hash: adc07487fdc361d05d897be7825df8e842b675633a0e793602c9b7a966e3a125
                                                                                                • Instruction Fuzzy Hash: 8F320371D042188FDB24CF24CC887EEBBB5FF46304F144699E459ABA95DB319A84CF91

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1694 3d362b6-3d362bd 1695 3d362c0-3d36363 call 3d46770 wsprintfW RegOpenKeyExW 1694->1695 1698 3d363e9-3d363ff 1695->1698 1699 3d36369-3d36376 call 3d46770 1695->1699 1702 3d36402-3d36404 1698->1702 1701 3d3637b-3d363ba RegQueryValueExW 1699->1701 1703 3d363dc-3d363e3 RegCloseKey 1701->1703 1704 3d363bc-3d363da lstrcatW * 2 1701->1704 1702->1695 1705 3d3640a-3d36418 1702->1705 1703->1698 1704->1703 1706 3d36422-3d3642f lstrlenW 1705->1706 1707 3d3641a-3d3641f 1705->1707 1708 3d36441-3d36450 1706->1708 1709 3d36431-3d3643b lstrcatW 1706->1709 1707->1706 1710 3d36452-3d36457 1708->1710 1711 3d3645a-3d3647a call 3d3f00a 1708->1711 1709->1708 1710->1711
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 03D362CE
                                                                                                • wsprintfW.USER32 ref: 03D36336
                                                                                                • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,?), ref: 03D3635F
                                                                                                • _memset.LIBCMT ref: 03D36376
                                                                                                • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,?,?,?), ref: 03D363B2
                                                                                                • lstrcatW.KERNEL32(03D61F10,?), ref: 03D363CE
                                                                                                • lstrcatW.KERNEL32(03D61F10,03D5535C), ref: 03D363DA
                                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 03D363E3
                                                                                                • lstrlenW.KERNEL32(03D61F10,?,E832A845,00000AD4,00000000,75BF73E0), ref: 03D36427
                                                                                                • lstrcatW.KERNEL32(03D61F10,03D553D4,?,E832A845,00000AD4,00000000,75BF73E0), ref: 03D3643B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: lstrcat$_memset$CloseOpenQueryValuelstrlenwsprintf
                                                                                                • String ID: CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}$Windows Defender IOfficeAntiVirus implementation
                                                                                                • API String ID: 1671694837-1583895642
                                                                                                • Opcode ID: 0776b6ccd16cf99b1c05188b5dc27fc185a95152fcd22cd50e914cc4c666b1ae
                                                                                                • Instruction ID: 75335733960c2279367ba244aae9944f3a07971fdc07f82b45f0c1006442b270
                                                                                                • Opcode Fuzzy Hash: 0776b6ccd16cf99b1c05188b5dc27fc185a95152fcd22cd50e914cc4c666b1ae
                                                                                                • Instruction Fuzzy Hash: DC4185F2A002286FDB24DB54CC91FEEB7B8AB49705F0441C8F359A7181D6749E84CF64
                                                                                                APIs
                                                                                                • LoadLibraryW.KERNEL32(ntdll.dll,75BF73E0,?,?,?,03D35611,0000035E,000002FA), ref: 03D3749C
                                                                                                • GetProcAddress.KERNEL32(00000000,RtlGetNtVersionNumbers), ref: 03D374B2
                                                                                                • swprintf.LIBCMT ref: 03D374EF
                                                                                                  • Part of subcall function 03D37410: GetModuleHandleW.KERNEL32(kernel32.dll,GetNativeSystemInfo,?,?,?,?,?,?,?,?,03D37523), ref: 03D3743D
                                                                                                  • Part of subcall function 03D37410: GetProcAddress.KERNEL32(00000000), ref: 03D37444
                                                                                                  • Part of subcall function 03D37410: GetNativeSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,03D37523), ref: 03D37452
                                                                                                • RegOpenKeyExW.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00020019,000002FA), ref: 03D37547
                                                                                                • RegQueryValueExW.KERNEL32(000002FA,ProductName,00000000,00000001,00000000,?), ref: 03D37563
                                                                                                • RegCloseKey.KERNEL32(000002FA), ref: 03D37586
                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,03D35611,0000035E,000002FA), ref: 03D37598
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressLibraryProc$CloseFreeHandleInfoLoadModuleNativeOpenQuerySystemValueswprintf
                                                                                                • String ID: %d.%d.%d$ProductName$RtlGetNtVersionNumbers$SOFTWARE\Microsoft\Windows NT\CurrentVersion$ntdll.dll
                                                                                                • API String ID: 2158625971-3190923360
                                                                                                • Opcode ID: 3522116dd11aed44463220173b59995d2a394810473f930eed108e69cccc15a2
                                                                                                • Instruction ID: 1fa6e08ebb4f93df1ac170404778ddafa5c25a62b80c5409fc4f9fbc8d4a0a3a
                                                                                                • Opcode Fuzzy Hash: 3522116dd11aed44463220173b59995d2a394810473f930eed108e69cccc15a2
                                                                                                • Instruction Fuzzy Hash: 2D31B6B6A413087FDB18EBA4DC45FAF7B7DDF49740F140519BA06A6245EA70DA04C7A0
                                                                                                APIs
                                                                                                • GlobalAlloc.KERNEL32(00000002,?,E832A845,?,00000000,?), ref: 03D3C09E
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 03D3C0AA
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 03D3C0BF
                                                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 03D3C0D5
                                                                                                • EnterCriticalSection.KERNEL32(03D5FB64), ref: 03D3C113
                                                                                                • LeaveCriticalSection.KERNEL32(03D5FB64), ref: 03D3C124
                                                                                                  • Part of subcall function 03D39DE0: GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 03D39E04
                                                                                                  • Part of subcall function 03D39DE0: GdipDisposeImage.GDIPLUS(?), ref: 03D39E18
                                                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 03D3C14C
                                                                                                  • Part of subcall function 03D3A460: GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 03D3A48D
                                                                                                  • Part of subcall function 03D3A460: _free.LIBCMT ref: 03D3A503
                                                                                                • GetHGlobalFromStream.OLE32(?,?), ref: 03D3C16D
                                                                                                • GlobalLock.KERNEL32(?), ref: 03D3C177
                                                                                                • GlobalFree.KERNEL32(00000000), ref: 03D3C18F
                                                                                                  • Part of subcall function 03D39BA0: DeleteObject.GDI32(?), ref: 03D39BD2
                                                                                                  • Part of subcall function 03D39BA0: EnterCriticalSection.KERNEL32(03D5FB64,?,?,?,03D39B7B), ref: 03D39BE3
                                                                                                  • Part of subcall function 03D39BA0: EnterCriticalSection.KERNEL32(03D5FB64,?,?,?,03D39B7B), ref: 03D39BF8
                                                                                                  • Part of subcall function 03D39BA0: GdiplusShutdown.GDIPLUS(00000000,?,?,?,03D39B7B), ref: 03D39C04
                                                                                                  • Part of subcall function 03D39BA0: LeaveCriticalSection.KERNEL32(03D5FB64,?,?,?,03D39B7B), ref: 03D39C15
                                                                                                  • Part of subcall function 03D39BA0: LeaveCriticalSection.KERNEL32(03D5FB64,?,?,?,03D39B7B), ref: 03D39C1C
                                                                                                • GlobalSize.KERNEL32(00000000), ref: 03D3C1A5
                                                                                                • GlobalUnlock.KERNEL32(?), ref: 03D3C221
                                                                                                • GlobalFree.KERNEL32(00000000), ref: 03D3C249
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Global$CriticalSection$Stream$CreateEnterGdipLeave$FreeFromImageLockSizeUnlock$AllocBitmapDeleteDisposeEncodersGdiplusObjectShutdown_free
                                                                                                • String ID:
                                                                                                • API String ID: 1483550337-0
                                                                                                • Opcode ID: 8683813889fbcbb0e59bd0d4673bca4909c4c9576d9e47f04408870b436d362c
                                                                                                • Instruction ID: a010fa66f534da425b38d640e8f7067f86b1bbf7125fd83ba4f254c1b8e80dc3
                                                                                                • Opcode Fuzzy Hash: 8683813889fbcbb0e59bd0d4673bca4909c4c9576d9e47f04408870b436d362c
                                                                                                • Instruction Fuzzy Hash: 0B612BB6D00318EFCB10EFA9D88499EBBB9FF49710F144529E915AB345DB34A905CF60
                                                                                                APIs
                                                                                                  • Part of subcall function 6C3693E0: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 6C36941E
                                                                                                  • Part of subcall function 6C3693E0: _strlen.LIBCMT ref: 6C36943A
                                                                                                • _strlen.LIBCMT ref: 6C369B62
                                                                                                • _strlen.LIBCMT ref: 6C369CD0
                                                                                                • CreateThread.KERNEL32(00000000,00000000,6C368770,6C39C338,00000000,00000000), ref: 6C369E21
                                                                                                • CreateThread.KERNEL32(00000000,00000000,6C3680E0,00000000,00000000,00000000), ref: 6C369E36
                                                                                                • WaitForSingleObject.KERNEL32(00000000,00011170), ref: 6C369E48
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 6C369E56
                                                                                                • CreateThread.KERNEL32(00000000,00000000,6C362090,00000000,00000000,00000000), ref: 6C369F65
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateThread_strlen$CloseFileHandleModuleNameObjectSingleWait
                                                                                                • String ID: IiViS$Update.d$Update.d$dll
                                                                                                • API String ID: 632893256-1826472805
                                                                                                • Opcode ID: 6b79ae4172367afbcd4805302301abe3719f85dd4055a8d4b112d6a9c758ad1c
                                                                                                • Instruction ID: 2793b1c222d64994671b2ced781efb886506c63746bf5646a11df9a0b94e2683
                                                                                                • Opcode Fuzzy Hash: 6b79ae4172367afbcd4805302301abe3719f85dd4055a8d4b112d6a9c758ad1c
                                                                                                • Instruction Fuzzy Hash: ADD156B2D003089BDB14DFA4DC44BEEB7B5EF45304F144528E456ABB84E775AA48CF92
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 03D364C2
                                                                                                • RegOpenKeyExW.KERNEL32(80000001,Software\Tencent\Plugin\VAS,00000000,000F003F,?), ref: 03D364E2
                                                                                                • RegQueryInfoKeyW.ADVAPI32(?,00000000,00000000,00000000,?,?,00000000,?,?,?,00000000,00000000), ref: 03D36524
                                                                                                • _memset.LIBCMT ref: 03D36560
                                                                                                • _memset.LIBCMT ref: 03D3658E
                                                                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00000000,00000AD4,75BF73E0), ref: 03D365BA
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,00000000,00000AD4,75BF73E0), ref: 03D365C3
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,00000000,00000AD4,75BF73E0), ref: 03D365D5
                                                                                                • RegCloseKey.ADVAPI32(?,00000000,00000AD4,75BF73E0), ref: 03D36625
                                                                                                • lstrlenW.KERNEL32(?), ref: 03D36635
                                                                                                Strings
                                                                                                • Software\Tencent\Plugin\VAS, xrefs: 03D364D8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _memsetlstrlen$CloseEnumInfoOpenQuery
                                                                                                • String ID: Software\Tencent\Plugin\VAS
                                                                                                • API String ID: 2921034913-3343197220
                                                                                                • Opcode ID: e7cb220bc14ea75cca068ece08bb5d84bde8b1b3d0ecf4fc9263cd3571f03a7d
                                                                                                • Instruction ID: 7f51c5b09153a7663a711a6c6c1532e7a95affa9e8e6583bb529038ae1438182
                                                                                                • Opcode Fuzzy Hash: e7cb220bc14ea75cca068ece08bb5d84bde8b1b3d0ecf4fc9263cd3571f03a7d
                                                                                                • Instruction Fuzzy Hash: D04194F6A40318ABDB24DB54CD85FEAB37CDB49700F0045D9E709B7181EA70AA898B64
                                                                                                APIs
                                                                                                • GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 03D3A48D
                                                                                                • _malloc.LIBCMT ref: 03D3A4D1
                                                                                                • _free.LIBCMT ref: 03D3A503
                                                                                                • GdipGetImageEncoders.GDIPLUS(?,?,00000008), ref: 03D3A522
                                                                                                • GdipSaveImageToStream.GDIPLUS(00000000,?,?,00000000), ref: 03D3A594
                                                                                                • GdipDisposeImage.GDIPLUS(00000000), ref: 03D3A59F
                                                                                                • GdipCreateBitmapFromHBITMAP.GDIPLUS(?,00000000,?), ref: 03D3A5C5
                                                                                                • GdipDisposeImage.GDIPLUS(00000000), ref: 03D3A5DD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Gdip$Image$DisposeEncoders$BitmapCreateFromSaveSizeStream_free_malloc
                                                                                                • String ID: &
                                                                                                • API String ID: 2794124522-3042966939
                                                                                                • Opcode ID: 3e5f68dfb33f2c37f9a1dff3e986b1ac86cf8908dab7f927d9ab39602289a3f7
                                                                                                • Instruction ID: 30516305f4ca336416cdf16923346cc15180e621baf520bb82cc9a0450d9676f
                                                                                                • Opcode Fuzzy Hash: 3e5f68dfb33f2c37f9a1dff3e986b1ac86cf8908dab7f927d9ab39602289a3f7
                                                                                                • Instruction Fuzzy Hash: 495151B6E002199FDB04DFA4C844EEEB7B8EF49700F048159E945BB250D734ED45CBA1
                                                                                                APIs
                                                                                                • RegOpenKeyExW.KERNEL32(80000002,SOFTWARE,00000000,00000102,?), ref: 10005382
                                                                                                • RegDeleteValueW.KERNEL32(?,IpDates_info), ref: 10005392
                                                                                                • RegSetValueExW.KERNEL32(?,IpDates_info,00000000,00000003,1001C6E0,000012A0), ref: 100053B0
                                                                                                • RegCloseKey.KERNEL32(?), ref: 100053BB
                                                                                                • OpenProcess.KERNEL32(00000400,00000000,?), ref: 1000540F
                                                                                                • GetExitCodeProcess.KERNEL32(00000000,?), ref: 1000541B
                                                                                                • Sleep.KERNEL32(00000BB8), ref: 10005434
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: OpenProcessValue$CloseCodeDeleteExitSleep
                                                                                                • String ID: IpDates_info$SOFTWARE
                                                                                                • API String ID: 864241144-2243437601
                                                                                                • Opcode ID: fa41b33889329ce33d54072f6f587efc439d217482355cea30f751f095a89e77
                                                                                                • Instruction ID: c351098f3a10662c2abe80f3babca39824d4604c0415f8e3891e9891bb32f169
                                                                                                • Opcode Fuzzy Hash: fa41b33889329ce33d54072f6f587efc439d217482355cea30f751f095a89e77
                                                                                                • Instruction Fuzzy Hash: 184146316442819FF310CF308C45F6B7BB5FB453C6F994068E581CA186D3B2EA42C7A2
                                                                                                APIs
                                                                                                • RegOpenKeyExW.KERNEL32(80000002,SOFTWARE,00000000,00000102,?), ref: 10005382
                                                                                                • RegDeleteValueW.KERNEL32(?,IpDates_info), ref: 10005392
                                                                                                • RegSetValueExW.KERNEL32(?,IpDates_info,00000000,00000003,1001C6E0,000012A0), ref: 100053B0
                                                                                                • RegCloseKey.KERNEL32(?), ref: 100053BB
                                                                                                • OpenProcess.KERNEL32(00000400,00000000,?), ref: 1000540F
                                                                                                • GetExitCodeProcess.KERNEL32(00000000,?), ref: 1000541B
                                                                                                • Sleep.KERNEL32(00000BB8), ref: 10005434
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: OpenProcessValue$CloseCodeDeleteExitSleep
                                                                                                • String ID: IpDates_info$SOFTWARE
                                                                                                • API String ID: 864241144-2243437601
                                                                                                • Opcode ID: e48445a0fb638aff792993f9711fe44b6994354607bef0c7859c4fe8ed55e572
                                                                                                • Instruction ID: f7f7705b5b84b7b191dcdb77494346d14e222b8940c5b100b936b40375e1b217
                                                                                                • Opcode Fuzzy Hash: e48445a0fb638aff792993f9711fe44b6994354607bef0c7859c4fe8ed55e572
                                                                                                • Instruction Fuzzy Hash: B731C1306443819FF315CF308848B6B7BF6FB493C6F9944A8F5859A146D3B2DA46C761
                                                                                                APIs
                                                                                                • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,6C369F53,Update.d), ref: 6C368017
                                                                                                • FindResourceW.KERNEL32(00000000,004F0043), ref: 6C368066
                                                                                                • LoadResource.KERNEL32(00000000,00000000), ref: 6C368074
                                                                                                • SizeofResource.KERNEL32(00000000,00000000), ref: 6C36807E
                                                                                                • LockResource.KERNEL32(00000000), ref: 6C368087
                                                                                                  • Part of subcall function 6C366B10: _strlen.LIBCMT ref: 6C366B9F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Resource$FindHandleLoadLockModuleSizeof_strlen
                                                                                                • String ID: C$I$N$T
                                                                                                • API String ID: 415223560-3924500842
                                                                                                • Opcode ID: 84c950d56874df013f2e3624253d0145f7b35cb67a481984f94f7451afb2e969
                                                                                                • Instruction ID: db7784b9a8ad9b36b6371c86e1e2f0d2236d4df2c534830162f4e3c241750c7d
                                                                                                • Opcode Fuzzy Hash: 84c950d56874df013f2e3624253d0145f7b35cb67a481984f94f7451afb2e969
                                                                                                • Instruction Fuzzy Hash: A711C6B0A09340ABD7009F358D49A7B77ECEF8B208F001919F88996641FB75DA44CBA7
                                                                                                APIs
                                                                                                  • Part of subcall function 6C389FEC: CreateFileW.KERNEL32(FFFFFFFF,00000000,?,6C389C90,?,?,00000000,?,6C389C90,FFFFFFFF,0000000C), ref: 6C38A009
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C389CFB
                                                                                                • __dosmaperr.LIBCMT ref: 6C389D02
                                                                                                • GetFileType.KERNEL32(00000000), ref: 6C389D0E
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C389D18
                                                                                                • __dosmaperr.LIBCMT ref: 6C389D21
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 6C389D41
                                                                                                • CloseHandle.KERNEL32(6C3807FB), ref: 6C389E8E
                                                                                                • GetLastError.KERNEL32 ref: 6C389EC0
                                                                                                • __dosmaperr.LIBCMT ref: 6C389EC7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                • String ID:
                                                                                                • API String ID: 4237864984-0
                                                                                                • Opcode ID: fad6174fcebd22a99dcc33826f6494b4fcb670a99d85c14ae7148fc709fab9f3
                                                                                                • Instruction ID: 63528a133f869af045a70653434b75c5d5265556d88b425ccdbf1232ed1481fe
                                                                                                • Opcode Fuzzy Hash: fad6174fcebd22a99dcc33826f6494b4fcb670a99d85c14ae7148fc709fab9f3
                                                                                                • Instruction Fuzzy Hash: 36A12632A252549FCF199F68DC51B9D3BB4AB07318F14025AF8129F7D0D7369806CF56
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: $,$.$jIk
                                                                                                • API String ID: 4218353326-3923260969
                                                                                                • Opcode ID: b06e0fedbac8b6cfb950d6324891bf67d740249ecc89647c2411f4d9caf607a6
                                                                                                • Instruction ID: 68ddd9f3ff5b22b5159c3cd3fef6c09fa8529f30bce2420c4f1b1dc5f174014a
                                                                                                • Opcode Fuzzy Hash: b06e0fedbac8b6cfb950d6324891bf67d740249ecc89647c2411f4d9caf607a6
                                                                                                • Instruction Fuzzy Hash: E582CC71D102688BEB24CF25CC947EDBBB2BF86304F158298D449ABA85DB715EC4CF91
                                                                                                APIs
                                                                                                • RegOpenKeyExW.KERNEL32(80000001,Console\0,00000000,000F003F,03D512F8,E832A845,00000001,00000000,00000000), ref: 03D3CAB1
                                                                                                • RegQueryInfoKeyW.ADVAPI32(03D512F8,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,00000000,00000000), ref: 03D3CAE0
                                                                                                • _memset.LIBCMT ref: 03D3CB44
                                                                                                • _memset.LIBCMT ref: 03D3CB53
                                                                                                • RegEnumValueW.KERNEL32(03D512F8,?,00000000,?,00000000,?,00000000,?), ref: 03D3CB72
                                                                                                  • Part of subcall function 03D3F707: _malloc.LIBCMT ref: 03D3F721
                                                                                                  • Part of subcall function 03D3F707: std::exception::exception.LIBCMT ref: 03D3F756
                                                                                                  • Part of subcall function 03D3F707: std::exception::exception.LIBCMT ref: 03D3F770
                                                                                                  • Part of subcall function 03D3F707: __CxxThrowException@8.LIBCMT ref: 03D3F781
                                                                                                • RegCloseKey.KERNEL32(03D512F8,?,?,?,?,?,?,?,?,?,?,?,00000000,03D512F8,000000FF), ref: 03D3CC83
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _memsetstd::exception::exception$CloseEnumException@8InfoOpenQueryThrowValue_malloc
                                                                                                • String ID: Console\0
                                                                                                • API String ID: 1348767993-1253790388
                                                                                                • Opcode ID: c1c5f714e8d060f1bb7d024d17f7a3b285709df7ad3dd6b4c2611041a2e11aad
                                                                                                • Instruction ID: c2e899ea847441c9feb3dbaab87a827152703b3ea65141adf46fb95aa0b05447
                                                                                                • Opcode Fuzzy Hash: c1c5f714e8d060f1bb7d024d17f7a3b285709df7ad3dd6b4c2611041a2e11aad
                                                                                                • Instruction Fuzzy Hash: D7612EB6D00219AFDB04DFA8D880EAEB7B9FB49310F144569F915EB341D774AD01CBA0
                                                                                                APIs
                                                                                                  • Part of subcall function 03D3F707: _malloc.LIBCMT ref: 03D3F721
                                                                                                • _memset.LIBCMT ref: 03D3BB21
                                                                                                • GetLastInputInfo.USER32(?), ref: 03D3BB37
                                                                                                • GetTickCount.KERNEL32 ref: 03D3BB3D
                                                                                                • wsprintfW.USER32 ref: 03D3BB66
                                                                                                • GetForegroundWindow.USER32 ref: 03D3BB6F
                                                                                                • GetWindowTextW.USER32(00000000,00000020,000000FA), ref: 03D3BB83
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Window$CountForegroundInfoInputLastTextTick_malloc_memsetwsprintf
                                                                                                • String ID: %d min
                                                                                                • API String ID: 3754759880-1947832151
                                                                                                • Opcode ID: 932ae0da505f5863b370de54b55616590415d009a89f1d1a9e2ec45b1faddcec
                                                                                                • Instruction ID: 3958f4e106cc7c39dcb7b5783ef453fc374cf009cd576949e2677d346fc6fcdd
                                                                                                • Opcode Fuzzy Hash: 932ae0da505f5863b370de54b55616590415d009a89f1d1a9e2ec45b1faddcec
                                                                                                • Instruction Fuzzy Hash: CF4180B6D00218AFDB10EFA4D889E9FBBB9EF45700F088565F9099B345D6749E04CBE1
                                                                                                APIs
                                                                                                • GetCurrentProcessId.KERNEL32(E832A845,00000000,00000000,75BF73E0,?,00000000,03D510DB,000000FF,?,03D36AB3,00000000), ref: 03D36938
                                                                                                • OpenProcess.KERNEL32(00000400,00000000,00000000,?,00000000,03D510DB,000000FF,?,03D36AB3,00000000), ref: 03D36947
                                                                                                • OpenProcessToken.ADVAPI32(00000000,00000008,00000000,?,00000000,03D510DB,000000FF,?,03D36AB3,00000000), ref: 03D36960
                                                                                                • CloseHandle.KERNEL32(00000000,?,00000000,03D510DB,000000FF,?,03D36AB3,00000000), ref: 03D3696B
                                                                                                • SysStringLen.OLEAUT32(00000000), ref: 03D369BE
                                                                                                • SysStringLen.OLEAUT32(00000000), ref: 03D369CC
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,03D510DB,000000FF), ref: 03D36A2E
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,00000000,03D510DB,000000FF), ref: 03D36A34
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseHandleProcess$OpenString$CurrentToken
                                                                                                • String ID:
                                                                                                • API String ID: 429299433-0
                                                                                                • Opcode ID: 693b762789c09df0b5f23766709ab91327e938424f7f35121a2a9f80372ab304
                                                                                                • Instruction ID: f51e4c637681474929de70f771b105e71de176564b33009ff2fb3a480560104a
                                                                                                • Opcode Fuzzy Hash: 693b762789c09df0b5f23766709ab91327e938424f7f35121a2a9f80372ab304
                                                                                                • Instruction Fuzzy Hash: 214192B6900218ABCB10DFA8CC80AAEF7B8FB45710F14466AE955E7340D7759D04CBB1
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: 156.251.17.243$18852$IP=$Port
                                                                                                • API String ID: 4218353326-2804002942
                                                                                                • Opcode ID: 2c8a7bcd36ca752026adf9cef8b680d8c8426569605211fa2f9ab2107ed174b5
                                                                                                • Instruction ID: b7de2bc1a56c5e5a835f571c386d875a09949b0e4b1cd2855dd90304a96b9e66
                                                                                                • Opcode Fuzzy Hash: 2c8a7bcd36ca752026adf9cef8b680d8c8426569605211fa2f9ab2107ed174b5
                                                                                                • Instruction Fuzzy Hash: C112B1B2910B008BD724CF39C890796B7F6FB89318F544A2DD49A87F84EB75E5488F51
                                                                                                APIs
                                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 6C3680FE
                                                                                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 6C368139
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000104,00000000,00000000), ref: 6C36816C
                                                                                                • _strlen.LIBCMT ref: 6C36818B
                                                                                                • Process32NextW.KERNEL32(?,?), ref: 6C3682EF
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 6C3682FD
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,00000002,00000000), ref: 6C368313
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseHandleProcess32$ByteCharCreateFirstMultiNextSnapshotToolhelp32Wide_strlen
                                                                                                • String ID:
                                                                                                • API String ID: 1292832681-0
                                                                                                • Opcode ID: c9f07b1dc9fc49b85144c36ec7b8bfa5584c175bd19c066ce7900977cb049c2d
                                                                                                • Instruction ID: e7d8742a69842939e1c968f174b99724579d97d3869c1d90a6bc9ba40ea18013
                                                                                                • Opcode Fuzzy Hash: c9f07b1dc9fc49b85144c36ec7b8bfa5584c175bd19c066ce7900977cb049c2d
                                                                                                • Instruction Fuzzy Hash: 09512B729053105BE3109F159C80BDFB7D9AF8E318F15062AF98997E85E771D9088FA3
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 03D36DD9
                                                                                                • RegOpenKeyExW.KERNEL32(80000001,03D55164,00000000,00020019,75BF73E0), ref: 03D36DFC
                                                                                                • RegQueryValueExW.KERNEL32(75BF73E0,GROUP,00000000,00000001,?,00000208), ref: 03D36E4A
                                                                                                • lstrcmpW.KERNEL32(?,03D55148), ref: 03D36E60
                                                                                                • lstrcpyW.KERNEL32(03D356EA,?), ref: 03D36E72
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: OpenQueryValue_memsetlstrcmplstrcpy
                                                                                                • String ID: GROUP
                                                                                                • API String ID: 2102619503-2593425013
                                                                                                • Opcode ID: 1bddfc8cb42ff44962715253bec41d5a7d6c02d9fb24be2ddb2ebf2aa9530a49
                                                                                                • Instruction ID: bd0b943d8f287f130e3eb9060ce3a93adae7d63981a9660e9a3981910780096a
                                                                                                • Opcode Fuzzy Hash: 1bddfc8cb42ff44962715253bec41d5a7d6c02d9fb24be2ddb2ebf2aa9530a49
                                                                                                • Instruction Fuzzy Hash: 36317871901319BBDB20DF94DD89B9EB7B8EB09B10F104699E515A7280DB74EE48CF60
                                                                                                APIs
                                                                                                • ___set_flsgetvalue.LIBCMT ref: 10007240
                                                                                                • __calloc_crt.LIBCMT ref: 1000724C
                                                                                                • __getptd.LIBCMT ref: 10007259
                                                                                                • CreateThread.KERNEL32(?,?,100071B6,00000000,?,?), ref: 10007290
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 1000729A
                                                                                                • _free.LIBCMT ref: 100072A3
                                                                                                • __dosmaperr.LIBCMT ref: 100072AE
                                                                                                  • Part of subcall function 1000710D: __getptd_noexit.LIBCMT ref: 1000710D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                                                                • String ID:
                                                                                                • API String ID: 155776804-0
                                                                                                • Opcode ID: d853c5aad6a4ca1283704040be1a2fdba58bd4e9b88c6b00cf5b9d9771d5e89a
                                                                                                • Instruction ID: e2e0b3d062d787f99d787063b624e9a47e01a5ceed69b34c49d3f3bc16e6f751
                                                                                                • Opcode Fuzzy Hash: d853c5aad6a4ca1283704040be1a2fdba58bd4e9b88c6b00cf5b9d9771d5e89a
                                                                                                • Instruction Fuzzy Hash: C911E136604746AFF711DFA8DC41D8B37E8FF453E0B110029F95C8A19ADB79E8008AA0
                                                                                                APIs
                                                                                                • ___set_flsgetvalue.LIBCMT ref: 03D3FA4E
                                                                                                • __calloc_crt.LIBCMT ref: 03D3FA5A
                                                                                                • __getptd.LIBCMT ref: 03D3FA67
                                                                                                • CreateThread.KERNEL32(00000000,00000000,03D3F9C4,00000000,00000000,03D3E003), ref: 03D3FA9E
                                                                                                • GetLastError.KERNEL32(?,00000000,?,?,03D3E003,00000000,00000000,03D35F40,00000000,00000000,00000000), ref: 03D3FAA8
                                                                                                • _free.LIBCMT ref: 03D3FAB1
                                                                                                • __dosmaperr.LIBCMT ref: 03D3FABC
                                                                                                  • Part of subcall function 03D3F91B: __getptd_noexit.LIBCMT ref: 03D3F91B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                                                                • String ID:
                                                                                                • API String ID: 155776804-0
                                                                                                • Opcode ID: 78ac48766017b0514bca1ddccc249f130e4ab4c1dc8328825def2d851e9c95aa
                                                                                                • Instruction ID: 8a21687d230d3649d4eeaf064f1a0f754c54373a0f2eecd868803214a69288ef
                                                                                                • Opcode Fuzzy Hash: 78ac48766017b0514bca1ddccc249f130e4ab4c1dc8328825def2d851e9c95aa
                                                                                                • Instruction Fuzzy Hash: 7511CE3A60470EAFDB10EFA9AC40E9B379DEF06B60B14442AF9058A190DB70DC118A70
                                                                                                APIs
                                                                                                • ___set_flsgetvalue.LIBCMT ref: 100071BC
                                                                                                  • Part of subcall function 10009754: TlsGetValue.KERNEL32(00000000,100098AD,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000), ref: 1000975D
                                                                                                  • Part of subcall function 10009754: DecodePointer.KERNEL32(?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000,?,100099BA,0000000D), ref: 1000976F
                                                                                                  • Part of subcall function 10009754: TlsSetValue.KERNEL32(00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000,?,100099BA), ref: 1000977E
                                                                                                • ___fls_getvalue@4.LIBCMT ref: 100071C7
                                                                                                  • Part of subcall function 10009734: TlsGetValue.KERNEL32(?,?,100071CC,00000000), ref: 10009742
                                                                                                • ___fls_setvalue@8.LIBCMT ref: 100071DA
                                                                                                  • Part of subcall function 10009788: DecodePointer.KERNEL32(?,?,?,100071DF,00000000,?,00000000), ref: 10009799
                                                                                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 100071E3
                                                                                                • ExitThread.KERNEL32 ref: 100071EA
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 100071F0
                                                                                                • __freefls@4.LIBCMT ref: 10007210
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Value$DecodePointerThread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                                                                • String ID:
                                                                                                • API String ID: 2383549826-0
                                                                                                • Opcode ID: 9534965ccca21370a2365faca07fc43a5bbbcb8b41f594eb418147c089430495
                                                                                                • Instruction ID: 9ef8d05c11a244158b1ee883055881acaa61a2209176cdde4bb0df2a080a06ba
                                                                                                • Opcode Fuzzy Hash: 9534965ccca21370a2365faca07fc43a5bbbcb8b41f594eb418147c089430495
                                                                                                • Instruction Fuzzy Hash: 7EF09679404240ABF304DFB5C94988E7BA9FF482C4725C458F90C8B21BDB39E8428790
                                                                                                APIs
                                                                                                • ___set_flsgetvalue.LIBCMT ref: 03D3F9CA
                                                                                                  • Part of subcall function 03D43CA0: TlsGetValue.KERNEL32(00000000,03D43DF9,?,03D44500,00000000,00000001,00000000,?,03D48DE6,00000018,03D56448,0000000C,03D48E76,00000000,00000000), ref: 03D43CA9
                                                                                                  • Part of subcall function 03D43CA0: DecodePointer.KERNEL32(?,03D44500,00000000,00000001,00000000,?,03D48DE6,00000018,03D56448,0000000C,03D48E76,00000000,00000000,?,03D43F06,0000000D), ref: 03D43CBB
                                                                                                  • Part of subcall function 03D43CA0: TlsSetValue.KERNEL32(00000000,?,03D44500,00000000,00000001,00000000,?,03D48DE6,00000018,03D56448,0000000C,03D48E76,00000000,00000000,?,03D43F06), ref: 03D43CCA
                                                                                                • ___fls_getvalue@4.LIBCMT ref: 03D3F9D5
                                                                                                  • Part of subcall function 03D43C80: TlsGetValue.KERNEL32(?,?,03D3F9DA,00000000), ref: 03D43C8E
                                                                                                • ___fls_setvalue@8.LIBCMT ref: 03D3F9E8
                                                                                                  • Part of subcall function 03D43CD4: DecodePointer.KERNEL32(?,?,?,03D3F9ED,00000000,?,00000000), ref: 03D43CE5
                                                                                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 03D3F9F1
                                                                                                • ExitThread.KERNEL32 ref: 03D3F9F8
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 03D3F9FE
                                                                                                • __freefls@4.LIBCMT ref: 03D3FA1E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Value$DecodePointerThread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                                                                • String ID:
                                                                                                • API String ID: 2383549826-0
                                                                                                • Opcode ID: b9da882cc80dd0104a9ab4ea51caa8c626107cb02766f368a8211ea51209c222
                                                                                                • Instruction ID: ee013c56fc5e1611515ab10a94a62b6cfb549fae2e25c04d01857ca2c929a764
                                                                                                • Opcode Fuzzy Hash: b9da882cc80dd0104a9ab4ea51caa8c626107cb02766f368a8211ea51209c222
                                                                                                • Instruction Fuzzy Hash: 07F06D7DA00344BBC708FF75CA0880E7BACEF492413248958F9098B205DB34D846CBB1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: $,$jIk
                                                                                                • API String ID: 0-2946808363
                                                                                                • Opcode ID: 7fa520a6ba5848778dd9acea97daedc55081b8f22a7d2d18fb006b2a5e725f57
                                                                                                • Instruction ID: 9eaa772a65475bf8a592b0034d3c1b6a0362d3d48d9dbf3d15594dc5b067e0c7
                                                                                                • Opcode Fuzzy Hash: 7fa520a6ba5848778dd9acea97daedc55081b8f22a7d2d18fb006b2a5e725f57
                                                                                                • Instruction Fuzzy Hash: B372BB71D142688BEB24CF25CC947EDBBB2AF86304F148298D4497BA85DB715EC8CF91
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: $,$jIk
                                                                                                • API String ID: 0-2946808363
                                                                                                • Opcode ID: c39d65573c6e237096705d445b58cab5d345b0e3c935b4e7e5514714e2602468
                                                                                                • Instruction ID: 783ef140d6c744d6146a228874b53c52239067f20d7f26c73c5873a7f9263393
                                                                                                • Opcode Fuzzy Hash: c39d65573c6e237096705d445b58cab5d345b0e3c935b4e7e5514714e2602468
                                                                                                • Instruction Fuzzy Hash: C472DD71D142688BDB68CF24CC947EDBBB2AF86304F148298D4497BA85DB715EC8CF91
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ea0d2b78b27ee4fab49393d5ab1e21f936fac5ee55595b050fd5efb5eb891298
                                                                                                • Instruction ID: b2e4b20bf4f8269b56f73582dcfde3c7e55669e1393e92d6bd00dfb8b38a41ad
                                                                                                • Opcode Fuzzy Hash: ea0d2b78b27ee4fab49393d5ab1e21f936fac5ee55595b050fd5efb5eb891298
                                                                                                • Instruction Fuzzy Hash: 96B134B0A06249AFDF01CFA8CA48BADBBB4BF4A318F544149E451AB781C7779941CF71
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 100032F1
                                                                                                • Sleep.KERNEL32(00000258), ref: 100032FE
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 10003306
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 10003312
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1000331A
                                                                                                • Sleep.KERNEL32(0000012C), ref: 1000332B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ObjectSingleWait$Sleep$ExchangeInterlocked
                                                                                                • String ID:
                                                                                                • API String ID: 3137405945-0
                                                                                                • Opcode ID: 90501a451cf47964b750dce1617d56ac3a73a9eb1c931f81fede124cf76ff774
                                                                                                • Instruction ID: f89297930b1253133b9af3f62c08b225611c8876bcc0692efb07df5bac526d50
                                                                                                • Opcode Fuzzy Hash: 90501a451cf47964b750dce1617d56ac3a73a9eb1c931f81fede124cf76ff774
                                                                                                • Instruction Fuzzy Hash: 65F08971104314AFD610DBE9CCC4D46F3B8AF89331B144709F221872D0CAB1E8018BA0
                                                                                                APIs
                                                                                                • CoInitialize.OLE32(00000000), ref: 03D3669B
                                                                                                • CoCreateInstance.OLE32(03D546FC,00000000,00000001,03D5471C,?,?,?,?,?,?,?,?,?,?,03D3588A), ref: 03D366B2
                                                                                                • SysFreeString.OLEAUT32(?), ref: 03D3674C
                                                                                                • CoUninitialize.OLE32(?,?,?,?,?,?,?,?,?,03D3588A), ref: 03D3677D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateFreeInitializeInstanceStringUninitialize
                                                                                                • String ID: FriendlyName
                                                                                                • API String ID: 841178590-3623505368
                                                                                                • Opcode ID: f3a235953c1a80e68928d9031bdc4b5af445ad703a578cca23a39e6e7a530f81
                                                                                                • Instruction ID: 8ab89b43848942c83fbd178b5567c9f218bb35608eb5bdd7087808252afacb88
                                                                                                • Opcode Fuzzy Hash: f3a235953c1a80e68928d9031bdc4b5af445ad703a578cca23a39e6e7a530f81
                                                                                                • Instruction Fuzzy Hash: 2E314C75700209AFDB00DBA9DC80EAEB7B9EF89704F148598F905EB254DA71ED45CB60
                                                                                                APIs
                                                                                                • _malloc.LIBCMT ref: 03D3F721
                                                                                                  • Part of subcall function 03D3F673: __FF_MSGBANNER.LIBCMT ref: 03D3F68C
                                                                                                  • Part of subcall function 03D3F673: __NMSG_WRITE.LIBCMT ref: 03D3F693
                                                                                                  • Part of subcall function 03D3F673: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,03D44500,00000000,00000001,00000000,?,03D48DE6,00000018,03D56448,0000000C,03D48E76), ref: 03D3F6B8
                                                                                                • std::exception::exception.LIBCMT ref: 03D3F756
                                                                                                • std::exception::exception.LIBCMT ref: 03D3F770
                                                                                                • __CxxThrowException@8.LIBCMT ref: 03D3F781
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                                                                                • String ID: bad allocation
                                                                                                • API String ID: 615853336-2104205924
                                                                                                • Opcode ID: 293b355cb2efefda98c542d43c49aa15ed3c49d73c84839545ce764ab899f2fa
                                                                                                • Instruction ID: 6ce3ffebbca7829be10657ac90e87826761d72e1c6da612e78dc49e523229405
                                                                                                • Opcode Fuzzy Hash: 293b355cb2efefda98c542d43c49aa15ed3c49d73c84839545ce764ab899f2fa
                                                                                                • Instruction Fuzzy Hash: A2F081B6D0030DABCF05FB64DC25A5E77ADEB42654F140059E850DA291DB709E49CBA0
                                                                                                APIs
                                                                                                • GetCommandLineW.KERNEL32(00000001), ref: 00E01C61
                                                                                                • CommandLineToArgvW.SHELL32(00000000), ref: 00E01C68
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00E00000), ref: 00E01CD3
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 00E01CF3
                                                                                                • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,?,00E00000,00000000,00000000,00000000,00E02778,00000014), ref: 00E01D25
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3556290818.0000000000E01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00E00000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3556263696.0000000000E00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556319323.0000000000E02000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556351733.0000000000E03000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556384480.0000000000E04000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556384480.0000000000E46000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_e00000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharCommandLineMultiWide$ArgvFreeLocal
                                                                                                • String ID:
                                                                                                • API String ID: 4060259846-0
                                                                                                • Opcode ID: 0fa7a62a9e63d43a50a969cf181cf966205ce37ecf003a4e5aa3adb6a233370e
                                                                                                • Instruction ID: 63ffa5f9e1c291db2a0a5a47a0c5d9d526b6787d6e5e62a84556418e55d89f16
                                                                                                • Opcode Fuzzy Hash: 0fa7a62a9e63d43a50a969cf181cf966205ce37ecf003a4e5aa3adb6a233370e
                                                                                                • Instruction Fuzzy Hash: E831C170604305AFE710EF68AC85B1B77E4EF84715F104A2CFA55AB2C1E731ED488B62
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: dllmain_raw$dllmain_crt_dispatch
                                                                                                • String ID:
                                                                                                • API String ID: 3136044242-0
                                                                                                • Opcode ID: beff8605b2729e1a2f48045952afa58c566571185cc05b56c30c08324a71a3a4
                                                                                                • Instruction ID: 13c56519d10e8f58eef583b43d735080dfc284f74f8982bb247b6ed2e0a4b27e
                                                                                                • Opcode Fuzzy Hash: beff8605b2729e1a2f48045952afa58c566571185cc05b56c30c08324a71a3a4
                                                                                                • Instruction Fuzzy Hash: 7C21AE72D05219ABDF219F57CC40AEF3A79EB85A98F214119F8945BE18C7728D028FE1
                                                                                                APIs
                                                                                                • setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 10002D3C
                                                                                                • CancelIo.KERNEL32(?), ref: 10002D46
                                                                                                • InterlockedExchange.KERNEL32(00000000,00000000), ref: 10002D4F
                                                                                                • closesocket.WS2_32(?), ref: 10002D59
                                                                                                • SetEvent.KERNEL32(00000001), ref: 10002D63
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
                                                                                                • String ID:
                                                                                                • API String ID: 1486965892-0
                                                                                                • Opcode ID: 2ceef8d7a9cb16c2b8d4c923c9bd50e46f51888a66d7a8a6949057e86b5d425b
                                                                                                • Instruction ID: c3dd280d0a222891198d8956340d5cd90ea8efbda93af296f9b36197db09124c
                                                                                                • Opcode Fuzzy Hash: 2ceef8d7a9cb16c2b8d4c923c9bd50e46f51888a66d7a8a6949057e86b5d425b
                                                                                                • Instruction Fuzzy Hash: 95F04F75100710EFE320DF94CC89F5677B8FB49B12F148659F6829B690C7B1F9048BA0
                                                                                                APIs
                                                                                                • WinExec.KERNEL32(00000000,00000000), ref: 6C36416E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Exec
                                                                                                • String ID: &$'$j)wh
                                                                                                • API String ID: 459137531-3604346523
                                                                                                • Opcode ID: d810316f07087057d21709daaa72419736fb6fd0f117854c5281509f2ac0a456
                                                                                                • Instruction ID: 46d72c95f5c3f0fea39461c55b51374299c17534550867887d4a6945234437c1
                                                                                                • Opcode Fuzzy Hash: d810316f07087057d21709daaa72419736fb6fd0f117854c5281509f2ac0a456
                                                                                                • Instruction Fuzzy Hash: 9071F371C042588BDB14CFA4C8583EEBB72BF41308F14465CD0957BB85DBB55AC88FA2
                                                                                                APIs
                                                                                                • _malloc.LIBCMT ref: 10006F31
                                                                                                  • Part of subcall function 10006E83: __FF_MSGBANNER.LIBCMT ref: 10006E9C
                                                                                                  • Part of subcall function 10006E83: __NMSG_WRITE.LIBCMT ref: 10006EA3
                                                                                                  • Part of subcall function 10006E83: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F), ref: 10006EC8
                                                                                                • std::exception::exception.LIBCMT ref: 10006F66
                                                                                                • std::exception::exception.LIBCMT ref: 10006F80
                                                                                                • __CxxThrowException@8.LIBCMT ref: 10006F91
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                                                                                • String ID:
                                                                                                • API String ID: 615853336-0
                                                                                                • Opcode ID: d1b741ba0380379decb7d1b22a74743c7f5a7046d8fc72408544d039aac17dad
                                                                                                • Instruction ID: bc3bc25b656f4220cb3330c80879dd0d2e796a6a37b49e0188f73f67aa49fa4f
                                                                                                • Opcode Fuzzy Hash: d1b741ba0380379decb7d1b22a74743c7f5a7046d8fc72408544d039aac17dad
                                                                                                • Instruction Fuzzy Hash: C5F02D3980425BAAFB00DBA4DC91AAD3AE7EB496C0F300025F4149E0D5DFB1EBC0C740
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: 156.251.17.243$18852
                                                                                                • API String ID: 4218353326-1308403728
                                                                                                • Opcode ID: 7a5b0940f5dc559a11d2a5ed3215ae1df853b39988ae11aa72815fd5903c58ef
                                                                                                • Instruction ID: 371d5d2836eae61c8a3fd71d457a9910caa5e610245b5321427dac85da644e53
                                                                                                • Opcode Fuzzy Hash: 7a5b0940f5dc559a11d2a5ed3215ae1df853b39988ae11aa72815fd5903c58ef
                                                                                                • Instruction Fuzzy Hash: 784147B15002105FDB24EF25E884B9A7BB9FB46348F150A2DE145CBF45E73AD9488BA2
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen$Sleep
                                                                                                • String ID:
                                                                                                • API String ID: 2737124692-0
                                                                                                • Opcode ID: 9e21af3cc113b3ccfb31ee46756bd65c9300f444572b88d363d2df7a0cf23f57
                                                                                                • Instruction ID: d3057760001f9ab80fc9ff0e4a89a9ade28cb22d24a11c55ca6e1f10728c19e1
                                                                                                • Opcode Fuzzy Hash: 9e21af3cc113b3ccfb31ee46756bd65c9300f444572b88d363d2df7a0cf23f57
                                                                                                • Instruction Fuzzy Hash: 1D6159B2C012549BDB10CF65DC407DD7BB1FF4A318F15032AE855A7B84E7759A488FA2
                                                                                                APIs
                                                                                                  • Part of subcall function 6C361070: SetFileAttributesA.KERNEL32(?,00000001,?,0000000A,00000000,?,00000022,00000040,00000001), ref: 6C361124
                                                                                                  • Part of subcall function 6C361070: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C36115F
                                                                                                • Sleep.KERNEL32(000000C8), ref: 6C363DFC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesFileIos_base_dtorSleepstd::ios_base::_
                                                                                                • String ID: $jIk
                                                                                                • API String ID: 3742752172-1761899760
                                                                                                • Opcode ID: 358b47e2981f8e7075a2c93e06165ee5a85264b8ad1fb4906ba72afcb929bb96
                                                                                                • Instruction ID: a5464d535e5be01ac70f323bcd619d04badb252f0e46c6a75b09f02f311b4185
                                                                                                • Opcode Fuzzy Hash: 358b47e2981f8e7075a2c93e06165ee5a85264b8ad1fb4906ba72afcb929bb96
                                                                                                • Instruction Fuzzy Hash: 4E5102B1D042948FDB10CF64C8407EDBBB2BF5A304F158299D88877646EBB46AC9CF91
                                                                                                APIs
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 03D3316B
                                                                                                • InterlockedExchange.KERNEL32(?,00000001), ref: 03D33183
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 03D3322F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CurrentThread$ExchangeInterlocked
                                                                                                • String ID:
                                                                                                • API String ID: 4033114805-0
                                                                                                • Opcode ID: 3e074674ce42a29a1a2e3f3ae78482f564663f5ff326e03437d71b0137db3307
                                                                                                • Instruction ID: b6f9e7f2b3526f07f35553f58da45f845b7adfe8220898fdc94c9bdc224d18c4
                                                                                                • Opcode Fuzzy Hash: 3e074674ce42a29a1a2e3f3ae78482f564663f5ff326e03437d71b0137db3307
                                                                                                • Instruction Fuzzy Hash: 42319A79200702AFDB28EF69CA84A66B3E8FF45704B14C56DE85ACB614D731FC45CB90
                                                                                                APIs
                                                                                                • __floor_pentium4.LIBCMT ref: 100011E9
                                                                                                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 10001226
                                                                                                • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 10001255
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Virtual$AllocFree__floor_pentium4
                                                                                                • String ID:
                                                                                                • API String ID: 2605973128-0
                                                                                                • Opcode ID: 7c8a02711727f2d10f68a554ded2e2394815aae473f82a087a4a6f69535250f3
                                                                                                • Instruction ID: 68b1d39f7c788df30121c4cd9fa650265093b70568a06a1b8131812e88253602
                                                                                                • Opcode Fuzzy Hash: 7c8a02711727f2d10f68a554ded2e2394815aae473f82a087a4a6f69535250f3
                                                                                                • Instruction Fuzzy Hash: EB21D170A00709AFEB14DFA9DC85B9EFBF4FF44745F00C5ADE949E2644EA30A8108790
                                                                                                APIs
                                                                                                • __floor_pentium4.LIBCMT ref: 03D311E9
                                                                                                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 03D31226
                                                                                                • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 03D31255
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Virtual$AllocFree__floor_pentium4
                                                                                                • String ID:
                                                                                                • API String ID: 2605973128-0
                                                                                                • Opcode ID: 59468bf6377db75804b393ef7387b39fd2ba22b4faba2d5203c1a248fb738291
                                                                                                • Instruction ID: b44899b1d6a942739910dd1c1d45a7b68b2d7590486f3e442252560c34ba36cc
                                                                                                • Opcode Fuzzy Hash: 59468bf6377db75804b393ef7387b39fd2ba22b4faba2d5203c1a248fb738291
                                                                                                • Instruction Fuzzy Hash: 7F21A475E007099FDB10EFADD845B6EF7F9EF41B05F0089ADE859E2640E630AD148750
                                                                                                APIs
                                                                                                • __floor_pentium4.LIBCMT ref: 1000112F
                                                                                                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 1000115F
                                                                                                • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 10001192
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Virtual$AllocFree__floor_pentium4
                                                                                                • String ID:
                                                                                                • API String ID: 2605973128-0
                                                                                                • Opcode ID: 9a9a6dbc4d50d479c69aa6d6b662a424f68bc22565965440325d2e32c173b15c
                                                                                                • Instruction ID: ccfbffdb8cfccccbf267e057733e19453fb850e329b77576dd89ff791b5dae30
                                                                                                • Opcode Fuzzy Hash: 9a9a6dbc4d50d479c69aa6d6b662a424f68bc22565965440325d2e32c173b15c
                                                                                                • Instruction Fuzzy Hash: 77119670A00709ABEB14DFA9DC86B9EF7F4FF04745F008569EE59D2240E671A9148750
                                                                                                APIs
                                                                                                • __floor_pentium4.LIBCMT ref: 03D3112F
                                                                                                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 03D3115F
                                                                                                • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 03D31192
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Virtual$AllocFree__floor_pentium4
                                                                                                • String ID:
                                                                                                • API String ID: 2605973128-0
                                                                                                • Opcode ID: 78486ef1c3f11141ff5937245c999dd12bec9580338e1fd7d88c4de80fe07cd7
                                                                                                • Instruction ID: 76010a51a1af646b7d9576d4b9912505d6d0481ba9eaf121c90e3d3e342a5651
                                                                                                • Opcode Fuzzy Hash: 78486ef1c3f11141ff5937245c999dd12bec9580338e1fd7d88c4de80fe07cd7
                                                                                                • Instruction Fuzzy Hash: B4119371E00709AFDB10AFA9DC85B6EFBF8FF05705F0085A9E959E2240E670A9148751
                                                                                                APIs
                                                                                                • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 03D39E04
                                                                                                • GdipDisposeImage.GDIPLUS(?), ref: 03D39E18
                                                                                                • GdipDisposeImage.GDIPLUS(?), ref: 03D39E3B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Gdip$DisposeImage$BitmapCreateFromStream
                                                                                                • String ID:
                                                                                                • API String ID: 800915452-0
                                                                                                • Opcode ID: ea7965a8e23e5a419d1fd9bc524e70a4042b08eaef4b600e750a4c90791a0427
                                                                                                • Instruction ID: e46a23290415b03c53595a801fc25f4131f80f4c9e7b059c5ef1533683adedae
                                                                                                • Opcode Fuzzy Hash: ea7965a8e23e5a419d1fd9bc524e70a4042b08eaef4b600e750a4c90791a0427
                                                                                                • Instruction Fuzzy Hash: 2BF08C72D01229AB8B10EF94D8448AEF7B9EB49B11B00864AFC05BB340D7709E09CBE0
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(03D5FB64), ref: 03D39ADC
                                                                                                • GdiplusStartup.GDIPLUS(03D5FB60,?,?), ref: 03D39B15
                                                                                                • LeaveCriticalSection.KERNEL32(03D5FB64), ref: 03D39B26
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterGdiplusLeaveStartup
                                                                                                • String ID:
                                                                                                • API String ID: 389129658-0
                                                                                                • Opcode ID: 50ba9c20d885b128c8676328cbe3993d67278f3886b1f9ce0140aea6c1493079
                                                                                                • Instruction ID: 74089abc337b9b9901426ad1a6b07e03f1341dfc6e67b8ac22884fd216ff318b
                                                                                                • Opcode Fuzzy Hash: 50ba9c20d885b128c8676328cbe3993d67278f3886b1f9ce0140aea6c1493079
                                                                                                • Instruction Fuzzy Hash: 67F0CD32941309DFDB01EFE1E87A7AEB7BCF705701F400299E82456240C7B24648CBA1
                                                                                                APIs
                                                                                                • DeleteFileW.KERNEL32(6C3751D8,?,6C3751D8,?,?,?,0000000F), ref: 6C383586
                                                                                                • GetLastError.KERNEL32(?,6C3751D8,?,?,?,0000000F), ref: 6C383590
                                                                                                • __dosmaperr.LIBCMT ref: 6C383597
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: DeleteErrorFileLast__dosmaperr
                                                                                                • String ID:
                                                                                                • API String ID: 1545401867-0
                                                                                                • Opcode ID: 603ced8a0b1df31991b00b2eeb56012b940cf978025155a7103a8cdaaecb46d5
                                                                                                • Instruction ID: de00600561331a776904c78234d67c7fc76eee2f4d1c89e705ee74a0f0167cdd
                                                                                                • Opcode Fuzzy Hash: 603ced8a0b1df31991b00b2eeb56012b940cf978025155a7103a8cdaaecb46d5
                                                                                                • Instruction Fuzzy Hash: 28D0C932209108A78E101EB6AC0D95A3BAC9A823793240655F42DC65D0EA27C8509961
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Sleep
                                                                                                • String ID: 156.251.17.243$17093
                                                                                                • API String ID: 3472027048-3225327204
                                                                                                • Opcode ID: 4513ec0b7f0e3245ec74d41a3833d4d9c4567df1cbadf7205a2421670dd53040
                                                                                                • Instruction ID: d4922cd372dd7236031f7b79510b5f56ce2b8beeb54c8bf7640301d5853f9da9
                                                                                                • Opcode Fuzzy Hash: 4513ec0b7f0e3245ec74d41a3833d4d9c4567df1cbadf7205a2421670dd53040
                                                                                                • Instruction Fuzzy Hash: C9D023F0604871CBE928C500DC5447A7375F7C42513940105FC479B144CB74FC08D550
                                                                                                APIs
                                                                                                • __getptd_noexit.LIBCMT ref: 1000715B
                                                                                                  • Part of subcall function 10009896: GetLastError.KERNEL32(00000001,00000000,10007112,10006F0C,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F), ref: 1000989A
                                                                                                  • Part of subcall function 10009896: ___set_flsgetvalue.LIBCMT ref: 100098A8
                                                                                                  • Part of subcall function 10009896: __calloc_crt.LIBCMT ref: 100098BC
                                                                                                  • Part of subcall function 10009896: DecodePointer.KERNEL32(00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000,?,100099BA), ref: 100098D6
                                                                                                  • Part of subcall function 10009896: GetCurrentThreadId.KERNEL32 ref: 100098EC
                                                                                                  • Part of subcall function 10009896: SetLastError.KERNEL32(00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000,?,100099BA), ref: 10009904
                                                                                                • __freeptd.LIBCMT ref: 10007165
                                                                                                  • Part of subcall function 10009A58: TlsGetValue.KERNEL32(?,?,10007711,00000000,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009A79
                                                                                                  • Part of subcall function 10009A58: TlsGetValue.KERNEL32(?,?,10007711,00000000,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009A8B
                                                                                                  • Part of subcall function 10009A58: DecodePointer.KERNEL32(00000000,?,10007711,00000000,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009AA1
                                                                                                  • Part of subcall function 10009A58: __freefls@4.LIBCMT ref: 10009AAC
                                                                                                  • Part of subcall function 10009A58: TlsSetValue.KERNEL32(0000001F,00000000,?,10007711,00000000,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009ABE
                                                                                                • ExitThread.KERNEL32 ref: 1000716E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Value$DecodeErrorLastPointerThread$CurrentExit___set_flsgetvalue__calloc_crt__freefls@4__freeptd__getptd_noexit
                                                                                                • String ID:
                                                                                                • API String ID: 4224061863-0
                                                                                                • Opcode ID: 13d03437f215ed93d40a7d70e196fa756bd6aa96be3d41e5933ba2785ed1d9c5
                                                                                                • Instruction ID: 88b9861ec1dd8ad2b25034eab61c1c94f8d4b81d5381debfb6d8fd2c6c03db1f
                                                                                                • Opcode Fuzzy Hash: 13d03437f215ed93d40a7d70e196fa756bd6aa96be3d41e5933ba2785ed1d9c5
                                                                                                • Instruction Fuzzy Hash: 79C02B3050060C7BFB00A776CC0E95F3A8DDF811C1F668010F80CC5159EE38FC008291
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: DeleteFile
                                                                                                • String ID: '
                                                                                                • API String ID: 4033686569-1997036262
                                                                                                • Opcode ID: e6891a2af0921ce2b8b695b68244b525be374e52c3ce6aec3c1c4da91092cda0
                                                                                                • Instruction ID: 6698aea1e67c3925cfbfc1e9edc4e7941cce3133a92d7d794b69ca9c08621980
                                                                                                • Opcode Fuzzy Hash: e6891a2af0921ce2b8b695b68244b525be374e52c3ce6aec3c1c4da91092cda0
                                                                                                • Instruction Fuzzy Hash: 25C12C72D200244BDB2CDA25CCA47ADBA63EF41314F194768E45AA7FD8CB319EC48F91
                                                                                                APIs
                                                                                                • WSAStartup.WS2_32(00000202,?), ref: 6C36685B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Startup
                                                                                                • String ID: 156.251.17.243
                                                                                                • API String ID: 724789610-3008411706
                                                                                                • Opcode ID: e565b792454f9c0a0e265ffac5ba3aac4ed26416fdd6a3387a183f48cda87f54
                                                                                                • Instruction ID: f569c8a448f12cef828d77886a4221f8492bc665a24f7c317567775aa114f8b3
                                                                                                • Opcode Fuzzy Hash: e565b792454f9c0a0e265ffac5ba3aac4ed26416fdd6a3387a183f48cda87f54
                                                                                                • Instruction Fuzzy Hash: 0BE065714183419BE300DF11C908BABBAF8EFDA30CF015B0DF4C455181D3B956888B57
                                                                                                APIs
                                                                                                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 03BB022B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557383262.0000000003BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 03BB0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3bb0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: 173a0753eb1870a11fb702d1a013be029f39be02b255bbe32865f3a9974466fd
                                                                                                • Instruction ID: 06347bd5fea93960385c3ec9b4a641d986c9673ada9abfb1a32f8722ef4a503d
                                                                                                • Opcode Fuzzy Hash: 173a0753eb1870a11fb702d1a013be029f39be02b255bbe32865f3a9974466fd
                                                                                                • Instruction Fuzzy Hash: 19A14D70A00606EFDB14DFA9C884ABEB7B5FF48308F1881B9E455D7251DBB0EA51CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 456794935966b840b6179626dd84585e3184b1579eebac781d3ef3b74d832189
                                                                                                • Instruction ID: 1f14294338ad31745c095728d8fa0d29473f4bd21cf7f95f65a7d27c0ce3ae2f
                                                                                                • Opcode Fuzzy Hash: 456794935966b840b6179626dd84585e3184b1579eebac781d3ef3b74d832189
                                                                                                • Instruction Fuzzy Hash: 39911E74A00744CFDB04CF29C880B9ABBB2FF89314F148669E8599BB95D731E945CFA1
                                                                                                APIs
                                                                                                  • Part of subcall function 6C3815C6: GetConsoleOutputCP.KERNEL32(CDB86E77,00000000,00000000,?), ref: 6C381629
                                                                                                • WriteFile.KERNEL32(?,6C3807FB,00000000,6C38B0A5,00000000,6C3807FB,00000000,00000000,?,6C38B0A5,00000000,00000000,6C38AFE2,6C3807FB,00000000,?), ref: 6C3813A1
                                                                                                • GetLastError.KERNEL32(?,6C38B0A5,00000000,00000000,6C38AFE2,6C3807FB,00000000,?,6C38A281,00000000,6C3807FB), ref: 6C3813AB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConsoleErrorFileLastOutputWrite
                                                                                                • String ID:
                                                                                                • API String ID: 2915228174-0
                                                                                                • Opcode ID: e1404d6bb19af682fb5cc47c18aec296e1f9c8899ed470d4a57bda9a93bb1d2c
                                                                                                • Instruction ID: 2e16bee645d65bda0b3e0b04f7f52104b94752463c2a9df704534674b65d5ee7
                                                                                                • Opcode Fuzzy Hash: e1404d6bb19af682fb5cc47c18aec296e1f9c8899ed470d4a57bda9a93bb1d2c
                                                                                                • Instruction Fuzzy Hash: B561B472D16119AFDF01CFA8C840EEEBBB9AF4A30CF140189E961A7645D372D905CFA1
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __fread_nolock
                                                                                                • String ID:
                                                                                                • API String ID: 2638373210-0
                                                                                                • Opcode ID: bb58a6a0a802cbbd7d4787d1b2aa3885e63c8cef58e2f1b244c96a4b348c1e1e
                                                                                                • Instruction ID: 66c41ed2ce3d017a41aeec4d9ff2abea72f2369e13bb36596966f4e9e25a6a64
                                                                                                • Opcode Fuzzy Hash: bb58a6a0a802cbbd7d4787d1b2aa3885e63c8cef58e2f1b244c96a4b348c1e1e
                                                                                                • Instruction Fuzzy Hash: 475127757042148FC7008E2DC880F6AB3E5AF89718F56862DF899CB790D632EC15CFA1
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Time_memmovetime
                                                                                                • String ID:
                                                                                                • API String ID: 1463837790-0
                                                                                                • Opcode ID: aa203b2cbda9aec0713802ee616a91a989bc0421ef3b69a448573314bddc25cc
                                                                                                • Instruction ID: 7472951ecdc6142c721ad3348498c8fe017ad8d952fa801f9fd3c423b9f36496
                                                                                                • Opcode Fuzzy Hash: aa203b2cbda9aec0713802ee616a91a989bc0421ef3b69a448573314bddc25cc
                                                                                                • Instruction Fuzzy Hash: A5519F767006029FE316CF69C8C0A9BB7A9FF48294715C669E919CB709DB31FC51CB90
                                                                                                APIs
                                                                                                  • Part of subcall function 6C373EF1: GetSystemTimeAsFileTime.KERNEL32(6C351A64,?,?,?,?,?,6C351A64,00000000), ref: 6C373F06
                                                                                                  • Part of subcall function 6C373EF1: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C373F25
                                                                                                • Sleep.KERNEL32(00000064), ref: 6C351B6C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Time$FileSleepSystemUnothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                • String ID: gfff
                                                                                                • API String ID: 2563648476-1553575800
                                                                                                • Opcode ID: 1bd66941009d79cca3a537edd904f6f71920f42d7adde81799d11f061b76c0fb
                                                                                                • Instruction ID: 0be2b36267e80a147f55d19b77a5580346ebb7d1fb810c26dc0f38aa337a8b7c
                                                                                                • Opcode Fuzzy Hash: 1bd66941009d79cca3a537edd904f6f71920f42d7adde81799d11f061b76c0fb
                                                                                                • Instruction Fuzzy Hash: 4C51E2B1E002488FDB14CFA9D804BEDBBB8EB05318F848229D015E7B90F7759559CFA2
                                                                                                APIs
                                                                                                • __RTC_Initialize.LIBCMT ref: 6C36CE68
                                                                                                  • Part of subcall function 6C36D21A: InitializeSListHead.KERNEL32(6C39CA10,6C36CE72,6C399C08,00000010,6C36D00B,?,00000000,?,00000007,6C399C28,00000010,6C36D01E,?,?,6C36D0A7,?), ref: 6C36D21F
                                                                                                • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6C36CED2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                                                                                • String ID:
                                                                                                • API String ID: 3231365870-0
                                                                                                • Opcode ID: c82b5133a77572ed366aa80486bdb4e882869a6ab18ac1bc9f957fdaa18b0fa1
                                                                                                • Instruction ID: f373bfe47975cbade857248f89de7153d40c1e44e1a691c20ecdde805c7fdaf8
                                                                                                • Opcode Fuzzy Hash: c82b5133a77572ed366aa80486bdb4e882869a6ab18ac1bc9f957fdaa18b0fa1
                                                                                                • Instruction Fuzzy Hash: 8C2107323452519ADF00BFBAB8007D837B0AB4776DF204819D4856BFC5EB7750098E67
                                                                                                APIs
                                                                                                • select.WS2_32(00000000,?,00000000,00000000,00000000), ref: 10003023
                                                                                                • recv.WS2_32(?,?,00040000,00000000), ref: 10003044
                                                                                                  • Part of subcall function 1000710D: __getptd_noexit.LIBCMT ref: 1000710D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __getptd_noexitrecvselect
                                                                                                • String ID:
                                                                                                • API String ID: 4248608111-0
                                                                                                • Opcode ID: 5f82ec4551d51fc2b9ede6d926e0403675d3e155566f9d28381eb2444e2c218b
                                                                                                • Instruction ID: 1cbb114b02e0d86a534962cf0a51f77a1151a50c8d60f66bd4e8238187776ab9
                                                                                                • Opcode Fuzzy Hash: 5f82ec4551d51fc2b9ede6d926e0403675d3e155566f9d28381eb2444e2c218b
                                                                                                • Instruction Fuzzy Hash: 7F21E770A01318EBFB11DF64DC95B9B73B8EF053D0F1081A5E5095B199DBB1AD84CBA1
                                                                                                APIs
                                                                                                • select.WS2_32(00000000,?,00000000,00000000,00000000), ref: 03D33043
                                                                                                • recv.WS2_32(?,?,00040000,00000000), ref: 03D33064
                                                                                                  • Part of subcall function 03D3F91B: __getptd_noexit.LIBCMT ref: 03D3F91B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __getptd_noexitrecvselect
                                                                                                • String ID:
                                                                                                • API String ID: 4248608111-0
                                                                                                • Opcode ID: a39362b39482b5f069decb85f970ea69a2e6154a6a4edfe49f0e8cafa729b486
                                                                                                • Instruction ID: 1c6a93f4612efeda28a04a6d160b24783c034f90bf7e4fd7b9af4e549313253e
                                                                                                • Opcode Fuzzy Hash: a39362b39482b5f069decb85f970ea69a2e6154a6a4edfe49f0e8cafa729b486
                                                                                                • Instruction Fuzzy Hash: 6521B475A003089BDB20EF69DD84BDA77A8EF06710F1805A4E5449F290D7B0AD94CBB1
                                                                                                APIs
                                                                                                • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,6C381387,?,6C38A281,6C3807FB,00000000,6C3807FB,00000000), ref: 6C381A91
                                                                                                • GetLastError.KERNEL32(?,6C381387,?,6C38A281,6C3807FB,00000000,6C3807FB,00000000,00000000,?,6C38B0A5,00000000,00000000,6C38AFE2,6C3807FB,00000000), ref: 6C381AB7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorFileLastWrite
                                                                                                • String ID:
                                                                                                • API String ID: 442123175-0
                                                                                                • Opcode ID: fcabaabfa0c25b7d8a7e0d3b4bc77d7b536c0df0c2c71408f724a269e30cbb5e
                                                                                                • Instruction ID: fdc5670d04144bb49096b2a58f178d0b42ed5cdc868993fccbd2c3d46acff7d9
                                                                                                • Opcode Fuzzy Hash: fcabaabfa0c25b7d8a7e0d3b4bc77d7b536c0df0c2c71408f724a269e30cbb5e
                                                                                                • Instruction Fuzzy Hash: D321F132A112589FCF19CF29C8809DAB7BAEB49305F1441AAE956D7300E734EE46CF61
                                                                                                APIs
                                                                                                • SetFileAttributesA.KERNEL32(?,00000001,?,0000000A,00000000,?,00000022,00000040,00000001), ref: 6C361124
                                                                                                • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C36115F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesFileIos_base_dtorstd::ios_base::_
                                                                                                • String ID:
                                                                                                • API String ID: 2738015347-0
                                                                                                • Opcode ID: 3e22448656397829638dfdc4760c4f2e3cfafc603839e0775d713defbfd44432
                                                                                                • Instruction ID: 1cb5b82088869c12e7adf904a06ac7c7e8cfb917f93eba029851fd3ecadba420
                                                                                                • Opcode Fuzzy Hash: 3e22448656397829638dfdc4760c4f2e3cfafc603839e0775d713defbfd44432
                                                                                                • Instruction Fuzzy Hash: 66314875601B009FE724CF29C845B96BBA5FB45724F408A1CE5AA8BB91D731E944CF81
                                                                                                APIs
                                                                                                • __RTC_Initialize.LIBCMT ref: 6C36CF69
                                                                                                • ___scrt_uninitialize_crt.LIBCMT ref: 6C36CF83
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Initialize___scrt_uninitialize_crt
                                                                                                • String ID:
                                                                                                • API String ID: 2442719207-0
                                                                                                • Opcode ID: c592ed8bcf4a649811c67f08d2f9d36c460a5a5e3fd0a4e5c5583e1971f8446b
                                                                                                • Instruction ID: f0ccf62f8a6efb2e52a8b21a89caec41d325307404c06231a8fd2f5e83ae94cd
                                                                                                • Opcode Fuzzy Hash: c592ed8bcf4a649811c67f08d2f9d36c460a5a5e3fd0a4e5c5583e1971f8446b
                                                                                                • Instruction Fuzzy Hash: F721F673A082559BCF00BFBBA8003DD7BA4EB0675DF20441AD09496E88DB7685058FA6
                                                                                                APIs
                                                                                                • send.WS2_32(?,?,00040000,00000000), ref: 03D33291
                                                                                                • send.WS2_32(?,?,?,00000000), ref: 03D332CE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: send
                                                                                                • String ID:
                                                                                                • API String ID: 2809346765-0
                                                                                                • Opcode ID: 4f435bf9f94639cb08317499c90ab71670c6eaee3839a63989ad8aa6f8b20a4e
                                                                                                • Instruction ID: 951d2db36f2f761d4d50e423152db15ee0fbc4454882d10dcf55b82911f187d3
                                                                                                • Opcode Fuzzy Hash: 4f435bf9f94639cb08317499c90ab71670c6eaee3839a63989ad8aa6f8b20a4e
                                                                                                • Instruction Fuzzy Hash: FC11E57FB09304BBD760CA6EDE88B5EB799FB42764F184025E918DB290D270AE418750
                                                                                                APIs
                                                                                                • SetFilePointerEx.KERNEL32(00000000,00000000,?,00008000,6C35BBBA,00008000,6C3807FB,?,?,?,6C37FD04,6C3807FB,?,00000000,6C35BBBA,?), ref: 6C37FEB8
                                                                                                • GetLastError.KERNEL32(00000000,?,?,?,6C37FD04,6C3807FB,?,00000000,6C35BBBA,?,00000000,00008000,6C3807FB,?,?,6C389C04), ref: 6C37FEC5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorFileLastPointer
                                                                                                • String ID:
                                                                                                • API String ID: 2976181284-0
                                                                                                • Opcode ID: bcdc69f0feb8e582d2a328e50e7e51ff2ecef5cb4df282427b4a2b7a86c44b84
                                                                                                • Instruction ID: 84c3dc0b7e4bfe4a2d7226bbe142bbebef2d1fd8321fc26fe1ed2ef9df7b28af
                                                                                                • Opcode Fuzzy Hash: bcdc69f0feb8e582d2a328e50e7e51ff2ecef5cb4df282427b4a2b7a86c44b84
                                                                                                • Instruction Fuzzy Hash: 05012632628255AFCF158F59CC4989E3B79EF8A324B240248F8519BAD1E676D941CFA0
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: SleepTimetime
                                                                                                • String ID:
                                                                                                • API String ID: 346578373-0
                                                                                                • Opcode ID: 306b1d3a46dce6522edd8cfdaf26c6c38e0bc8121be3e04cf2ef1a2578d2637d
                                                                                                • Instruction ID: 27fac5dcdbeed923c3366fb10e8a319fa95706dbc2a1d72b4a6ad2049d896b26
                                                                                                • Opcode Fuzzy Hash: 306b1d3a46dce6522edd8cfdaf26c6c38e0bc8121be3e04cf2ef1a2578d2637d
                                                                                                • Instruction Fuzzy Hash: B501DF31A00206AFE302DF65C8C4BABB3F9FB99381F108624D1018B294C771ADD6C7E1
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: SleepTimetime
                                                                                                • String ID:
                                                                                                • API String ID: 346578373-0
                                                                                                • Opcode ID: ad748ac81baa980ffddc9e33949654f93e5d34086a3ca516bf61842d2155d36e
                                                                                                • Instruction ID: 0eb13372e96858476a41caf295afdaa0c0fc076156ff5a714611e99549f3271b
                                                                                                • Opcode Fuzzy Hash: ad748ac81baa980ffddc9e33949654f93e5d34086a3ca516bf61842d2155d36e
                                                                                                • Instruction Fuzzy Hash: DA01F739600205AFD311DF28C8C8B69F7B5FB5A701F184264D10447294C771ADCAC7D1
                                                                                                APIs
                                                                                                • HeapCreate.KERNEL32(00000004,00000000,00000000,?,00000000,10005AF2), ref: 1000642B
                                                                                                • _free.LIBCMT ref: 10006466
                                                                                                  • Part of subcall function 10001280: __CxxThrowException@8.LIBCMT ref: 10001290
                                                                                                  • Part of subcall function 10001280: DeleteCriticalSection.KERNEL32(00000000,?,10017E78), ref: 100012A1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateCriticalDeleteException@8HeapSectionThrow_free
                                                                                                • String ID:
                                                                                                • API String ID: 1116298128-0
                                                                                                • Opcode ID: a128095ffdd49348268c3586f1fd9261e0840fd0acd737389bb6af715d81e8f7
                                                                                                • Instruction ID: d75aab6d42964042dd9719b22c7254e4122bf8c787039a32894d973a0e8f9c7d
                                                                                                • Opcode Fuzzy Hash: a128095ffdd49348268c3586f1fd9261e0840fd0acd737389bb6af715d81e8f7
                                                                                                • Instruction Fuzzy Hash: D6017EF4A00B408FD321CF6A8884A47FAF9FF98750B104A1EE2DAC7A10D770A545CF55
                                                                                                APIs
                                                                                                • HeapCreate.KERNEL32(00000004,00000000,00000000,03D3E04E,00000000,03D39800,?,?,?,00000000,03D5125B,000000FF,?,03D3E04E), ref: 03D3CD1B
                                                                                                • _free.LIBCMT ref: 03D3CD56
                                                                                                  • Part of subcall function 03D31280: __CxxThrowException@8.LIBCMT ref: 03D31290
                                                                                                  • Part of subcall function 03D31280: DeleteCriticalSection.KERNEL32(00000000,03D3D3E6,03D56624,?,?,03D3D3E6,?,?,?,?,03D55A40,00000000), ref: 03D312A1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateCriticalDeleteException@8HeapSectionThrow_free
                                                                                                • String ID:
                                                                                                • API String ID: 1116298128-0
                                                                                                • Opcode ID: 350c9da8389c817fcc26b88aa61753701413a2874bf6cd7b5f6dbd18a18e51ee
                                                                                                • Instruction ID: 84f35b2c2d555b276ff96d4de8dde360341de9f2a5643f8b477334dd62ba7449
                                                                                                • Opcode Fuzzy Hash: 350c9da8389c817fcc26b88aa61753701413a2874bf6cd7b5f6dbd18a18e51ee
                                                                                                • Instruction Fuzzy Hash: 32017AB5A00B448FC730DF6A9844A17FAE8FF99700B504A1EE2DACBB20D370A505CF65
                                                                                                APIs
                                                                                                • CreateThread.KERNEL32(00000000,00000000,03D3DF10,00000000,00000000,00000000), ref: 03D3E49B
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,03D41168,?,?,?,?,?,?,03D56298,0000000C,03D41210,?), ref: 03D3E4A9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateObjectSingleThreadWait
                                                                                                • String ID:
                                                                                                • API String ID: 1891408510-0
                                                                                                • Opcode ID: 60a76517948e20c7ae8a74cf73e0760ad942780e67e3978e028ff010031263b2
                                                                                                • Instruction ID: 65e4f7d0626aec4bd04571c9c4f298cd76028526f2c2811a59ed5e9d8b036848
                                                                                                • Opcode Fuzzy Hash: 60a76517948e20c7ae8a74cf73e0760ad942780e67e3978e028ff010031263b2
                                                                                                • Instruction Fuzzy Hash: 74E012B2444309BFDB10EB65AC85E3633ACD709730B104615FA21D2388D531DD548A70
                                                                                                APIs
                                                                                                • __getptd.LIBCMT ref: 10007181
                                                                                                  • Part of subcall function 1000990F: __getptd_noexit.LIBCMT ref: 10009912
                                                                                                  • Part of subcall function 1000990F: __amsg_exit.LIBCMT ref: 1000991F
                                                                                                  • Part of subcall function 10007156: __getptd_noexit.LIBCMT ref: 1000715B
                                                                                                  • Part of subcall function 10007156: __freeptd.LIBCMT ref: 10007165
                                                                                                  • Part of subcall function 10007156: ExitThread.KERNEL32 ref: 1000716E
                                                                                                • __XcptFilter.LIBCMT ref: 100071A2
                                                                                                  • Part of subcall function 10009C41: __getptd_noexit.LIBCMT ref: 10009C47
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __getptd_noexit$ExitFilterThreadXcpt__amsg_exit__freeptd__getptd
                                                                                                • String ID:
                                                                                                • API String ID: 418257734-0
                                                                                                • Opcode ID: 297936fcc0dbf5f526c0e08448a2f351abf61589ee907ea93caa2c8fedee672a
                                                                                                • Instruction ID: 91050fa4c4edb40f5b5d990f834f761f3b027d6385ed46559f27b3ea4901cb17
                                                                                                • Opcode Fuzzy Hash: 297936fcc0dbf5f526c0e08448a2f351abf61589ee907ea93caa2c8fedee672a
                                                                                                • Instruction Fuzzy Hash: 76E0ECB9904604DFF718DBA0C956E6E7775EF44241F210049F1015B2A6CB35B940DB24
                                                                                                APIs
                                                                                                • __getptd.LIBCMT ref: 03D3F98F
                                                                                                  • Part of subcall function 03D43E5B: __getptd_noexit.LIBCMT ref: 03D43E5E
                                                                                                  • Part of subcall function 03D43E5B: __amsg_exit.LIBCMT ref: 03D43E6B
                                                                                                  • Part of subcall function 03D3F964: __getptd_noexit.LIBCMT ref: 03D3F969
                                                                                                  • Part of subcall function 03D3F964: __freeptd.LIBCMT ref: 03D3F973
                                                                                                  • Part of subcall function 03D3F964: ExitThread.KERNEL32 ref: 03D3F97C
                                                                                                • __XcptFilter.LIBCMT ref: 03D3F9B0
                                                                                                  • Part of subcall function 03D4418F: __getptd_noexit.LIBCMT ref: 03D44195
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __getptd_noexit$ExitFilterThreadXcpt__amsg_exit__freeptd__getptd
                                                                                                • String ID:
                                                                                                • API String ID: 418257734-0
                                                                                                • Opcode ID: 16634501e7087382aec08351a494c9c1f2c4952906f8809a28393a6f6492ff0d
                                                                                                • Instruction ID: 74a561165c9d6995dc9df97e76885c76e855039d658042f9c6afb64d368e2d56
                                                                                                • Opcode Fuzzy Hash: 16634501e7087382aec08351a494c9c1f2c4952906f8809a28393a6f6492ff0d
                                                                                                • Instruction Fuzzy Hash: B3E0ECB9940704EFDB18EBA5D805F7D7779EF45A11F200148E1016F2A1CB799944DA30
                                                                                                APIs
                                                                                                • __lock.LIBCMT ref: 03D4641B
                                                                                                  • Part of subcall function 03D48E5B: __mtinitlocknum.LIBCMT ref: 03D48E71
                                                                                                  • Part of subcall function 03D48E5B: __amsg_exit.LIBCMT ref: 03D48E7D
                                                                                                  • Part of subcall function 03D48E5B: EnterCriticalSection.KERNEL32(00000000,00000000,?,03D43F06,0000000D,03D56340,00000008,03D43FFF,00000000,?,03D410F0,00000000,03D56278,00000008,03D41155,?), ref: 03D48E85
                                                                                                • __tzset_nolock.LIBCMT ref: 03D4642C
                                                                                                  • Part of subcall function 03D45D22: __lock.LIBCMT ref: 03D45D44
                                                                                                  • Part of subcall function 03D45D22: ____lc_codepage_func.LIBCMT ref: 03D45D8B
                                                                                                  • Part of subcall function 03D45D22: __getenv_helper_nolock.LIBCMT ref: 03D45DAD
                                                                                                  • Part of subcall function 03D45D22: _free.LIBCMT ref: 03D45DE4
                                                                                                  • Part of subcall function 03D45D22: _strlen.LIBCMT ref: 03D45DEB
                                                                                                  • Part of subcall function 03D45D22: __malloc_crt.LIBCMT ref: 03D45DF2
                                                                                                  • Part of subcall function 03D45D22: _strlen.LIBCMT ref: 03D45E08
                                                                                                  • Part of subcall function 03D45D22: _strcpy_s.LIBCMT ref: 03D45E16
                                                                                                  • Part of subcall function 03D45D22: __invoke_watson.LIBCMT ref: 03D45E2B
                                                                                                  • Part of subcall function 03D45D22: _free.LIBCMT ref: 03D45E3A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __lock_free_strlen$CriticalEnterSection____lc_codepage_func__amsg_exit__getenv_helper_nolock__invoke_watson__malloc_crt__mtinitlocknum__tzset_nolock_strcpy_s
                                                                                                • String ID:
                                                                                                • API String ID: 1828324828-0
                                                                                                • Opcode ID: 39c238c4606e00bf903e7cbeffba88b18a83f059629d32f28c4390f499e357b6
                                                                                                • Instruction ID: 0718f9778ae7a69e4b701af8bda0fc30d3e7b8758ff1fe8e5663fd96511b7108
                                                                                                • Opcode Fuzzy Hash: 39c238c4606e00bf903e7cbeffba88b18a83f059629d32f28c4390f499e357b6
                                                                                                • Instruction Fuzzy Hash: 32E0123ADC9714D7CA62FBF1B50660C7270EB95F21F944159E46529184CAB04581D673
                                                                                                APIs
                                                                                                • lstrlenW.KERNEL32(|p1:156.251.17.243|o1:17093|t1:1|p2:156.251.17.243|o2:17094|t2:1|p3:156.251.17.243|o3:17095|t3:1|dd:1|cl:1|fz:), ref: 10004755
                                                                                                  • Part of subcall function 10003260: __wcsrev.LIBCMT ref: 10020655
                                                                                                Strings
                                                                                                • |p1:156.251.17.243|o1:17093|t1:1|p2:156.251.17.243|o2:17094|t2:1|p3:156.251.17.243|o3:17095|t3:1|dd:1|cl:1|fz:, xrefs: 10004750
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __wcsrevlstrlen
                                                                                                • String ID: |p1:156.251.17.243|o1:17093|t1:1|p2:156.251.17.243|o2:17094|t2:1|p3:156.251.17.243|o3:17095|t3:1|dd:1|cl:1|fz:
                                                                                                • API String ID: 4062721203-1085766062
                                                                                                • Opcode ID: ef503d5516fdfa215c481ae33ec846e637023be3d257a54ad483c27845c77df4
                                                                                                • Instruction ID: 3065bb4344b1789bcecd08ba6036c617636919b35652953f12b0e4d8e139a27a
                                                                                                • Opcode Fuzzy Hash: ef503d5516fdfa215c481ae33ec846e637023be3d257a54ad483c27845c77df4
                                                                                                • Instruction Fuzzy Hash: EFC08C72208214CFF202E3D4988876D7359EB33722F608039FA00CD012E672CC8097B1
                                                                                                APIs
                                                                                                • RegCloseKey.ADVAPI32(80000001,03D36E9A), ref: 03D36EC9
                                                                                                • RegCloseKey.ADVAPI32(75BF73E0), ref: 03D36ED2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Close
                                                                                                • String ID:
                                                                                                • API String ID: 3535843008-0
                                                                                                • Opcode ID: 71e57066c1ddd63a9281c11c50f10788a13085dd6f77470bec794dfa5515879a
                                                                                                • Instruction ID: d01206319dcfe9272a69493a67c463d79e3f08ed22d8ad914285549d40f676d9
                                                                                                • Opcode Fuzzy Hash: 71e57066c1ddd63a9281c11c50f10788a13085dd6f77470bec794dfa5515879a
                                                                                                • Instruction Fuzzy Hash: 94C09B73D0113857CF50F7A8FD4494D77B85F4C210F1144C2A104A3114C634BD41CF90
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(00000000,?,6C372F09,6C37CFC1,?,?,6C37A8E0,00000001,00000364,?,00000006,000000FF,?,?,6C375151), ref: 6C37A9E8
                                                                                                • SetLastError.KERNEL32(00000000,6C351A6D,00000000), ref: 6C37AA8A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 1452528299-0
                                                                                                • Opcode ID: f47e3496a0c53a97bd4e9f5348858925421f994ab6554e5d90e5b74e2e1bf278
                                                                                                • Instruction ID: b5045a26e5588815be28841cc9c8fca077214c8c397cfe449b049dd78db9ec6a
                                                                                                • Opcode Fuzzy Hash: f47e3496a0c53a97bd4e9f5348858925421f994ab6554e5d90e5b74e2e1bf278
                                                                                                • Instruction Fuzzy Hash: C011E93175C1146F9FB17AB59DC4E9B37ACAB036AC7101220F42196A90FB1EC808AF79
                                                                                                APIs
                                                                                                • CloseHandle.KERNEL32(00000000,?,00000000,?,6C380EE1,6C389DDA,?,00000000,00000000), ref: 6C380F48
                                                                                                • GetLastError.KERNEL32(?,00000000,?,6C380EE1,6C389DDA,?,00000000,00000000), ref: 6C380F52
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseErrorHandleLast
                                                                                                • String ID:
                                                                                                • API String ID: 918212764-0
                                                                                                • Opcode ID: 2101ba91b7f890d77681d43432b0b0194f765cf8db5a04c3737500d900f06dae
                                                                                                • Instruction ID: a07080596f79e74473a6c398f38cd7599c0d51a5865f14227d1b51340f8cacc1
                                                                                                • Opcode Fuzzy Hash: 2101ba91b7f890d77681d43432b0b0194f765cf8db5a04c3737500d900f06dae
                                                                                                • Instruction Fuzzy Hash: B9116B3362F1902AD60517759A4979D37AD8F8373CF254349E82CCBAC0EB33C4498A91
                                                                                                APIs
                                                                                                • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C3677F3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Ios_base_dtorstd::ios_base::_
                                                                                                • String ID:
                                                                                                • API String ID: 323602529-0
                                                                                                • Opcode ID: 08ce54f674a75fbf9a98568e073b73221e41f6a6b90a91e5293409461cea46f1
                                                                                                • Instruction ID: ae56eb196f496eee8e4f16ed360813cb0ec1b42668a17becc0b5c77c8cc97a23
                                                                                                • Opcode Fuzzy Hash: 08ce54f674a75fbf9a98568e073b73221e41f6a6b90a91e5293409461cea46f1
                                                                                                • Instruction Fuzzy Hash: 1E8178B1910B018BD324CF25C880BA6B7E5FF49308F548A2DD4AA87F80E771B588CF91
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 8673709664c162c8c2f13b8aab13228326c1c3842221c57f7e7391fcc264150f
                                                                                                • Instruction ID: ee7ceaa430b1bd02bf130a948cfca564c1f7209674ff4f960cb219104ed972e2
                                                                                                • Opcode Fuzzy Hash: 8673709664c162c8c2f13b8aab13228326c1c3842221c57f7e7391fcc264150f
                                                                                                • Instruction Fuzzy Hash: 6351F570A42144AFDB10CF58C881A9D7FB5EF8A328F288158F8496B751D372DE41CF91
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __wsopen_s
                                                                                                • String ID:
                                                                                                • API String ID: 3347428461-0
                                                                                                • Opcode ID: e269c99f12212e1bd70c502856553c5b6a404997cee200d4a904e8695fd62ab2
                                                                                                • Instruction ID: beba76c23755ae4f3f3c107159085c339a832ed99695f798073bc8923dfcb983
                                                                                                • Opcode Fuzzy Hash: e269c99f12212e1bd70c502856553c5b6a404997cee200d4a904e8695fd62ab2
                                                                                                • Instruction Fuzzy Hash: 5E114871A0520AAFCF05DF58E94099B7BF9EF88308F1540A9F809AB311DA71E911CFA5
                                                                                                APIs
                                                                                                • RtlAllocateHeap.NTDLL(00000008,00000001,00000000,?,03D4454A,00000000,00000001,00000000,00000000,00000000,?,03D43E0D,00000001,00000214,?,03D44500), ref: 03D4A735
                                                                                                  • Part of subcall function 03D3F91B: __getptd_noexit.LIBCMT ref: 03D3F91B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap__getptd_noexit
                                                                                                • String ID:
                                                                                                • API String ID: 328603210-0
                                                                                                • Opcode ID: 217299023c9aae79c279f9b5ba9b7bdae510e827bd92a4f85cd494e57ea8993b
                                                                                                • Instruction ID: 28f8a0b3ee832ae48f68e53cb7d7df590c587d72796a4daea4ddb44b8e35ce1e
                                                                                                • Opcode Fuzzy Hash: 217299023c9aae79c279f9b5ba9b7bdae510e827bd92a4f85cd494e57ea8993b
                                                                                                • Instruction Fuzzy Hash: A001D43A2813159FEF34DF25DD44B6B37B8AB81BA0F198569E815CB294D774D401CB50
                                                                                                APIs
                                                                                                • RtlAllocateHeap.NTDLL(00000008,00000001,00000000,?,10009FFA,00000000,00000001,00000000,00000000,00000000,?,100098C1,00000001,00000214,?,10009FB0), ref: 1000E598
                                                                                                  • Part of subcall function 1000710D: __getptd_noexit.LIBCMT ref: 1000710D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap__getptd_noexit
                                                                                                • String ID:
                                                                                                • API String ID: 328603210-0
                                                                                                • Opcode ID: d06f835299f278651632b800e6ea60e14773797a6a441bb7e279904f59b9ce12
                                                                                                • Instruction ID: 103cc215c0c144a9a87f3cbc911116c8ac8a7c4356fc0ca5ef77af160fbe558d
                                                                                                • Opcode Fuzzy Hash: d06f835299f278651632b800e6ea60e14773797a6a441bb7e279904f59b9ce12
                                                                                                • Instruction Fuzzy Hash: E9012435205A958EFB18CF24CC54B5A37D4EB853E6F018929E815AA0D4EB70DC00CB80
                                                                                                APIs
                                                                                                  • Part of subcall function 6C37A641: RtlAllocateHeap.NTDLL(00000000,6C37DBE2,?,?,6C37DBE2,00000220,?,?,?), ref: 6C37A673
                                                                                                • RtlReAllocateHeap.NTDLL(00000000,00000000,?,6C372C0C,00000000,?,6C37FC77,00000000,6C372C0C,000000FF,?,?,?,6C372CE6,?,000000FF), ref: 6C383572
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 1279760036-0
                                                                                                • Opcode ID: 281d925f38cac31b6bdcd93332545ed8c0537b226dc96eeb4c90e835c228811d
                                                                                                • Instruction ID: 8cd62388161afe139d417ed33277c6916e7f3a4d4724e95051729dc16c53858f
                                                                                                • Opcode Fuzzy Hash: 281d925f38cac31b6bdcd93332545ed8c0537b226dc96eeb4c90e835c228811d
                                                                                                • Instruction Fuzzy Hash: 6AF0C272207104A6DF611A2AAC00ABA27AC8FC2A68B204115E86497FD0EB26D7448DB6
                                                                                                APIs
                                                                                                • RtlAllocateHeap.NTDLL(00000008,?,?,?,6C37A8E0,00000001,00000364,?,00000006,000000FF,?,?,6C375151,?,6C351A6D,00000000), ref: 6C37CFB0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 1279760036-0
                                                                                                • Opcode ID: 672912008e3cc8dc837c3636caab3fc85eda4fb05d69aa29b191b8d3ff713ee6
                                                                                                • Instruction ID: bd96a969f1d274cf9b48248402642f176b41d7d97a09d7ad081fa83452fbc78f
                                                                                                • Opcode Fuzzy Hash: 672912008e3cc8dc837c3636caab3fc85eda4fb05d69aa29b191b8d3ff713ee6
                                                                                                • Instruction Fuzzy Hash: C2F0E93264652457EF317E36B804B4BB79CAF42768B248122EC14D6980EB3AD8048FB9
                                                                                                APIs
                                                                                                • RtlAllocateHeap.NTDLL(00000000,6C37DBE2,?,?,6C37DBE2,00000220,?,?,?), ref: 6C37A673
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 1279760036-0
                                                                                                • Opcode ID: 9275e6788365b323641de6e9769af3340034fe0ce070158340df5c2db0b1c579
                                                                                                • Instruction ID: ad2951472cc99efe3c865f15d84bf42b8fddb67d120d5d5dcd72200d7970c4fd
                                                                                                • Opcode Fuzzy Hash: 9275e6788365b323641de6e9769af3340034fe0ce070158340df5c2db0b1c579
                                                                                                • Instruction Fuzzy Hash: B2E0653225521056EB312A659C04F8636AC9B526A9F116111EC5896D84EB1EC400CEBE
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Open
                                                                                                • String ID:
                                                                                                • API String ID: 71445658-0
                                                                                                • Opcode ID: ce9d18141ac8a2415a65a9b8a38807c62c68c0f35cc9388145c160860f9cea29
                                                                                                • Instruction ID: d3b2713253b45803e0e36550a0a091f6b3b019736998aa0157c013c20421de29
                                                                                                • Opcode Fuzzy Hash: ce9d18141ac8a2415a65a9b8a38807c62c68c0f35cc9388145c160860f9cea29
                                                                                                • Instruction Fuzzy Hash: B2E09274908216EADB25DB80C984BFE73B5FB64385F30814DE8042F094D375AE84AA91
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(FFFFFFFF,00000000,?,6C389C90,?,?,00000000,?,6C389C90,FFFFFFFF,0000000C), ref: 6C38A009
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFile
                                                                                                • String ID:
                                                                                                • API String ID: 823142352-0
                                                                                                • Opcode ID: f89ca6c086737c78af0acfedc64680ba5807f8525458caac3d1ca94c6f338edf
                                                                                                • Instruction ID: 23273448dd040d09c3bf898e958ffb224656e3ccb9e8f8d2c130b439a7d5fb7c
                                                                                                • Opcode Fuzzy Hash: f89ca6c086737c78af0acfedc64680ba5807f8525458caac3d1ca94c6f338edf
                                                                                                • Instruction Fuzzy Hash: 12D06C3210020DBBDF028E84DC06EDA3BAAFB48714F014000BA1856060C732E862EB94
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: QueryValue
                                                                                                • String ID:
                                                                                                • API String ID: 3660427363-0
                                                                                                • Opcode ID: bc9ecc6ca19783af6d6fbb40ca28845bcba02b8ce6e2273daa9cad6eb9c5806e
                                                                                                • Instruction ID: fe46c43de78f47d222b333b3703367a29387d0af8959c827854050506a177f75
                                                                                                • Opcode Fuzzy Hash: bc9ecc6ca19783af6d6fbb40ca28845bcba02b8ce6e2273daa9cad6eb9c5806e
                                                                                                • Instruction Fuzzy Hash: 26C08C30C4C75EE2D032E8101C0A1BDB3E4E778299F3005BFAC452D884E4F4A9C0B6EA
                                                                                                APIs
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 1001FAB1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CurrentThread
                                                                                                • String ID:
                                                                                                • API String ID: 2882836952-0
                                                                                                • Opcode ID: aaf3e0f0d0f8f1f3a4ac2f5b8bd5fab41d3eaa100fa15abfee4d2d644b7fd40f
                                                                                                • Instruction ID: 723c430d69d621f95a846468934f8435ff5600678504d51602c72318876ab3a6
                                                                                                • Opcode Fuzzy Hash: aaf3e0f0d0f8f1f3a4ac2f5b8bd5fab41d3eaa100fa15abfee4d2d644b7fd40f
                                                                                                • Instruction Fuzzy Hash: B9D012B8104910C7E310DB50C4C465EB2E1FF58300F30C519E92D8B615C738F8C18652
                                                                                                APIs
                                                                                                • CreateThread.KERNEL32(00000000,00000000,Function_00006110,00000000), ref: 10020693
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateThread
                                                                                                • String ID:
                                                                                                • API String ID: 2422867632-0
                                                                                                • Opcode ID: 13c8da13fabdb43a0039df29cdbc36604e7b86c2d4870efbc9606bf7f6935c8f
                                                                                                • Instruction ID: caee183b5a6c68c45fee89ce5ab94ef9cb690e012967d693a85690ee7ea4d081
                                                                                                • Opcode Fuzzy Hash: 13c8da13fabdb43a0039df29cdbc36604e7b86c2d4870efbc9606bf7f6935c8f
                                                                                                • Instruction Fuzzy Hash: 20C04C3424C314E9F430D1442C46B5C1401F75EB65EB543177B205E4D74D7040C13553
                                                                                                APIs
                                                                                                • TCGamerUpdateMain.UPDATE(?,?), ref: 00E0100B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3556290818.0000000000E01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00E00000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3556263696.0000000000E00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556319323.0000000000E02000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556351733.0000000000E03000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556384480.0000000000E04000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556384480.0000000000E46000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_e00000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: GamerMainUpdate
                                                                                                • String ID:
                                                                                                • API String ID: 3533789159-0
                                                                                                • Opcode ID: 0dc032e54f475a4c8a862538ffc73d883b9d6e7095286aea5a65631e74e2db75
                                                                                                • Instruction ID: eeb0654fedab2d3b4910ad65ed97d0a4dc47ebdeade23ea537cefc48a249cf9e
                                                                                                • Opcode Fuzzy Hash: 0dc032e54f475a4c8a862538ffc73d883b9d6e7095286aea5a65631e74e2db75
                                                                                                • Instruction Fuzzy Hash: F6B092B656020C6BCB44EAD8EC42C9A33DC5A88750B408054BE0C8F281E936FA9087A1
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: send
                                                                                                • String ID:
                                                                                                • API String ID: 2809346765-0
                                                                                                • Opcode ID: b133ea7d05f53c3c11ad6334d0588478f261473ccb87b5617e28918120fa56af
                                                                                                • Instruction ID: 6b957aef4a72e5dc30e8cb3213a85d60c43ac51bc1e09057d618b7ba0e2fc2ae
                                                                                                • Opcode Fuzzy Hash: b133ea7d05f53c3c11ad6334d0588478f261473ccb87b5617e28918120fa56af
                                                                                                • Instruction Fuzzy Hash: 8D900238288511FAA2124A2158897593654D6145423185418DC02C9010D631C2806514
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 24023d1166c22654ab83cd1d1d873daf5044b5c6ec0023676bce91ffc362033e
                                                                                                • Instruction ID: 45243553951e407c8de5ace5b559ee39af74788db49f69a21134e1084e128d6c
                                                                                                • Opcode Fuzzy Hash: 24023d1166c22654ab83cd1d1d873daf5044b5c6ec0023676bce91ffc362033e
                                                                                                • Instruction Fuzzy Hash: 0B61E4B1A046069BC714CF79C490A59B3B5FF46328F908329D06597F90E731E8A5CFD2
                                                                                                APIs
                                                                                                • Sleep.KERNEL32 ref: 10005EB2
                                                                                                  • Part of subcall function 10006F17: _malloc.LIBCMT ref: 10006F31
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Sleep_malloc
                                                                                                • String ID:
                                                                                                • API String ID: 617756273-0
                                                                                                • Opcode ID: bd1a2801bd1f1b37b244e82fcf0364694be79379b717d5536a6d8ec7b8dccb93
                                                                                                • Instruction ID: c703cf204976232012e29921027dce2d5ea17eb50e6b597cbfa29dc34b4da51f
                                                                                                • Opcode Fuzzy Hash: bd1a2801bd1f1b37b244e82fcf0364694be79379b717d5536a6d8ec7b8dccb93
                                                                                                • Instruction Fuzzy Hash: 6CD0A772D08202CBE7B0EDD048C403D6052A758284F74803DD6059D001D5718D849382
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Sleep
                                                                                                • String ID:
                                                                                                • API String ID: 3472027048-0
                                                                                                • Opcode ID: 330ef356695b0d601c8734bc0de9cfb02cf9050ce6b262b7ed7aefbe5bae77b1
                                                                                                • Instruction ID: a6341314313e4a499cbccbd3693adfa23432e71e6e6c89eb76b4075d95c354e9
                                                                                                • Opcode Fuzzy Hash: 330ef356695b0d601c8734bc0de9cfb02cf9050ce6b262b7ed7aefbe5bae77b1
                                                                                                • Instruction Fuzzy Hash: 0BA002B17521044647146B74580EC8665E89FAA71674185217311D9184EA754090D929
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 03D3E8A9
                                                                                                • Sleep.KERNEL32(00000001,?,?,?,03D3604D), ref: 03D3E8B3
                                                                                                • GetTickCount.KERNEL32 ref: 03D3E8BF
                                                                                                • GetTickCount.KERNEL32 ref: 03D3E8D2
                                                                                                • InterlockedExchange.KERNEL32(03D61F08,00000000), ref: 03D3E8DA
                                                                                                • OpenClipboard.USER32(00000000), ref: 03D3E8E2
                                                                                                • GetClipboardData.USER32(0000000D), ref: 03D3E8EA
                                                                                                • GlobalSize.KERNEL32(00000000), ref: 03D3E8FB
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 03D3E90C
                                                                                                • wsprintfW.USER32 ref: 03D3E985
                                                                                                • _memset.LIBCMT ref: 03D3E9A3
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 03D3E9AC
                                                                                                • CloseClipboard.USER32 ref: 03D3E9B2
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 03D3E9CA
                                                                                                • CreateFileW.KERNEL32(03D60D80,40000000,00000002,00000000,00000004,00000002,00000000), ref: 03D3E9E4
                                                                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 03D3EA02
                                                                                                • lstrlenW.KERNEL32(03D55B48,?,00000000), ref: 03D3EA16
                                                                                                • WriteFile.KERNEL32(00000000,03D55B48,00000000), ref: 03D3EA25
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 03D3EA2C
                                                                                                • ReleaseMutex.KERNEL32(00000000), ref: 03D3EA38
                                                                                                • GetKeyState.USER32(00000014), ref: 03D3EABC
                                                                                                • lstrlenW.KERNEL32(03D5B4A8), ref: 03D3EB0B
                                                                                                • wsprintfW.USER32 ref: 03D3EB1D
                                                                                                • lstrlenW.KERNEL32(03D5B4D0), ref: 03D3EB3E
                                                                                                • lstrlenW.KERNEL32(03D5B4D0), ref: 03D3EB61
                                                                                                • wsprintfW.USER32 ref: 03D3EB7F
                                                                                                • wsprintfW.USER32 ref: 03D3EB95
                                                                                                • wsprintfW.USER32 ref: 03D3EBBF
                                                                                                • lstrlenW.KERNEL32(00000000), ref: 03D3EC0B
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 03D3EC21
                                                                                                • CreateFileW.KERNEL32(03D60D80,40000000,00000002,00000000,00000004,00000002,00000000), ref: 03D3EC3B
                                                                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 03D3EC59
                                                                                                • lstrlenW.KERNEL32(00000000,?,00000000), ref: 03D3EC69
                                                                                                • WriteFile.KERNEL32(00000000,00000000,00000000), ref: 03D3EC74
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 03D3EC7B
                                                                                                • ReleaseMutex.KERNEL32(00000000), ref: 03D3EC88
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Filelstrlen$wsprintf$ClipboardCloseGlobal$CountCreateHandleMutexObjectPointerReleaseSingleTickWaitWrite_memset$DataExchangeInterlockedLockOpenSizeSleepStateUnlock
                                                                                                • String ID: [$%s%s$%s%s$%s%s$[esc]
                                                                                                • API String ID: 1637302245-2373594894
                                                                                                • Opcode ID: ab000e4aa9df68102f7897cc1d3bd6837ac2e7b9ead524dac8af46ac7c442d09
                                                                                                • Instruction ID: 5da8cdfeb1031d69976d32bc0846e1d1fd315e3764a19b00b632d33f4c3df2d5
                                                                                                • Opcode Fuzzy Hash: ab000e4aa9df68102f7897cc1d3bd6837ac2e7b9ead524dac8af46ac7c442d09
                                                                                                • Instruction Fuzzy Hash: 98C1C376500301AFD731EF64DC89FAA77B8FB09B01F044959F56AD62C4D7B09988CB60
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 03D37804
                                                                                                • _memset.LIBCMT ref: 03D37850
                                                                                                • GetSystemDirectoryA.KERNEL32(?,000000FF), ref: 03D37864
                                                                                                  • Part of subcall function 03D38720: _vswprintf_s.LIBCMT ref: 03D38731
                                                                                                • GetFileAttributesA.KERNEL32(?,?,?,?,?,?,?,74DF0630,?,74DF0F00), ref: 03D37893
                                                                                                • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000214,00000000,00000000,00000044,?), ref: 03D378DA
                                                                                                  • Part of subcall function 03D37740: GetCurrentProcess.KERNEL32(00000028,?,?,?,?,?,?,?,?,03D378FC), ref: 03D37756
                                                                                                  • Part of subcall function 03D37740: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,03D378FC,?,?,?,?,?,?,74DF0630), ref: 03D3775D
                                                                                                • OpenProcess.KERNEL32(001FFFFF,00000000,?,?,?,?,?,?,?,74DF0630,?,74DF0F00), ref: 03D3790A
                                                                                                • _memset.LIBCMT ref: 03D37923
                                                                                                • LoadLibraryA.KERNEL32(Kernel32.dll,OpenProcess,?,?,?,?,?,?,?,?,?,74DF0630,?,74DF0F00), ref: 03D3793B
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 03D37944
                                                                                                • LoadLibraryA.KERNEL32(Kernel32.dll,ExitProcess,?,?,?,?,?,?,?,?,?,74DF0630,?,74DF0F00), ref: 03D37956
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 03D37959
                                                                                                • LoadLibraryA.KERNEL32(Kernel32.dll,WinExec,?,?,?,?,?,?,?,?,?,74DF0630,?,74DF0F00), ref: 03D3796B
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 03D3796E
                                                                                                • LoadLibraryA.KERNEL32(Kernel32.dll,WaitForSingleObject,?,?,?,?,?,?,?,?,?,74DF0630,?,74DF0F00), ref: 03D37980
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 03D37983
                                                                                                • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,74DF0630,?,74DF0F00), ref: 03D3798B
                                                                                                • GetProcessId.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,74DF0630,?,74DF0F00), ref: 03D37992
                                                                                                • _memset.LIBCMT ref: 03D379B4
                                                                                                • GetModuleFileNameA.KERNEL32(00000000,?,000000FA,?,?,?,?,?,?,?,?,?,?,?,?,74DF0630), ref: 03D379CA
                                                                                                • VirtualAllocEx.KERNEL32(00000000,00000000,00000118,00003000,00000040), ref: 03D379FF
                                                                                                • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000118,00000000), ref: 03D37A1B
                                                                                                • VirtualProtectEx.KERNEL32(00000000,00000000,00000118,00000001,?), ref: 03D37A43
                                                                                                • VirtualAllocEx.KERNEL32(00000000,00000000,00001000,00003000,00000040), ref: 03D37A58
                                                                                                • WriteProcessMemory.KERNEL32(00000000,00000000,03D376F0,00001000,00000000), ref: 03D37A72
                                                                                                • VirtualProtectEx.KERNEL32(00000000,00000000,00001000,00000001,00000000), ref: 03D37A90
                                                                                                • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000004,00000000), ref: 03D37AA1
                                                                                                • Sleep.KERNEL32(0000EA60,?,?,?,?,?,?,?,?,?,?,?,?,?,?,74DF0630), ref: 03D37ABA
                                                                                                • VirtualProtectEx.KERNEL32(00000000,00000000,00000118,00000040,00000000), ref: 03D37AD6
                                                                                                • VirtualProtectEx.KERNEL32(00000000,00000000,00001000,00000040,00000000), ref: 03D37AE8
                                                                                                • ResumeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,74DF0630), ref: 03D37AF1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$Virtual$AddressLibraryLoadProcProtect_memset$AllocCreateCurrentFileMemoryOpenThreadWrite$AttributesDirectoryModuleNameRemoteResumeSleepSystemToken_vswprintf_s
                                                                                                • String ID: %s%s$D$ExitProcess$Kernel32.dll$OpenProcess$WaitForSingleObject$WinExec$Windows\SysWOW64\svchost.exe$Windows\System32\svchost.exe
                                                                                                • API String ID: 4176418925-3213446972
                                                                                                • Opcode ID: 01b2ea06eed1c28a2d071c4d42fc6f359629b7f004d6ebebbcdeaccd959ec1fe
                                                                                                • Instruction ID: 26ee8dda3e504caebc825da0a0d6b9b360f98bad121306f69e643279549baaa1
                                                                                                • Opcode Fuzzy Hash: 01b2ea06eed1c28a2d071c4d42fc6f359629b7f004d6ebebbcdeaccd959ec1fe
                                                                                                • Instruction Fuzzy Hash: 7C81B8B2A403587BDB21EB659C45FDF777CEF96B00F000498F609A6181DAB0AB48CF64
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 10005849
                                                                                                • _memset.LIBCMT ref: 10005868
                                                                                                • _memset.LIBCMT ref: 1000589D
                                                                                                • GetSystemDirectoryA.KERNEL32(?,000000FF), ref: 100058B1
                                                                                                  • Part of subcall function 100059E0: _vswprintf_s.LIBCMT ref: 100059F1
                                                                                                • GetFileAttributesA.KERNEL32(?), ref: 100058E0
                                                                                                • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 10005928
                                                                                                • VirtualAllocEx.KERNEL32(?,00000000,000311BF,00003000,00000040,74DF0630), ref: 1000594E
                                                                                                • WriteProcessMemory.KERNEL32(?,00000000,?,000311BF,00000000,?,00000000,000311BF,00003000,00000040,74DF0630), ref: 10005968
                                                                                                • GetThreadContext.KERNEL32(?,?,?,00000000,?,000311BF,00000000,?,00000000,000311BF,00003000,00000040,74DF0630), ref: 10005987
                                                                                                • SetThreadContext.KERNEL32(?,00010007,?,00000000,?,000311BF,00000000,?,00000000,000311BF,00003000,00000040,74DF0630), ref: 100059A2
                                                                                                • ResumeThread.KERNEL32(?,?,00000000,?,000311BF,00000000,?,00000000,000311BF,00003000,00000040,74DF0630), ref: 100059C1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Thread_memset$ContextProcess$AllocAttributesCreateDirectoryFileMemoryResumeSystemVirtualWrite_vswprintf_s
                                                                                                • String ID: %s%s$D$Windows\SysWOW64\tracerpt.exe$Windows\System32\tracerpt.exe
                                                                                                • API String ID: 2170139861-1986163084
                                                                                                • Opcode ID: c8561399999e88f50518954755fe2256d0c041f48f054e3226c8471d41118f6d
                                                                                                • Instruction ID: 983fe607fc0b82aa02984a3f7cf9d741954c75fc9833714969104a2613b4b09b
                                                                                                • Opcode Fuzzy Hash: c8561399999e88f50518954755fe2256d0c041f48f054e3226c8471d41118f6d
                                                                                                • Instruction Fuzzy Hash: C8418EB0A00318EFE720CF60DC85FAA77B8EF48745F10859DF64D9B185DBB1AA848B54
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 03D37E73
                                                                                                • _memset.LIBCMT ref: 03D37E9F
                                                                                                • _memset.LIBCMT ref: 03D37ED4
                                                                                                • GetSystemDirectoryA.KERNEL32(?,000000FF), ref: 03D37EE8
                                                                                                  • Part of subcall function 03D38720: _vswprintf_s.LIBCMT ref: 03D38731
                                                                                                • GetFileAttributesA.KERNEL32(?), ref: 03D37F15
                                                                                                • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 03D37F65
                                                                                                • VirtualAllocEx.KERNEL32(?,00000000,?,00003000,00000040), ref: 03D37F92
                                                                                                • WriteProcessMemory.KERNEL32(?,00000000,?,?,00000000,?,00003000,00000040), ref: 03D37FAA
                                                                                                • GetThreadContext.KERNEL32(?,?,?,00000000,?,00003000,00000040), ref: 03D37FCC
                                                                                                • SetThreadContext.KERNEL32(?,00010007,?,00000000,?,00003000,00000040), ref: 03D37FEA
                                                                                                • ResumeThread.KERNEL32(?,?,00000000,?,00003000,00000040), ref: 03D37FFF
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Thread_memset$ContextProcess$AllocAttributesCreateDirectoryFileMemoryResumeSystemVirtualWrite_vswprintf_s
                                                                                                • String ID: %s%s$D$Windows\SysWOW64\svchost.exe$Windows\System32\svchost.exe
                                                                                                • API String ID: 2170139861-2473635271
                                                                                                • Opcode ID: fac8cc7f870e48b7ba4ddabdbd14fe6dfc1999a4b85a9b3a03478556eb8093f3
                                                                                                • Instruction ID: 692d4685042d11b58f0ae1c8bc47c4878b17110d31943f4dc371500f2ce4341b
                                                                                                • Opcode Fuzzy Hash: fac8cc7f870e48b7ba4ddabdbd14fe6dfc1999a4b85a9b3a03478556eb8093f3
                                                                                                • Instruction Fuzzy Hash: C84198B5A40358ABDB21DB64DC95FDE77BDEB45B00F0041D9F60DA6280DAB09B88CF64
                                                                                                APIs
                                                                                                • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,03D60D80,74DEE010,74DF2FA0,74DF0F00,?,03D36028,?,?), ref: 03D3E519
                                                                                                • lstrcatW.KERNEL32(03D60D80,\DisplaySessionContainers.log,?,03D36028,?,?), ref: 03D3E529
                                                                                                • CreateMutexW.KERNEL32(00000000,00000000,03D60D80,?,03D36028,?,?), ref: 03D3E538
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,03D36028,?,?), ref: 03D3E546
                                                                                                • CreateFileW.KERNEL32(03D60D80,40000000,00000002,00000000,00000004,00000080,00000000,?,03D36028,?,?), ref: 03D3E563
                                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,03D36028,?,?), ref: 03D3E56E
                                                                                                • CloseHandle.KERNEL32(00000000,?,03D36028,?,?), ref: 03D3E577
                                                                                                • DeleteFileW.KERNEL32(03D60D80,?,03D36028,?,?), ref: 03D3E58A
                                                                                                • ReleaseMutex.KERNEL32(00000000,?,03D36028,?,?), ref: 03D3E597
                                                                                                • DirectInput8Create.DINPUT8(?,00000800,03D54934,03D61220,00000000,?,03D36028,?,?), ref: 03D3E5B2
                                                                                                • GetTickCount.KERNEL32 ref: 03D3E665
                                                                                                • GetKeyState.USER32(00000014), ref: 03D3E672
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateFile$Mutex$CloseCountDeleteDirectFolderHandleInput8ObjectPathReleaseSingleSizeStateTickWaitlstrcat
                                                                                                • String ID: <$\DisplaySessionContainers.log
                                                                                                • API String ID: 1095970075-1170057892
                                                                                                • Opcode ID: b29a1947c330dda0a2d8524dd7d2fd9aa27e617e2e8ad6c583beb1b9a3902221
                                                                                                • Instruction ID: bec84a47dc063e4560c9ed0d7cd1c8ea7da4be62a7848b848c82502614944062
                                                                                                • Opcode Fuzzy Hash: b29a1947c330dda0a2d8524dd7d2fd9aa27e617e2e8ad6c583beb1b9a3902221
                                                                                                • Instruction Fuzzy Hash: 6D417D76740305AFD700EFA8EC46F9E7BA8AB4D704F504508F625DB385C6B1E9498FA4
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(00000020,?,?,?,?,?,?,?,?,03D3DFA4), ref: 03D37637
                                                                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,03D3DFA4), ref: 03D3763E
                                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 03D3765A
                                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000010,00000000,00000000), ref: 03D37677
                                                                                                • CloseHandle.KERNEL32(?), ref: 03D37681
                                                                                                • GetModuleHandleA.KERNEL32(NtDll.dll,NtSetInformationProcess,?,?,?,?,?,?,?,03D3DFA4), ref: 03D37691
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 03D37698
                                                                                                • GetCurrentProcessId.KERNEL32 ref: 03D376BA
                                                                                                • OpenProcess.KERNEL32(001FFFFF,00000000,00000000), ref: 03D376C7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CurrentHandleOpenToken$AddressAdjustCloseLookupModulePrivilegePrivilegesProcValue
                                                                                                • String ID: NtDll.dll$NtSetInformationProcess$SeDebugPrivilege
                                                                                                • API String ID: 1802016953-1577477132
                                                                                                • Opcode ID: 750aa7175da141c7ee186ae508f873413199f16cee41b47d7617a394f6d0ee06
                                                                                                • Instruction ID: 006ab90d7470b5c424f782f0ac03a8e8a19e7c5066d2a5b64ae33b1f6707b6e5
                                                                                                • Opcode Fuzzy Hash: 750aa7175da141c7ee186ae508f873413199f16cee41b47d7617a394f6d0ee06
                                                                                                • Instruction Fuzzy Hash: 06217573A41309AFDB10EBE4DC0AFBE7778EB09711F404509FA05AA2C4DBB05948CBA5
                                                                                                APIs
                                                                                                • VirtualQuery.KERNEL32(?,?,0000001C), ref: 03D40576
                                                                                                • GetSystemInfo.KERNEL32(?), ref: 03D4058E
                                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 03D4059E
                                                                                                • GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 03D405AE
                                                                                                • VirtualAlloc.KERNEL32(?,-00000001,00001000,00000004), ref: 03D40600
                                                                                                • VirtualProtect.KERNEL32(?,-00000001,00000104,?), ref: 03D40615
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Virtual$AddressAllocHandleInfoModuleProcProtectQuerySystem
                                                                                                • String ID: SetThreadStackGuarantee$kernel32.dll
                                                                                                • API String ID: 3290314748-423161677
                                                                                                • Opcode ID: 935a2564ccff722e00f9a681ba255913822a42df1569ab50f8f74a7a5074f217
                                                                                                • Instruction ID: 9578879698a9f21f3d7fc2a5daea16e7b054cd4c4416440004ad7eac1078f2d2
                                                                                                • Opcode Fuzzy Hash: 935a2564ccff722e00f9a681ba255913822a42df1569ab50f8f74a7a5074f217
                                                                                                • Instruction Fuzzy Hash: BD316272E41219AFDB10EBA4DC84AEFF7B9EB44B45F180515FA12E7144DB70EA48CB90
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 03D37B89
                                                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 03D37B90
                                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 03D37BB6
                                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000010,00000000,00000000), ref: 03D37BCC
                                                                                                • GetLastError.KERNEL32 ref: 03D37BD2
                                                                                                • CloseHandle.KERNEL32(?), ref: 03D37BE0
                                                                                                • CloseHandle.KERNEL32(?), ref: 03D37BFB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseHandleProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                                • String ID: SeShutdownPrivilege
                                                                                                • API String ID: 3435690185-3733053543
                                                                                                • Opcode ID: fc77425187db70a3545ae914dfef79be2af636e54bf2e4e1e10bf77bf019ba8d
                                                                                                • Instruction ID: dc040bb548dd04eee5ca5497bd5f6599835e63a407875f79e0190f67b3517bed
                                                                                                • Opcode Fuzzy Hash: fc77425187db70a3545ae914dfef79be2af636e54bf2e4e1e10bf77bf019ba8d
                                                                                                • Instruction Fuzzy Hash: 2F11AB73A403099BDB10EFB4DC0AFAE7778EB04700F404559F905A7280CB719E04C7A1
                                                                                                APIs
                                                                                                  • Part of subcall function 6C37A893: GetLastError.KERNEL32(?,?,6C375151,?,6C351A6D,00000000), ref: 6C37A897
                                                                                                  • Part of subcall function 6C37A893: SetLastError.KERNEL32(00000000,6C351A6D,00000000), ref: 6C37A939
                                                                                                • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 6C386276
                                                                                                • IsValidCodePage.KERNEL32(00000000), ref: 6C3862B4
                                                                                                • IsValidLocale.KERNEL32(?,00000001), ref: 6C3862C7
                                                                                                • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 6C38630F
                                                                                                • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 6C38632A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                                • String ID: PX9lE
                                                                                                • API String ID: 415426439-348934192
                                                                                                • Opcode ID: 27d402981f67a106b5bee4c2778f6911176afcab59726ed946dd38a6d7952454
                                                                                                • Instruction ID: 3174b210c5cdc4e3b6306bb2ad4eb8e36c240100302bf9c2e470769aa06106e0
                                                                                                • Opcode Fuzzy Hash: 27d402981f67a106b5bee4c2778f6911176afcab59726ed946dd38a6d7952454
                                                                                                • Instruction Fuzzy Hash: B8518271A12215ABEF10DFA4CC45AEE77B8FF15708F1044A9E960E7690EBB1DA04CF61
                                                                                                APIs
                                                                                                • CryptStringToBinaryA.CRYPT32(n5l,00000000,00000001,00000000,00000000,00000000,00000000), ref: 6C356570
                                                                                                • CryptStringToBinaryA.CRYPT32(n5l,00000000,00000001,00000000,00000000,00000000,00000000), ref: 6C35660E
                                                                                                • ___std_exception_copy.LIBVCRUNTIME ref: 6C35666D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: BinaryCryptString$___std_exception_copy
                                                                                                • String ID: Failed to calculate base64 decoded size.$P~5l$n5l
                                                                                                • API String ID: 2515837927-4280734454
                                                                                                • Opcode ID: 09a0577b97db1e53a1b081d8151f99bbc28c079c3670b87aae7d5ced35c016b4
                                                                                                • Instruction ID: a7c0f3367dc6639a91f4c9fde709bea08ce9d5502c72363b3d0e79240fd63dc5
                                                                                                • Opcode Fuzzy Hash: 09a0577b97db1e53a1b081d8151f99bbc28c079c3670b87aae7d5ced35c016b4
                                                                                                • Instruction Fuzzy Hash: B7419CB1941308ABEB10CF94CC45FDEBBB8FB04714F544529E905ABB80E7B5A558CFA2
                                                                                                APIs
                                                                                                • OpenEventLogW.ADVAPI32(00000000,03D558BC), ref: 03D3B3E7
                                                                                                • ClearEventLogW.ADVAPI32(00000000,00000000), ref: 03D3B3F2
                                                                                                • CloseEventLog.ADVAPI32(00000000), ref: 03D3B3F9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Event$ClearCloseOpen
                                                                                                • String ID: Application$Security$System
                                                                                                • API String ID: 1391105993-2169399579
                                                                                                • Opcode ID: 9348c15f70a5b26451a8f40a424934beb66bc1ce977fc5ce078923e9070ce48f
                                                                                                • Instruction ID: 16515f61772dd39a1ed08c0a7ec130db6799bfa45cebc9b8c00eb5675c22bca4
                                                                                                • Opcode Fuzzy Hash: 9348c15f70a5b26451a8f40a424934beb66bc1ce977fc5ce078923e9070ce48f
                                                                                                • Instruction Fuzzy Hash: 70E06533A0632457D212DB19A84571EFBE5FBCA716F14061AF94956304C67089158B96
                                                                                                APIs
                                                                                                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00E015DC
                                                                                                • memset.VCRUNTIME140(?,00000000,00000003), ref: 00E01602
                                                                                                • memset.VCRUNTIME140(?,00000000,00000050), ref: 00E0168C
                                                                                                • IsDebuggerPresent.KERNEL32 ref: 00E016A8
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00E016C8
                                                                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 00E016D2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3556290818.0000000000E01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00E00000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3556263696.0000000000E00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556319323.0000000000E02000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556351733.0000000000E03000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556384480.0000000000E04000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556384480.0000000000E46000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_e00000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterPresentUnhandledmemset$DebuggerFeatureProcessor
                                                                                                • String ID:
                                                                                                • API String ID: 1045392073-0
                                                                                                • Opcode ID: 33fc93f420c2e087b6f222892d8721508b836b4742036059ed63554425b43853
                                                                                                • Instruction ID: 25456771d8653382a43b8032a6be18f0a4436639fa8d49aa221af1a94a8355a4
                                                                                                • Opcode Fuzzy Hash: 33fc93f420c2e087b6f222892d8721508b836b4742036059ed63554425b43853
                                                                                                • Instruction Fuzzy Hash: C5310775D053189BDB21DFA4D9897CCBBF8AF08304F1041EAE509AB290EB719A88CF04
                                                                                                APIs
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,2000000B,6C3862A4,00000002,00000000,?,?,?,6C3862A4,?,00000000), ref: 6C38696C
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,20001004,6C3862A4,00000002,00000000,?,?,?,6C3862A4,?,00000000), ref: 6C386995
                                                                                                • GetACP.KERNEL32(?,?,6C3862A4,?,00000000), ref: 6C3869AA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: InfoLocale
                                                                                                • String ID: ACP$OCP
                                                                                                • API String ID: 2299586839-711371036
                                                                                                • Opcode ID: 89d908c24b3a998ab5a5862ca9286fdb1c5093ec9ca6629d7fe7de415a1690b4
                                                                                                • Instruction ID: 258c71ceded39f0097715f3a608f5b2d3e667c295c887e5b408e567eabb0def1
                                                                                                • Opcode Fuzzy Hash: 89d908c24b3a998ab5a5862ca9286fdb1c5093ec9ca6629d7fe7de415a1690b4
                                                                                                • Instruction Fuzzy Hash: 6321C132627101A6D7148F19C905A87B3BAAF41B68B668164E909DBA80F733DE00CF90
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,?,?,?,?,03D378FC), ref: 03D37756
                                                                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,03D378FC,?,?,?,?,?,?,74DF0630), ref: 03D3775D
                                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 03D37785
                                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000010,00000000,00000000), ref: 03D377B9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                                                                                                • String ID: SeDebugPrivilege
                                                                                                • API String ID: 2349140579-2896544425
                                                                                                • Opcode ID: 82e6fca3852751dbb02d32942244a8aa6fdd9c05e086e23fdc8d0e4e48d14d2d
                                                                                                • Instruction ID: ba8afab41b4ba2345f0d04367efe01be2f4aa53a7122562bea0f8ea93a968753
                                                                                                • Opcode Fuzzy Hash: 82e6fca3852751dbb02d32942244a8aa6fdd9c05e086e23fdc8d0e4e48d14d2d
                                                                                                • Instruction Fuzzy Hash: F9116572E4030DABDF00DFE8DC45BEEB7B8EB09701F104558E505AB280DB759919CB60
                                                                                                APIs
                                                                                                • IsDebuggerPresent.KERNEL32 ref: 1000793D
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 10007952
                                                                                                • UnhandledExceptionFilter.KERNEL32(10015350), ref: 1000795D
                                                                                                • GetCurrentProcess.KERNEL32(C0000409), ref: 10007979
                                                                                                • TerminateProcess.KERNEL32(00000000), ref: 10007980
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                                • String ID:
                                                                                                • API String ID: 2579439406-0
                                                                                                • Opcode ID: 57dfde80044b951cb17f91093e50248a3407fe2147c9df5aa397585be7e6a5f4
                                                                                                • Instruction ID: 193b6f3057f50b32987db54b87c2b31a729b11eea6cfb014211f1eca9ce5fffe
                                                                                                • Opcode Fuzzy Hash: 57dfde80044b951cb17f91093e50248a3407fe2147c9df5aa397585be7e6a5f4
                                                                                                • Instruction Fuzzy Hash: 7221AFB4818264EFF702DF68CDC96597BE5FB0A355F509019E5088B261EB75D5C0CF81
                                                                                                APIs
                                                                                                • IsDebuggerPresent.KERNEL32 ref: 03D4131C
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 03D41331
                                                                                                • UnhandledExceptionFilter.KERNEL32(03D525B8), ref: 03D4133C
                                                                                                • GetCurrentProcess.KERNEL32(C0000409), ref: 03D41358
                                                                                                • TerminateProcess.KERNEL32(00000000), ref: 03D4135F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                                • String ID:
                                                                                                • API String ID: 2579439406-0
                                                                                                • Opcode ID: 0d2b12e570bfd7170977914cfefbb332124d583d144aa64cb6665cd8874675a1
                                                                                                • Instruction ID: c998999b300a1324bb41cca9e7c14ac7600a416c6bbed8a9eb4c08cfcb164691
                                                                                                • Opcode Fuzzy Hash: 0d2b12e570bfd7170977914cfefbb332124d583d144aa64cb6665cd8874675a1
                                                                                                • Instruction Fuzzy Hash: 3921AEBB844345DFC741FF29F584A693BA8BB58300F90446AF908CB388EB709694CF55
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 73040311bb29c5914551622f8c1703dce3cbee9cddaee4a5e747c8be854a9458
                                                                                                • Instruction ID: 9d56ac6128909304561982d11af61d81d247a51f3c3e6ebf46e2032940225304
                                                                                                • Opcode Fuzzy Hash: 73040311bb29c5914551622f8c1703dce3cbee9cddaee4a5e747c8be854a9458
                                                                                                • Instruction Fuzzy Hash: 36025B71E012199BDB18CFA9C88079EBBB1FF48318F24826AD519EB740D735A901CFA4
                                                                                                APIs
                                                                                                • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6C37F978
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileFindFirst
                                                                                                • String ID:
                                                                                                • API String ID: 1974802433-0
                                                                                                • Opcode ID: 638e07c02f6ac0a6619e9b701217afc8fb18f96c525f4091de0f8b9bf6af9a59
                                                                                                • Instruction ID: d8518a474c8d148b9d36d8ade70aa3c07b9966f6da64cf2e3a6d9d9056037288
                                                                                                • Opcode Fuzzy Hash: 638e07c02f6ac0a6619e9b701217afc8fb18f96c525f4091de0f8b9bf6af9a59
                                                                                                • Instruction Fuzzy Hash: 5771D87190515D6FDF309F28CC88AEAB7B8BF09308F1441D9D059A7650DB3A8E85DF29
                                                                                                APIs
                                                                                                • IsProcessorFeaturePresent.KERNEL32(00000017,00000001), ref: 6C36C866
                                                                                                • IsDebuggerPresent.KERNEL32 ref: 6C36C932
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6C36C94B
                                                                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 6C36C955
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                                • String ID:
                                                                                                • API String ID: 254469556-0
                                                                                                • Opcode ID: 0486b1152aa87a9586bf60cac629fc4a1e6fa5cd37658de663fa7e81af8cc860
                                                                                                • Instruction ID: 010ba4e5cd29ff84aa4c40f98c0a8e40eb574a16e534cca3c8d08596147e574a
                                                                                                • Opcode Fuzzy Hash: 0486b1152aa87a9586bf60cac629fc4a1e6fa5cd37658de663fa7e81af8cc860
                                                                                                • Instruction Fuzzy Hash: E3311675D053189BDF20EFA5D9497CDBBB8AF08304F1041AAE40DAB680EB719A848F85
                                                                                                APIs
                                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 6C373BA7
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 6C373BB1
                                                                                                • UnhandledExceptionFilter.KERNEL32(-00000325,?,?,?,?,?,00000000), ref: 6C373BBE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                • String ID:
                                                                                                • API String ID: 3906539128-0
                                                                                                • Opcode ID: 42722dfc386bd0a68aca24d744b4629a008012bd74943eea6085519a19d8ebd5
                                                                                                • Instruction ID: 88045e8e556a93a75034ee667a23096fe16878f62ad06db78dbc7ae10d21f944
                                                                                                • Opcode Fuzzy Hash: 42722dfc386bd0a68aca24d744b4629a008012bd74943eea6085519a19d8ebd5
                                                                                                • Instruction Fuzzy Hash: C531E77491122CABCF61DF25D8887DCBBB8BF08314F5041EAE41CA7650E7749B858F45
                                                                                                APIs
                                                                                                  • Part of subcall function 03D37B70: GetCurrentProcess.KERNEL32(00000028,?), ref: 03D37B89
                                                                                                  • Part of subcall function 03D37B70: OpenProcessToken.ADVAPI32(00000000), ref: 03D37B90
                                                                                                  • Part of subcall function 03D37B70: LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 03D37BB6
                                                                                                  • Part of subcall function 03D37B70: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000010,00000000,00000000), ref: 03D37BCC
                                                                                                  • Part of subcall function 03D37B70: GetLastError.KERNEL32 ref: 03D37BD2
                                                                                                  • Part of subcall function 03D37B70: CloseHandle.KERNEL32(?), ref: 03D37BE0
                                                                                                • ExitWindowsEx.USER32(00000005,00000000), ref: 03D3B471
                                                                                                  • Part of subcall function 03D37B70: CloseHandle.KERNEL32(?), ref: 03D37BFB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseHandleProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                                • String ID:
                                                                                                • API String ID: 681424410-0
                                                                                                • Opcode ID: 24730fabf86a511c8b67de44db1f2409e6d8d7626771bbeda4cc0a8dbba5d3e9
                                                                                                • Instruction ID: ed0b46e091a4f4f2f12548e9e81e3c431b584774ff9d7bf4523fde036932c556
                                                                                                • Opcode Fuzzy Hash: 24730fabf86a511c8b67de44db1f2409e6d8d7626771bbeda4cc0a8dbba5d3e9
                                                                                                • Instruction Fuzzy Hash: CCC08C3734074802E214B2B47C22B6AB350DF96322F00042FA70E8C0C00C62C89401B6
                                                                                                APIs
                                                                                                  • Part of subcall function 03D37B70: GetCurrentProcess.KERNEL32(00000028,?), ref: 03D37B89
                                                                                                  • Part of subcall function 03D37B70: OpenProcessToken.ADVAPI32(00000000), ref: 03D37B90
                                                                                                  • Part of subcall function 03D37B70: LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 03D37BB6
                                                                                                  • Part of subcall function 03D37B70: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000010,00000000,00000000), ref: 03D37BCC
                                                                                                  • Part of subcall function 03D37B70: GetLastError.KERNEL32 ref: 03D37BD2
                                                                                                  • Part of subcall function 03D37B70: CloseHandle.KERNEL32(?), ref: 03D37BE0
                                                                                                • ExitWindowsEx.USER32(00000004,00000000), ref: 03D3B429
                                                                                                  • Part of subcall function 03D37B70: CloseHandle.KERNEL32(?), ref: 03D37BFB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseHandleProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                                • String ID:
                                                                                                • API String ID: 681424410-0
                                                                                                • Opcode ID: 227eb9b7f8d0fa2e086ffb6a8351dcb4d28e59d6be107a434028eba64a846097
                                                                                                • Instruction ID: 94196280c8ef232e7bb3a86b722254d8ba0929db55a879a1194f08f6a45c6d4b
                                                                                                • Opcode Fuzzy Hash: 227eb9b7f8d0fa2e086ffb6a8351dcb4d28e59d6be107a434028eba64a846097
                                                                                                • Instruction Fuzzy Hash: 1AC08C7734030806E214B3B47C22B69B350DF96322F00042BA70E8C0C00C72C89401BA
                                                                                                APIs
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(Function_00001770,00E010D3), ref: 00E01769
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3556290818.0000000000E01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00E00000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3556263696.0000000000E00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556319323.0000000000E02000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556351733.0000000000E03000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556384480.0000000000E04000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556384480.0000000000E46000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_e00000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterUnhandled
                                                                                                • String ID:
                                                                                                • API String ID: 3192549508-0
                                                                                                • Opcode ID: 895288b33c075362780be8bddbf688db9290f24ba9df154979c6cf557369f9d6
                                                                                                • Instruction ID: bc72e98c5ff01825f421afaefc268dca2081c3776d2c3145ddbb95495055f0a1
                                                                                                • Opcode Fuzzy Hash: 895288b33c075362780be8bddbf688db9290f24ba9df154979c6cf557369f9d6
                                                                                                • Instruction Fuzzy Hash:
                                                                                                APIs
                                                                                                  • Part of subcall function 03D3F707: _malloc.LIBCMT ref: 03D3F721
                                                                                                • RegOpenKeyExW.ADVAPI32(80000001,Console,00000000,00000002,?), ref: 03D3B586
                                                                                                • RegDeleteValueW.ADVAPI32(?,IpDate), ref: 03D3B596
                                                                                                • RegSetValueExW.ADVAPI32(?,IpDate,00000000,00000003,00000002,?), ref: 03D3B5B3
                                                                                                • _memset.LIBCMT ref: 03D3B5D4
                                                                                                • RegCloseKey.ADVAPI32(?), ref: 03D3B61B
                                                                                                • _memset.LIBCMT ref: 03D3B63C
                                                                                                • RegCloseKey.ADVAPI32(?), ref: 03D3B72C
                                                                                                • Sleep.KERNEL32(000007D0), ref: 03D3B737
                                                                                                  • Part of subcall function 03D3F707: std::exception::exception.LIBCMT ref: 03D3F756
                                                                                                  • Part of subcall function 03D3F707: std::exception::exception.LIBCMT ref: 03D3F770
                                                                                                  • Part of subcall function 03D3F707: __CxxThrowException@8.LIBCMT ref: 03D3F781
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseValue_memsetstd::exception::exception$DeleteException@8OpenSleepThrow_malloc
                                                                                                • String ID: 156.251.17.243$156.251.17.243$156.251.17.243$17093$17094$17095$Console$IpDate$o1:$o2:$o3:$p1:$p2:$p3:$t1:$t2:$t3:
                                                                                                • API String ID: 1186799303-3799049431
                                                                                                • Opcode ID: 9b3295fe8b3703d6f46d03c57a202697dcd777fb4c90abdd61621d9a2690641a
                                                                                                • Instruction ID: f602b011a63a234464c2bde73fcc0de27504f7c5337b426462c916c5fa14b6c5
                                                                                                • Opcode Fuzzy Hash: 9b3295fe8b3703d6f46d03c57a202697dcd777fb4c90abdd61621d9a2690641a
                                                                                                • Instruction Fuzzy Hash: 8341A3767803007FEA11FB20AC46F9E7355DF46B11F144014FE156E283E6E5BA2D86BA
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,100075E2,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009ACE
                                                                                                • __mtterm.LIBCMT ref: 10009ADA
                                                                                                  • Part of subcall function 100097A5: DecodePointer.KERNEL32(00000009,100076A5,1000768B,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 100097B6
                                                                                                  • Part of subcall function 100097A5: TlsFree.KERNEL32(0000001F,100076A5,1000768B,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 100097D0
                                                                                                  • Part of subcall function 100097A5: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,100076A5,1000768B,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 1000C031
                                                                                                  • Part of subcall function 100097A5: _free.LIBCMT ref: 1000C034
                                                                                                  • Part of subcall function 100097A5: DeleteCriticalSection.KERNEL32(0000001F,?,?,100076A5,1000768B,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 1000C05B
                                                                                                • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 10009AF0
                                                                                                • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 10009AFD
                                                                                                • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 10009B0A
                                                                                                • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 10009B17
                                                                                                • TlsAlloc.KERNEL32(?,?,100075E2,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009B67
                                                                                                • TlsSetValue.KERNEL32(00000000,?,?,100075E2,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009B82
                                                                                                • __init_pointers.LIBCMT ref: 10009B8C
                                                                                                • EncodePointer.KERNEL32(?,?,100075E2,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009B9D
                                                                                                • EncodePointer.KERNEL32(?,?,100075E2,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009BAA
                                                                                                • EncodePointer.KERNEL32(?,?,100075E2,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009BB7
                                                                                                • EncodePointer.KERNEL32(?,?,100075E2,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009BC4
                                                                                                • DecodePointer.KERNEL32(Function_00009929,?,?,100075E2,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009BE5
                                                                                                • __calloc_crt.LIBCMT ref: 10009BFA
                                                                                                • DecodePointer.KERNEL32(00000000,?,?,100075E2,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009C14
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 10009C26
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                                                                                • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                                                                • API String ID: 3698121176-3819984048
                                                                                                • Opcode ID: f6145c8d2fc98865c4004398df4a04ed430af6cefd03571db8e2710a2f51a93a
                                                                                                • Instruction ID: 476fdbd6443a42851c863cb18b7173c2f7dcf4e8a02e7ba59ea7a710cfe5bbe7
                                                                                                • Opcode Fuzzy Hash: f6145c8d2fc98865c4004398df4a04ed430af6cefd03571db8e2710a2f51a93a
                                                                                                • Instruction Fuzzy Hash: 94313B35840A35EAF721DF758D88B1A3EE6EB493A1B14C526E414D72B4FB36D481CF50
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,03D40FC1,03D56278,00000008,03D41155,?,?,?,03D56298,0000000C,03D41210,?), ref: 03D4401C
                                                                                                • __mtterm.LIBCMT ref: 03D44028
                                                                                                  • Part of subcall function 03D43CF1: DecodePointer.KERNEL32(0000000A,03D41084,03D4106A,03D56278,00000008,03D41155,?,?,?,03D56298,0000000C,03D41210,?), ref: 03D43D02
                                                                                                  • Part of subcall function 03D43CF1: TlsFree.KERNEL32(00000021,03D41084,03D4106A,03D56278,00000008,03D41155,?,?,?,03D56298,0000000C,03D41210,?), ref: 03D43D1C
                                                                                                  • Part of subcall function 03D43CF1: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,03D41084,03D4106A,03D56278,00000008,03D41155,?,?,?,03D56298,0000000C,03D41210,?), ref: 03D48D48
                                                                                                  • Part of subcall function 03D43CF1: _free.LIBCMT ref: 03D48D4B
                                                                                                  • Part of subcall function 03D43CF1: DeleteCriticalSection.KERNEL32(00000021,?,?,03D41084,03D4106A,03D56278,00000008,03D41155,?,?,?,03D56298,0000000C,03D41210,?), ref: 03D48D72
                                                                                                • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 03D4403E
                                                                                                • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 03D4404B
                                                                                                • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 03D44058
                                                                                                • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 03D44065
                                                                                                • TlsAlloc.KERNEL32(?,?,03D40FC1,03D56278,00000008,03D41155,?,?,?,03D56298,0000000C,03D41210,?), ref: 03D440B5
                                                                                                • TlsSetValue.KERNEL32(00000000,?,?,03D40FC1,03D56278,00000008,03D41155,?,?,?,03D56298,0000000C,03D41210,?), ref: 03D440D0
                                                                                                • __init_pointers.LIBCMT ref: 03D440DA
                                                                                                • EncodePointer.KERNEL32(?,?,03D40FC1,03D56278,00000008,03D41155,?,?,?,03D56298,0000000C,03D41210,?), ref: 03D440EB
                                                                                                • EncodePointer.KERNEL32(?,?,03D40FC1,03D56278,00000008,03D41155,?,?,?,03D56298,0000000C,03D41210,?), ref: 03D440F8
                                                                                                • EncodePointer.KERNEL32(?,?,03D40FC1,03D56278,00000008,03D41155,?,?,?,03D56298,0000000C,03D41210,?), ref: 03D44105
                                                                                                • EncodePointer.KERNEL32(?,?,03D40FC1,03D56278,00000008,03D41155,?,?,?,03D56298,0000000C,03D41210,?), ref: 03D44112
                                                                                                • DecodePointer.KERNEL32(Function_00013E75,?,?,03D40FC1,03D56278,00000008,03D41155,?,?,?,03D56298,0000000C,03D41210,?), ref: 03D44133
                                                                                                • __calloc_crt.LIBCMT ref: 03D44148
                                                                                                • DecodePointer.KERNEL32(00000000,?,?,03D40FC1,03D56278,00000008,03D41155,?,?,?,03D56298,0000000C,03D41210,?), ref: 03D44162
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 03D44174
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                                                                                • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                                                                • API String ID: 3698121176-3819984048
                                                                                                • Opcode ID: 8bc5f8d5ab9fc11779bf435fc065eaa44085993fe6d7611505a66bcd6dbff6a3
                                                                                                • Instruction ID: 5ee58b84da8b3dba030226a2eae22292d037f662ec386651730ef707ef495702
                                                                                                • Opcode Fuzzy Hash: 8bc5f8d5ab9fc11779bf435fc065eaa44085993fe6d7611505a66bcd6dbff6a3
                                                                                                • Instruction Fuzzy Hash: 1D3164B7909314AFDB51FF76AC18A197FB4EB447A0B44051AE830C3358EB708099DF61
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _memset$_wcsrchrlstrcat$EnvironmentExpandStringslstrlenwsprintf
                                                                                                • String ID: "%1$%s\shell\open\command$D$WinSta0\Default
                                                                                                • API String ID: 3970221696-33419044
                                                                                                • Opcode ID: e694b7176fb8a28a245bf1d42cd1339caabe0a483718fef4c970ff6c88d46b01
                                                                                                • Instruction ID: 1b25b0a45bef261a021fb5083c82acc3057246fcdb2dce29f42dad51be48e8e0
                                                                                                • Opcode Fuzzy Hash: e694b7176fb8a28a245bf1d42cd1339caabe0a483718fef4c970ff6c88d46b01
                                                                                                • Instruction Fuzzy Hash: E651B8B695031966DB20E770CD45FEF7378DF55700F004595A60ABA180EAB1EA88CBB6
                                                                                                APIs
                                                                                                • LoadLibraryW.KERNEL32(wininet.dll), ref: 03D37CC3
                                                                                                • GetProcAddress.KERNEL32(00000000,InternetOpenW), ref: 03D37CD7
                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 03D37CF7
                                                                                                • GetProcAddress.KERNEL32(00000000,InternetOpenUrlW), ref: 03D37D16
                                                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 03D37D53
                                                                                                • _memset.LIBCMT ref: 03D37D7E
                                                                                                • GetProcAddress.KERNEL32(00000000,InternetReadFile), ref: 03D37D8C
                                                                                                • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 03D37DDB
                                                                                                • CloseHandle.KERNEL32(?), ref: 03D37DF9
                                                                                                • Sleep.KERNEL32(00000001), ref: 03D37E01
                                                                                                • GetProcAddress.KERNEL32(00000000,InternetCloseHandle), ref: 03D37E0D
                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 03D37E28
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressProc$Library$FileFree$CloseCreateHandleLoadSleepWrite_memset
                                                                                                • String ID: InternetCloseHandle$InternetOpenUrlW$InternetOpenW$InternetReadFile$MSIE 6.0$wininet.dll
                                                                                                • API String ID: 1463273941-1099148085
                                                                                                • Opcode ID: 276a1d01963d9be2cc1b90043bf89d06805feea37873b8fb7e40e7ad60c7d3c5
                                                                                                • Instruction ID: b75d227e3d2660bdd39530de087a195af01cc59814ab1b8f79a3f64bf9b339e3
                                                                                                • Opcode Fuzzy Hash: 276a1d01963d9be2cc1b90043bf89d06805feea37873b8fb7e40e7ad60c7d3c5
                                                                                                • Instruction Fuzzy Hash: C1418376A4021CABDB60EB649C41FEEB3F8BF45700F14C5A5F649A6280DE709E498F94
                                                                                                APIs
                                                                                                • Sleep.KERNEL32(00000064), ref: 03D3455A
                                                                                                • timeGetTime.WINMM ref: 03D3457B
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 03D3459B
                                                                                                • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 03D345BD
                                                                                                • SwitchToThread.KERNEL32 ref: 03D345D7
                                                                                                • SetEvent.KERNEL32(?), ref: 03D34620
                                                                                                • CloseHandle.KERNEL32(?), ref: 03D34644
                                                                                                • send.WS2_32(?,03D549C0,00000010,00000000), ref: 03D34668
                                                                                                • SetEvent.KERNEL32(?), ref: 03D34686
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 03D34691
                                                                                                • WSACloseEvent.WS2_32(?), ref: 03D3469F
                                                                                                • shutdown.WS2_32(?,00000001), ref: 03D346B3
                                                                                                • closesocket.WS2_32(?), ref: 03D346BD
                                                                                                • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000139F), ref: 03D346F6
                                                                                                • SetLastError.KERNEL32(000005B4), ref: 03D3470A
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 03D3472B
                                                                                                • InterlockedExchange.KERNEL32(?,00000001), ref: 03D34743
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: EventExchangeInterlockedThread$CloseCurrentErrorLast$CompareHandleSleepSwitchTimeclosesocketsendshutdowntime
                                                                                                • String ID:
                                                                                                • API String ID: 1692523546-0
                                                                                                • Opcode ID: 4befca92619bc11816da0241d3608cba1de7ac60c9c58076bc2d7fb07b78e526
                                                                                                • Instruction ID: fc0f2b14fdaeae28973c7aa56c1c140786753cc471b09f7d244b5a033255145d
                                                                                                • Opcode Fuzzy Hash: 4befca92619bc11816da0241d3608cba1de7ac60c9c58076bc2d7fb07b78e526
                                                                                                • Instruction Fuzzy Hash: C991BF75600702ABC724EF26D888BAAF7B9FF46B01F088519E5168B644C738FD95CBD0
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _memset$swprintf$_malloc
                                                                                                • String ID: %s %s$onlyloadinmyself$plugmark
                                                                                                • API String ID: 1873853019-591889663
                                                                                                • Opcode ID: 181efb87db7967286ea24112073f3085242fa736ec620a73b6e7bd651342f7af
                                                                                                • Instruction ID: 5e7e8001868050a2daa29c749c7c52db78899e3a0e4d12dd479bc2fdc350b01e
                                                                                                • Opcode Fuzzy Hash: 181efb87db7967286ea24112073f3085242fa736ec620a73b6e7bd651342f7af
                                                                                                • Instruction Fuzzy Hash: 3681D2B9A40304ABEB10EF64DC86F6B7764EF46710F084064FD596F382E671ED1586B2
                                                                                                APIs
                                                                                                • IsWindowVisible.USER32(?), ref: 03D35CD3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: VisibleWindow
                                                                                                • String ID: ApateDNS$Capsa$CurrPorts$Fiddler$Malwarebytes$Metascan$Port$Process$Sniff$TCPEye$TaskExplorer$Wireshark
                                                                                                • API String ID: 1208467747-3439171801
                                                                                                • Opcode ID: 309d03d51cf1eb377de974c74b5c931ea03d6f5b661054a6fbec7573b83cb025
                                                                                                • Instruction ID: d4f594fd8f7938689fc6630cf21db31e10bf3a370df07eff06ed5fe271116a04
                                                                                                • Opcode Fuzzy Hash: 309d03d51cf1eb377de974c74b5c931ea03d6f5b661054a6fbec7573b83cb025
                                                                                                • Instruction Fuzzy Hash: 984182B6E427116BDEA2F531BD02F9F614E4D23987F080065FD1DB8105F64AA72981FE
                                                                                                APIs
                                                                                                • Sleep.KERNEL32(00000064), ref: 1000455A
                                                                                                • timeGetTime.WINMM ref: 1000457B
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 1000459B
                                                                                                • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 100045BD
                                                                                                • SwitchToThread.KERNEL32 ref: 100045D7
                                                                                                • SetEvent.KERNEL32(?), ref: 10004620
                                                                                                • CloseHandle.KERNEL32(?), ref: 10004644
                                                                                                • send.WS2_32(?,10017440,00000010,00000000), ref: 10004668
                                                                                                • SetEvent.KERNEL32(?), ref: 10004686
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 10004691
                                                                                                • WSACloseEvent.WS2_32(?), ref: 1000469F
                                                                                                • shutdown.WS2_32(?,00000001), ref: 100046B3
                                                                                                • closesocket.WS2_32(?), ref: 100046BD
                                                                                                • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000139F), ref: 100046F6
                                                                                                • SetLastError.KERNEL32(000005B4), ref: 1000470A
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 1001FA44
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: EventThread$CloseCurrentErrorExchangeInterlockedLast$CompareHandleSleepSwitchTimeclosesocketsendshutdowntime
                                                                                                • String ID:
                                                                                                • API String ID: 3448239111-0
                                                                                                • Opcode ID: 8d79b15aa9448fa8a40132b16a0a16f3e48fc421b71208ac07a5b091827d0d03
                                                                                                • Instruction ID: f154daa7adb366bc59dc3c87c5a832f84626f43c2ad915a7de221fbbd04ec74e
                                                                                                • Opcode Fuzzy Hash: 8d79b15aa9448fa8a40132b16a0a16f3e48fc421b71208ac07a5b091827d0d03
                                                                                                • Instruction Fuzzy Hash: CC51F4B4600A22EFE311DF60CCC8B99B7A5FF09782F114115E5058B694DB72F8A0CBD5
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000000D,?,?,?,?,?,?,03D3A8C1,?,?), ref: 03D3DA43
                                                                                                • SetLastError.KERNEL32(000000C1,?,?,?,?,?,?,03D3A8C1,?,?), ref: 03D3DA62
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 1452528299-0
                                                                                                • Opcode ID: 9d122c60a30e87a336af0d2d90526b228c5249101df5c432eac739841eddaf25
                                                                                                • Instruction ID: eb0b606cf797b8b9baf22fb89ea02bda3b7282649b40bdf1a87b60422c83bc73
                                                                                                • Opcode Fuzzy Hash: 9d122c60a30e87a336af0d2d90526b228c5249101df5c432eac739841eddaf25
                                                                                                • Instruction Fuzzy Hash: 8281FE767003049FD720DFA9EC84B6AB7EAFB49715F084569E909CB740E7B1E914CBA0
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 03D3C63D
                                                                                                • _memset.LIBCMT ref: 03D3C64C
                                                                                                • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,00000000), ref: 03D3C66F
                                                                                                  • Part of subcall function 03D3C81E: RegCloseKey.ADVAPI32(80000000,03D3C7FA), ref: 03D3C82B
                                                                                                  • Part of subcall function 03D3C81E: RegCloseKey.ADVAPI32(00000000), ref: 03D3C834
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Close_memset$Open
                                                                                                • String ID: %08X
                                                                                                • API String ID: 4292648718-3773563069
                                                                                                • Opcode ID: c48286af2e85d38dc3a6cc07caf6d997d77da5afd035e066e7fea01d35298013
                                                                                                • Instruction ID: 619688a6cfb32d586cfd42ba6e7e07be0e58e2be31e088b0f43828a3a833d606
                                                                                                • Opcode Fuzzy Hash: c48286af2e85d38dc3a6cc07caf6d997d77da5afd035e066e7fea01d35298013
                                                                                                • Instruction Fuzzy Hash: 44513FF2910318ABDB24EF60DC85FEAB778EB45704F444599F609AB180D774AF48CBA4
                                                                                                APIs
                                                                                                • socket.WS2_32(00000002,00000002,00000011), ref: 10003710
                                                                                                • WSAIoctl.WS2_32(00000000,9800000C,?,00000004,00000000,00000000,?,00000000,00000000), ref: 10003749
                                                                                                • setsockopt.WS2_32(?,0000FFFF,000000FB,?,00000004), ref: 10003766
                                                                                                • setsockopt.WS2_32(?,0000FFFF,00000004,?,00000004), ref: 10003779
                                                                                                • WSACreateEvent.WS2_32 ref: 1000377B
                                                                                                • lstrlenW.KERNEL32(?,00000000,00000000,00000000,00000000,?,?,?,?,?,1001D990), ref: 1000378D
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000,?,?,?,?,?,1001D990), ref: 10003799
                                                                                                • lstrlenW.KERNEL32(?,00000000,?,00000000,00000000,?,?,?,?,?,?,1001D990), ref: 100037B8
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000,?,?,?,?,?,?,1001D990), ref: 100037C4
                                                                                                • gethostbyname.WS2_32(00000000), ref: 100037D2
                                                                                                • htons.WS2_32(?), ref: 100037F8
                                                                                                • WSAEventSelect.WS2_32(?,?,00000030), ref: 10003816
                                                                                                • connect.WS2_32(?,?,00000010), ref: 1000382B
                                                                                                • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,1001D990), ref: 1000383A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharEventMultiWidelstrlensetsockopt$CreateErrorIoctlLastSelectconnectgethostbynamehtonssocket
                                                                                                • String ID:
                                                                                                • API String ID: 1455939504-0
                                                                                                • Opcode ID: 717cd69355dde577bb5fef79b8aa358efc8542f3cb33ac356917f685119aa9e6
                                                                                                • Instruction ID: 3f7f27d39b3a29da93cc6ce51bc3e722b1ee51b6efc1866e7789f3871d2ad327
                                                                                                • Opcode Fuzzy Hash: 717cd69355dde577bb5fef79b8aa358efc8542f3cb33ac356917f685119aa9e6
                                                                                                • Instruction Fuzzy Hash: E74160B1A40205ABE711DBA4CC89F6FB7B8EB48711F108619FA159B2D0DA71A904CB60
                                                                                                APIs
                                                                                                • socket.WS2_32(00000002,00000002,00000011), ref: 03D33710
                                                                                                • WSAIoctl.WS2_32(00000000,9800000C,?,00000004,00000000,00000000,?,00000000,00000000), ref: 03D33749
                                                                                                • setsockopt.WS2_32(?,0000FFFF,000000FB,?,00000004), ref: 03D33766
                                                                                                • setsockopt.WS2_32(?,0000FFFF,00000004,?,00000004), ref: 03D33779
                                                                                                • WSACreateEvent.WS2_32 ref: 03D3377B
                                                                                                • lstrlenW.KERNEL32(?,00000000,00000000,00000000,00000000,?,?,?,?,?,03D61F0C), ref: 03D3378D
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000,?,?,?,?,?,03D61F0C), ref: 03D33799
                                                                                                • lstrlenW.KERNEL32(?,00000000,?,00000000,00000000,?,?,?,?,?,?,03D61F0C), ref: 03D337B8
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000,?,?,?,?,?,?,03D61F0C), ref: 03D337C4
                                                                                                • gethostbyname.WS2_32(00000000), ref: 03D337D2
                                                                                                • htons.WS2_32(?), ref: 03D337F8
                                                                                                • WSAEventSelect.WS2_32(?,?,00000030), ref: 03D33816
                                                                                                • connect.WS2_32(?,?,00000010), ref: 03D3382B
                                                                                                • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,03D61F0C), ref: 03D3383A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharEventMultiWidelstrlensetsockopt$CreateErrorIoctlLastSelectconnectgethostbynamehtonssocket
                                                                                                • String ID:
                                                                                                • API String ID: 1455939504-0
                                                                                                • Opcode ID: a1233d3bfc141721389dad471d8857286f4b29712e646272e0e4faf1dca1d867
                                                                                                • Instruction ID: cb3fa5cd891c3fdf08a31d8dd73e5cbbbf8d6977cf6204c4efad2661a440760c
                                                                                                • Opcode Fuzzy Hash: a1233d3bfc141721389dad471d8857286f4b29712e646272e0e4faf1dca1d867
                                                                                                • Instruction Fuzzy Hash: 48416FB6A00305ABE724EBA4DC89F7FB7B8FB49B10F104519F615AA2C0C674A904CB60
                                                                                                APIs
                                                                                                • GetLocalTime.KERNEL32(?,E832A845), ref: 03D3AA58
                                                                                                • wsprintfW.USER32 ref: 03D3AA8F
                                                                                                • _memset.LIBCMT ref: 03D3AAA7
                                                                                                • _memset.LIBCMT ref: 03D3AABA
                                                                                                  • Part of subcall function 03D38020: lstrlenW.KERNEL32(?), ref: 03D38038
                                                                                                  • Part of subcall function 03D38020: _memset.LIBCMT ref: 03D38042
                                                                                                  • Part of subcall function 03D38020: lstrlenW.KERNEL32(?), ref: 03D3804B
                                                                                                  • Part of subcall function 03D38020: lstrlenW.KERNEL32(?), ref: 03D38056
                                                                                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 03D3ABBE
                                                                                                • Sleep.KERNEL32(000003E8,?,?,?,?,?,?), ref: 03D3AC6E
                                                                                                • CloseHandle.KERNEL32(?), ref: 03D3ACAA
                                                                                                  • Part of subcall function 03D3F707: _malloc.LIBCMT ref: 03D3F721
                                                                                                  • Part of subcall function 03D39730: CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,E832A845,00000000,?,?,?,00000000,03D5125B,000000FF,?,03D3E04E,00000000), ref: 03D39773
                                                                                                  • Part of subcall function 03D39730: InitializeCriticalSectionAndSpinCount.KERNEL32(03D3E1AE,00000000,?,?,?,00000000,03D5125B,000000FF,?,03D3E04E), ref: 03D39812
                                                                                                  • Part of subcall function 03D39730: CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000,03D5125B,000000FF,?,03D3E04E), ref: 03D39850
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateEvent_memsetlstrlen$CloseCountCriticalHandleInitializeLocalSectionSleepSpinTime_mallocwsprintf
                                                                                                • String ID: %4d.%2d.%2d-%2d:%2d:%2d$o1:$p1:$t1:
                                                                                                • API String ID: 1254190970-1225219777
                                                                                                • Opcode ID: abab60a9dfed5bc82febafef1bb38c92d2932c2fcb809d02b027056383479418
                                                                                                • Instruction ID: a66d6a4d960006df18fe67cad16a2df5bd7aa3cdad19b72edfeb7794471764e5
                                                                                                • Opcode Fuzzy Hash: abab60a9dfed5bc82febafef1bb38c92d2932c2fcb809d02b027056383479418
                                                                                                • Instruction Fuzzy Hash: 84618FB5608340AFD760DF64D881AABB7E9FB8A614F004A1DF5D997280E7349944CBA3
                                                                                                APIs
                                                                                                • RegOpenKeyExW.ADVAPI32(80000001,AppEvents,00000000,00000002,?), ref: 03D3C889
                                                                                                • RegDeleteValueW.ADVAPI32(?), ref: 03D3C894
                                                                                                • RegCloseKey.ADVAPI32(?), ref: 03D3C8A4
                                                                                                • RegCreateKeyW.ADVAPI32(80000001,AppEvents,?), ref: 03D3C8C3
                                                                                                • lstrlenW.KERNEL32(?), ref: 03D3C8D1
                                                                                                • RegSetValueExW.ADVAPI32(?,?,00000000,00000003,?,00000000), ref: 03D3C8E4
                                                                                                • RegCloseKey.ADVAPI32(?,?,00000000,00000003,?,00000000), ref: 03D3C8F2
                                                                                                • RegCloseKey.ADVAPI32(?), ref: 03D3C900
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Close$Value$CreateDeleteOpenlstrlen
                                                                                                • String ID: AppEvents$Network
                                                                                                • API String ID: 3935456190-3733486940
                                                                                                • Opcode ID: 010b5213e91110bee61fe9d264ce7457ba6a1ba60e23c7e35e0391cce6008cb9
                                                                                                • Instruction ID: bea4449381b4cf862155f07c4f431599de4226a84bae9660c6ebb534a93bfd94
                                                                                                • Opcode Fuzzy Hash: 010b5213e91110bee61fe9d264ce7457ba6a1ba60e23c7e35e0391cce6008cb9
                                                                                                • Instruction Fuzzy Hash: E5118277A01204FBE720DAA8EC89FABB76CEB05711F100548FA01A7340DA71AE14D7A4
                                                                                                APIs
                                                                                                • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,D9F8D1C9), ref: 10005A65
                                                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000), ref: 10005B04
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 10005B42
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 10005B67
                                                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000), ref: 10005C5F
                                                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000), ref: 10005C80
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 10005B8C
                                                                                                  • Part of subcall function 10001280: __CxxThrowException@8.LIBCMT ref: 10001290
                                                                                                  • Part of subcall function 10001280: DeleteCriticalSection.KERNEL32(00000000,?,10017E78), ref: 100012A1
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 10005CF1
                                                                                                • timeGetTime.WINMM ref: 10005CF7
                                                                                                • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 10005D0B
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 10005D14
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateEvent$CriticalSection$CountInitializeSpin$DeleteException@8ExchangeInterlockedThrowTimetime
                                                                                                • String ID:
                                                                                                • API String ID: 1400036169-0
                                                                                                • Opcode ID: c8c359a865a91754db648c7caefba5610723c896864770a6932f917ef1d9d91d
                                                                                                • Instruction ID: f393ff6f41c53dec0a4a663a217bd1082015950f507b03806f4406e75142b299
                                                                                                • Opcode Fuzzy Hash: c8c359a865a91754db648c7caefba5610723c896864770a6932f917ef1d9d91d
                                                                                                • Instruction Fuzzy Hash: 7AA1D7B0A01A56AFE354CF6AC8C479AFBE8FB08344F50862EE11DD7640D775A964CF90
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000139F,D9F8D1C9,745947A0,?,?,00000001), ref: 10004CC6
                                                                                                • EnterCriticalSection.KERNEL32(?,D9F8D1C9,745947A0,?,?,00000001), ref: 10004CED
                                                                                                • SetLastError.KERNEL32(0000139F), ref: 10004D01
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 10004D08
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalErrorLastSection$EnterLeave
                                                                                                • String ID:
                                                                                                • API String ID: 2124651672-0
                                                                                                • Opcode ID: f9e9e3c5f85a9396c58d0e811c6a772e6e8b8bf194744a3e55c98ac89ef18c7f
                                                                                                • Instruction ID: f936773d66b76d96f3ecbf8df82172045f4aecfa059d2fdb31757c61ce649d4c
                                                                                                • Opcode Fuzzy Hash: f9e9e3c5f85a9396c58d0e811c6a772e6e8b8bf194744a3e55c98ac89ef18c7f
                                                                                                • Instruction Fuzzy Hash: 5351BCB6A04601DFE311DFA8D985B6AB7F4FF48751F01462EE90A8B740DB36E8008B91
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000139F,E832A845,?,?,?,?,00000000,000000FF,00000000), ref: 03D34CE6
                                                                                                • EnterCriticalSection.KERNEL32(?,E832A845,?,?,?,?,00000000,000000FF,00000000), ref: 03D34D0D
                                                                                                • SetLastError.KERNEL32(0000139F,?,?,00000000,000000FF), ref: 03D34D21
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,?,00000000,000000FF), ref: 03D34D28
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalErrorLastSection$EnterLeave
                                                                                                • String ID:
                                                                                                • API String ID: 2124651672-0
                                                                                                • Opcode ID: 63369916a4da51506ed68703d36deae567350f1b5812fe748959432fda28448a
                                                                                                • Instruction ID: d4d53de5bd41ca0cf63a7862d3081007c3c5bc5bda3c47d057666439f329db3d
                                                                                                • Opcode Fuzzy Hash: 63369916a4da51506ed68703d36deae567350f1b5812fe748959432fda28448a
                                                                                                • Instruction Fuzzy Hash: DB51AE7AA047049FD724EFA9E484B6AF7F4FF48710F04496EE91AC7740D735A9048B51
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 03D3E751
                                                                                                • GetForegroundWindow.USER32(?,74DF23A0,00000000), ref: 03D3E759
                                                                                                • GetWindowTextW.USER32(00000000,03D616F0,00000800), ref: 03D3E76F
                                                                                                • _memset.LIBCMT ref: 03D3E78D
                                                                                                • lstrlenW.KERNEL32(03D616F0,?,?,?,?,74DF23A0,00000000), ref: 03D3E7AC
                                                                                                • GetLocalTime.KERNEL32(?,?,?,?,?,74DF23A0,00000000), ref: 03D3E7BD
                                                                                                • wsprintfW.USER32 ref: 03D3E804
                                                                                                  • Part of subcall function 03D3E6B0: WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,?,?,03D3E815,?,?,?,?,74DF23A0,00000000), ref: 03D3E6BD
                                                                                                  • Part of subcall function 03D3E6B0: CreateFileW.KERNEL32(03D60D80,40000000,00000002,00000000,00000004,00000002,00000000,?,?,03D3E815,?,?,?,?,74DF23A0,00000000), ref: 03D3E6D7
                                                                                                  • Part of subcall function 03D3E6B0: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 03D3E6F2
                                                                                                  • Part of subcall function 03D3E6B0: lstrlenW.KERNEL32(?,00000000,00000000), ref: 03D3E6FF
                                                                                                  • Part of subcall function 03D3E6B0: WriteFile.KERNEL32(00000000,?,00000000), ref: 03D3E70A
                                                                                                  • Part of subcall function 03D3E6B0: CloseHandle.KERNEL32(00000000), ref: 03D3E711
                                                                                                  • Part of subcall function 03D3E6B0: ReleaseMutex.KERNEL32(00000000), ref: 03D3E71E
                                                                                                • _memset.LIBCMT ref: 03D3E820
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File_memset$Windowlstrlen$CloseCreateForegroundHandleLocalMutexObjectPointerReleaseSingleTextTimeWaitWritewsprintf
                                                                                                • String ID: [
                                                                                                • API String ID: 2192163267-4056885943
                                                                                                • Opcode ID: 543bb8ab196e4fa8946cf49ba3e0db7fff7e2b115650ca93579a4054d1cfb80d
                                                                                                • Instruction ID: 60b450c09f447f6c02de55655668d5ed439a490c01e67244fd9c81ad2c320921
                                                                                                • Opcode Fuzzy Hash: 543bb8ab196e4fa8946cf49ba3e0db7fff7e2b115650ca93579a4054d1cfb80d
                                                                                                • Instruction Fuzzy Hash: 6421B77A900218ABD760EFA4DC05BBA77BDFF04701F048195F55596284DE706989CBF4
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(?,?,?,?,03D3398D,?,00000000,000000FF,00000000), ref: 03D33E05
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,?,03D3398D,?,00000000,000000FF,00000000), ref: 03D33E50
                                                                                                • send.WS2_32(?,000000FF,00000000,00000000), ref: 03D33E6E
                                                                                                • EnterCriticalSection.KERNEL32(?), ref: 03D33E81
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 03D33E94
                                                                                                • HeapFree.KERNEL32(00000000,00000000,?,?,?,03D3398D,?,00000000,000000FF,00000000), ref: 03D33EBC
                                                                                                • WSAGetLastError.WS2_32(?,?,03D3398D,?,00000000,000000FF,00000000), ref: 03D33EC7
                                                                                                • EnterCriticalSection.KERNEL32(?,?,?,03D3398D,?,00000000,000000FF,00000000), ref: 03D33EDB
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 03D33F14
                                                                                                • HeapFree.KERNEL32(00000000,00000000,?), ref: 03D33F51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterLeave$FreeHeap$ErrorLastsend
                                                                                                • String ID:
                                                                                                • API String ID: 1701177279-0
                                                                                                • Opcode ID: 3b98a162d89a32374f207e6e234c41d389a7abc38a77dd46e5102a17f135bb1b
                                                                                                • Instruction ID: a38eb4f6b9e5f7d99594a0f6edd530d8ca898b20638fb3be1948285691746c4e
                                                                                                • Opcode Fuzzy Hash: 3b98a162d89a32374f207e6e234c41d389a7abc38a77dd46e5102a17f135bb1b
                                                                                                • Instruction Fuzzy Hash: 2F41487A5057059FC724DF78DA88AA7B7F8FB0A300F44896DE86ECB240E731E9048B50
                                                                                                APIs
                                                                                                • WSASetLastError.WS2_32(0000000D), ref: 10004F43
                                                                                                • EnterCriticalSection.KERNEL32(?), ref: 10004F58
                                                                                                • WSASetLastError.WS2_32(00002746), ref: 10004F6A
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 10004F71
                                                                                                • timeGetTime.WINMM ref: 10004F9F
                                                                                                • timeGetTime.WINMM ref: 10004FC7
                                                                                                • SetEvent.KERNEL32(?), ref: 10005005
                                                                                                • InterlockedExchange.KERNEL32(?,00000001), ref: 10005011
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 10005018
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 1000502B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$Leave$ErrorLastTimetime$EnterEventExchangeInterlocked
                                                                                                • String ID:
                                                                                                • API String ID: 1979691958-0
                                                                                                • Opcode ID: 0eddb7f70435084fad788b00feb35f5cb1569ae860eba9b4df7dc0cd97004f8a
                                                                                                • Instruction ID: 4b24d02a6ebada58952bd9850e7d83bafc68aeb9978cf5702291cfe2885936af
                                                                                                • Opcode Fuzzy Hash: 0eddb7f70435084fad788b00feb35f5cb1569ae860eba9b4df7dc0cd97004f8a
                                                                                                • Instruction Fuzzy Hash: 91410971600242DFF320DF68C988B5AB7F5FF48395F068569E54ACB255EB76EC408B81
                                                                                                APIs
                                                                                                • WSASetLastError.WS2_32(0000000D,00000000,000000FF,00000000,000000FF,00000000), ref: 03D34F63
                                                                                                • EnterCriticalSection.KERNEL32(000002FF,00000000,000000FF,00000000,000000FF,00000000), ref: 03D34F78
                                                                                                • WSASetLastError.WS2_32(00002746), ref: 03D34F8A
                                                                                                • LeaveCriticalSection.KERNEL32(000002FF), ref: 03D34F91
                                                                                                • timeGetTime.WINMM ref: 03D34FBF
                                                                                                • timeGetTime.WINMM ref: 03D34FE7
                                                                                                • SetEvent.KERNEL32(?), ref: 03D35025
                                                                                                • InterlockedExchange.KERNEL32(?,00000001), ref: 03D35031
                                                                                                • LeaveCriticalSection.KERNEL32(000002FF), ref: 03D35038
                                                                                                • LeaveCriticalSection.KERNEL32(000002FF), ref: 03D3504B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$Leave$ErrorLastTimetime$EnterEventExchangeInterlocked
                                                                                                • String ID:
                                                                                                • API String ID: 1979691958-0
                                                                                                • Opcode ID: 16dc4789a9dbb0dc003811090f8c102e599b4154e8d3c68d934fd941e0fc72da
                                                                                                • Instruction ID: b5ff198ba2517d77909bcd2fb67b9feacca89f3e9affb58fcab41d437489449e
                                                                                                • Opcode Fuzzy Hash: 16dc4789a9dbb0dc003811090f8c102e599b4154e8d3c68d934fd941e0fc72da
                                                                                                • Instruction Fuzzy Hash: 794108326003049FD720EF69D548A6AB7F9FF4A714F0C4999E84AC7751E339EC548B40
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 03D3C2AE
                                                                                                • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000), ref: 03D3C2CC
                                                                                                • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 03D3C309
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 03D3C314
                                                                                                • lstrlenW.KERNEL32(?), ref: 03D3C321
                                                                                                • wsprintfW.USER32 ref: 03D3C345
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateHandleWrite_memsetlstrlenwsprintf
                                                                                                • String ID: %s %s
                                                                                                • API String ID: 1326869720-2939940506
                                                                                                • Opcode ID: 97574590727fc250714306d07a59a10673f26f580e0b4df487c5ef6d9a544722
                                                                                                • Instruction ID: b9be9f65795f449cf04e6e1ef210b73aa819d4b17a6c70bc6a4923cba9efa363
                                                                                                • Opcode Fuzzy Hash: 97574590727fc250714306d07a59a10673f26f580e0b4df487c5ef6d9a544722
                                                                                                • Instruction Fuzzy Hash: B7319236A503186BDB24EB64DC84FEB736CEB46711F400699B606B7180DA30AF48CFA1
                                                                                                APIs
                                                                                                • lstrlenW.KERNEL32(?), ref: 03D3C98D
                                                                                                • _wcsrchr.LIBCMT ref: 03D3C9C7
                                                                                                  • Part of subcall function 03D37C80: LoadLibraryW.KERNEL32(wininet.dll), ref: 03D37CC3
                                                                                                  • Part of subcall function 03D37C80: GetProcAddress.KERNEL32(00000000,InternetOpenW), ref: 03D37CD7
                                                                                                  • Part of subcall function 03D37C80: FreeLibrary.KERNEL32(00000000), ref: 03D37CF7
                                                                                                • GetFileAttributesW.KERNEL32(-00000002), ref: 03D3C9E6
                                                                                                • GetLastError.KERNEL32 ref: 03D3C9F1
                                                                                                • _memset.LIBCMT ref: 03D3CA04
                                                                                                • CreateProcessW.KERNEL32(00000000,-00000002,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 03D3CA31
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Library$AddressAttributesCreateErrorFileFreeLastLoadProcProcess_memset_wcsrchrlstrlen
                                                                                                • String ID: D$WinSta0\Default
                                                                                                • API String ID: 174883095-1101385590
                                                                                                • Opcode ID: fb0bc4571a31cd2cc1a555297a8608f9e3cd1e6ae91985de53915a2ddda83abb
                                                                                                • Instruction ID: 335b67595c9d6e2e9a9b82a7a729b93d3a957c77b3c43a7a329abd0ae91f95ac
                                                                                                • Opcode Fuzzy Hash: fb0bc4571a31cd2cc1a555297a8608f9e3cd1e6ae91985de53915a2ddda83abb
                                                                                                • Instruction Fuzzy Hash: F811BBB790020867D724E6B89C45FAFB76DEB46710F040535FA06EB384E675DD05C6B2
                                                                                                APIs
                                                                                                • lstrcmpiW.KERNEL32(?,A:\), ref: 03D38166
                                                                                                • lstrcmpiW.KERNEL32(?,B:\), ref: 03D38176
                                                                                                • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 03D381A6
                                                                                                • lstrlenW.KERNEL32(?), ref: 03D381B7
                                                                                                • __wcsnicmp.LIBCMT ref: 03D381CE
                                                                                                • lstrcpyW.KERNEL32(00000AD4,?), ref: 03D38204
                                                                                                • lstrcpyW.KERNEL32(?,?), ref: 03D38228
                                                                                                • lstrcatW.KERNEL32(?,00000000), ref: 03D38233
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: lstrcmpilstrcpy$DeviceQuery__wcsnicmplstrcatlstrlen
                                                                                                • String ID: A:\$B:\
                                                                                                • API String ID: 4249875308-1009255891
                                                                                                • Opcode ID: 3cdf1d3eaad03d77a7e34092933a004484cff3b3d68a5c8bca3c6160550214bb
                                                                                                • Instruction ID: c2235a78f3234207bb5460ac79399c6a75ffe421d3a5a44cea48ba69f508dd8b
                                                                                                • Opcode Fuzzy Hash: 3cdf1d3eaad03d77a7e34092933a004484cff3b3d68a5c8bca3c6160550214bb
                                                                                                • Instruction Fuzzy Hash: DB114F76A012199BDB24EF60DD44BEEB379EF45710F044498EE1AB7240E770AA0DCBA5
                                                                                                APIs
                                                                                                • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,E832A845,00000000,?,?,?,00000000,03D5125B,000000FF,?,03D3E04E,00000000), ref: 03D39773
                                                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(03D3E1AE,00000000,?,?,?,00000000,03D5125B,000000FF,?,03D3E04E), ref: 03D39812
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000,03D5125B,000000FF,?,03D3E04E), ref: 03D39850
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000,03D5125B,000000FF,?,03D3E04E), ref: 03D39875
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000,03D5125B,000000FF,?,03D3E04E), ref: 03D3989A
                                                                                                  • Part of subcall function 03D31280: __CxxThrowException@8.LIBCMT ref: 03D31290
                                                                                                  • Part of subcall function 03D31280: DeleteCriticalSection.KERNEL32(00000000,03D3D3E6,03D56624,?,?,03D3D3E6,?,?,?,?,03D55A40,00000000), ref: 03D312A1
                                                                                                  • Part of subcall function 03D3CE10: InitializeCriticalSectionAndSpinCount.KERNEL32(03D3E076,00000000,E832A845,03D3E04E,74DF2F60,00000000,?,03D3E226,03D5110B,000000FF,?,03D3994A,03D3E226), ref: 03D3CE67
                                                                                                  • Part of subcall function 03D3CE10: InitializeCriticalSectionAndSpinCount.KERNEL32(03D3E08E,00000000,?,03D3E226,03D5110B,000000FF,?,03D3994A,03D3E226,?,?,?,00000000,03D5125B,000000FF), ref: 03D3CE83
                                                                                                • InterlockedExchange.KERNEL32(03D3E066,00000000), ref: 03D399A0
                                                                                                • timeGetTime.WINMM(?,?,?,00000000,03D5125B,000000FF,?,03D3E04E), ref: 03D399A6
                                                                                                • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,00000000,03D5125B,000000FF,?,03D3E04E), ref: 03D399B4
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000,03D5125B,000000FF,?,03D3E04E), ref: 03D399BD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateEvent$CriticalSection$CountInitializeSpin$DeleteException@8ExchangeInterlockedThrowTimetime
                                                                                                • String ID:
                                                                                                • API String ID: 1400036169-0
                                                                                                • Opcode ID: 2dcb134a823b29d6b0d7d6b661764e462efb0ac23ef3034eb6405f2f44ac5f36
                                                                                                • Instruction ID: 00d33b58cb9d31b5fb5a1b5fa294c9e27780ee5287e96bd02977f97d9280fd34
                                                                                                • Opcode Fuzzy Hash: 2dcb134a823b29d6b0d7d6b661764e462efb0ac23ef3034eb6405f2f44ac5f36
                                                                                                • Instruction Fuzzy Hash: 7D81D5B1A05B46BFE344DF7A888479AFBA8FB09304F50462EE12C97640D774A964CF90
                                                                                                APIs
                                                                                                  • Part of subcall function 10003660: CreateWaitableTimerW.KERNEL32(00000000,00000000,00000000), ref: 10003667
                                                                                                  • Part of subcall function 10003660: _free.LIBCMT ref: 1000369C
                                                                                                  • Part of subcall function 10003660: _malloc.LIBCMT ref: 100036D7
                                                                                                  • Part of subcall function 10003660: _memset.LIBCMT ref: 100036E5
                                                                                                • InterlockedIncrement.KERNEL32(1001D990), ref: 10003565
                                                                                                • InterlockedIncrement.KERNEL32(1001D990), ref: 10003573
                                                                                                • setsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 1000359A
                                                                                                • setsockopt.WS2_32(?,0000FFFF,00001002,?,00000004), ref: 100035B3
                                                                                                • ResetEvent.KERNEL32(?,?,?,1001D990), ref: 100035EE
                                                                                                • SetLastError.KERNEL32(00000000), ref: 10003621
                                                                                                • GetLastError.KERNEL32 ref: 10003639
                                                                                                  • Part of subcall function 10003F60: GetCurrentThreadId.KERNEL32 ref: 10003F65
                                                                                                  • Part of subcall function 10003F60: send.WS2_32(?,10017440,00000010,00000000), ref: 10003FC6
                                                                                                  • Part of subcall function 10003F60: SetEvent.KERNEL32(?), ref: 10003FE9
                                                                                                  • Part of subcall function 10003F60: InterlockedExchange.KERNEL32(?,00000000), ref: 10003FF5
                                                                                                  • Part of subcall function 10003F60: WSACloseEvent.WS2_32(?), ref: 10004003
                                                                                                  • Part of subcall function 10003F60: shutdown.WS2_32(?,00000001), ref: 1000401B
                                                                                                  • Part of subcall function 10003F60: closesocket.WS2_32(?), ref: 10004025
                                                                                                • SetLastError.KERNEL32(00000000), ref: 10003649
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorEventInterlockedLast$Incrementsetsockopt$CloseCreateCurrentExchangeResetThreadTimerWaitable_free_malloc_memsetclosesocketsendshutdown
                                                                                                • String ID:
                                                                                                • API String ID: 127459856-0
                                                                                                • Opcode ID: 27567248ad9cb40579700c88c4b0573dbe1feeef2cc9a6d62e2a760125df68bb
                                                                                                • Instruction ID: 683d4fe1a0db9e8cd201fdded36c2c75d02b426da01d37e97b5f8f569f7a2aba
                                                                                                • Opcode Fuzzy Hash: 27567248ad9cb40579700c88c4b0573dbe1feeef2cc9a6d62e2a760125df68bb
                                                                                                • Instruction Fuzzy Hash: 8041AFB5600704AFE360EF69CC81B9BB7E8FB48341F50882EE646D7690D7B1F8448B90
                                                                                                APIs
                                                                                                  • Part of subcall function 03D33660: CreateWaitableTimerW.KERNEL32(00000000,00000000,00000000), ref: 03D33667
                                                                                                  • Part of subcall function 03D33660: _free.LIBCMT ref: 03D3369C
                                                                                                  • Part of subcall function 03D33660: _malloc.LIBCMT ref: 03D336D7
                                                                                                  • Part of subcall function 03D33660: _memset.LIBCMT ref: 03D336E5
                                                                                                • InterlockedIncrement.KERNEL32(03D61F0C), ref: 03D33565
                                                                                                • InterlockedIncrement.KERNEL32(03D61F0C), ref: 03D33573
                                                                                                • setsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 03D3359A
                                                                                                • setsockopt.WS2_32(?,0000FFFF,00001002,?,00000004), ref: 03D335B3
                                                                                                • ResetEvent.KERNEL32(?,?,?,03D61F0C), ref: 03D335EE
                                                                                                • SetLastError.KERNEL32(00000000), ref: 03D33621
                                                                                                • GetLastError.KERNEL32 ref: 03D33639
                                                                                                  • Part of subcall function 03D33F60: GetCurrentThreadId.KERNEL32 ref: 03D33F65
                                                                                                  • Part of subcall function 03D33F60: send.WS2_32(?,03D549C0,00000010,00000000), ref: 03D33FC6
                                                                                                  • Part of subcall function 03D33F60: SetEvent.KERNEL32(?), ref: 03D33FE9
                                                                                                  • Part of subcall function 03D33F60: InterlockedExchange.KERNEL32(?,00000000), ref: 03D33FF5
                                                                                                  • Part of subcall function 03D33F60: WSACloseEvent.WS2_32(?), ref: 03D34003
                                                                                                  • Part of subcall function 03D33F60: shutdown.WS2_32(?,00000001), ref: 03D3401B
                                                                                                  • Part of subcall function 03D33F60: closesocket.WS2_32(?), ref: 03D34025
                                                                                                • SetLastError.KERNEL32(00000000), ref: 03D33649
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorEventInterlockedLast$Incrementsetsockopt$CloseCreateCurrentExchangeResetThreadTimerWaitable_free_malloc_memsetclosesocketsendshutdown
                                                                                                • String ID:
                                                                                                • API String ID: 127459856-0
                                                                                                • Opcode ID: b7d4e5f6a274889837658a29eb6df37290e61cc3156f7bccb14a7c3e7c5608b0
                                                                                                • Instruction ID: 6dcfda2ddf60dfa85615f5ad2e9c61d7a64e115ec357fe5b2105c12076fe1e1f
                                                                                                • Opcode Fuzzy Hash: b7d4e5f6a274889837658a29eb6df37290e61cc3156f7bccb14a7c3e7c5608b0
                                                                                                • Instruction Fuzzy Hash: 72419FBA640704AFD360EF69DD81B6AB7E8FF49711F10092EE646D7740D7B4E9088B60
                                                                                                APIs
                                                                                                • ResetEvent.KERNEL32(?), ref: 10004443
                                                                                                • ResetEvent.KERNEL32(?), ref: 1000444C
                                                                                                • timeGetTime.WINMM ref: 1000444E
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 1000445D
                                                                                                • WaitForSingleObject.KERNEL32(?,00001770), ref: 100044AB
                                                                                                • ResetEvent.KERNEL32(?), ref: 100044C8
                                                                                                  • Part of subcall function 10003F60: GetCurrentThreadId.KERNEL32 ref: 10003F65
                                                                                                  • Part of subcall function 10003F60: send.WS2_32(?,10017440,00000010,00000000), ref: 10003FC6
                                                                                                  • Part of subcall function 10003F60: SetEvent.KERNEL32(?), ref: 10003FE9
                                                                                                  • Part of subcall function 10003F60: InterlockedExchange.KERNEL32(?,00000000), ref: 10003FF5
                                                                                                  • Part of subcall function 10003F60: WSACloseEvent.WS2_32(?), ref: 10004003
                                                                                                  • Part of subcall function 10003F60: shutdown.WS2_32(?,00000001), ref: 1000401B
                                                                                                  • Part of subcall function 10003F60: closesocket.WS2_32(?), ref: 10004025
                                                                                                • ResetEvent.KERNEL32(?), ref: 100044DC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Event$Reset$ExchangeInterlocked$CloseCurrentObjectSingleThreadTimeWaitclosesocketsendshutdowntime
                                                                                                • String ID:
                                                                                                • API String ID: 542259498-0
                                                                                                • Opcode ID: f834a32b78aad868db6c3b299e2b280971fbcefdd6bd4d0406109023f8606c47
                                                                                                • Instruction ID: e23a36aee9568f488b14e02ccbdce45cc04d01c91958f2c1d86c028973892dd3
                                                                                                • Opcode Fuzzy Hash: f834a32b78aad868db6c3b299e2b280971fbcefdd6bd4d0406109023f8606c47
                                                                                                • Instruction Fuzzy Hash: 592173B6640704ABD220EF79DC85B97B3E8FF89751F104A1EF58AC7654DA71F8008BA4
                                                                                                APIs
                                                                                                • ResetEvent.KERNEL32(?), ref: 03D34443
                                                                                                • ResetEvent.KERNEL32(?), ref: 03D3444C
                                                                                                • timeGetTime.WINMM ref: 03D3444E
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 03D3445D
                                                                                                • WaitForSingleObject.KERNEL32(?,00001770), ref: 03D344AB
                                                                                                • ResetEvent.KERNEL32(?), ref: 03D344C8
                                                                                                  • Part of subcall function 03D33F60: GetCurrentThreadId.KERNEL32 ref: 03D33F65
                                                                                                  • Part of subcall function 03D33F60: send.WS2_32(?,03D549C0,00000010,00000000), ref: 03D33FC6
                                                                                                  • Part of subcall function 03D33F60: SetEvent.KERNEL32(?), ref: 03D33FE9
                                                                                                  • Part of subcall function 03D33F60: InterlockedExchange.KERNEL32(?,00000000), ref: 03D33FF5
                                                                                                  • Part of subcall function 03D33F60: WSACloseEvent.WS2_32(?), ref: 03D34003
                                                                                                  • Part of subcall function 03D33F60: shutdown.WS2_32(?,00000001), ref: 03D3401B
                                                                                                  • Part of subcall function 03D33F60: closesocket.WS2_32(?), ref: 03D34025
                                                                                                • ResetEvent.KERNEL32(?), ref: 03D344DC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Event$Reset$ExchangeInterlocked$CloseCurrentObjectSingleThreadTimeWaitclosesocketsendshutdowntime
                                                                                                • String ID:
                                                                                                • API String ID: 542259498-0
                                                                                                • Opcode ID: 8f576650fd926aa3a51ffa1ffd47ddd5c969dc6faf22eb28986215ae38d8c855
                                                                                                • Instruction ID: af45a0ead89f587818c5e582e890b952af64c25e25c47597370c09ba88e4ddf4
                                                                                                • Opcode Fuzzy Hash: 8f576650fd926aa3a51ffa1ffd47ddd5c969dc6faf22eb28986215ae38d8c855
                                                                                                • Instruction Fuzzy Hash: 49216F766007046BC230EF79EC84F97B3F8EF89B10F100A1EE58AC7640D675E8048BA0
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000139F,?), ref: 10004E79
                                                                                                • TryEnterCriticalSection.KERNEL32(?,?), ref: 10004E98
                                                                                                • TryEnterCriticalSection.KERNEL32(?), ref: 10004EA2
                                                                                                • SetLastError.KERNEL32(0000139F), ref: 10004EB9
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 10004EC2
                                                                                                • LeaveCriticalSection.KERNEL32(00000002), ref: 10004EC9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterErrorLastLeave
                                                                                                • String ID:
                                                                                                • API String ID: 4082018349-0
                                                                                                • Opcode ID: 6720494b42b4f7a77260b90f8de04f87c6be7c2df52100a175db74c353f41269
                                                                                                • Instruction ID: b6eaa0d5c2d22c0db505b760e803bdb0fa2ef48d94b0f961ed90457994499652
                                                                                                • Opcode Fuzzy Hash: 6720494b42b4f7a77260b90f8de04f87c6be7c2df52100a175db74c353f41269
                                                                                                • Instruction Fuzzy Hash: 36118272700354DBE320DBB9DC85A6BB3ECFB88392B41063EE645C7550DA72E804CBA5
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000139F,?), ref: 03D34E99
                                                                                                • TryEnterCriticalSection.KERNEL32(?,?), ref: 03D34EB8
                                                                                                • TryEnterCriticalSection.KERNEL32(?), ref: 03D34EC2
                                                                                                • SetLastError.KERNEL32(0000139F), ref: 03D34ED9
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 03D34EE2
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 03D34EE9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterErrorLastLeave
                                                                                                • String ID:
                                                                                                • API String ID: 4082018349-0
                                                                                                • Opcode ID: da4beb9b2eeef9ed78656fab5f51ec2ce10fcb4486104aea7504d744f20c990e
                                                                                                • Instruction ID: 0c75b56dfe987932ab5ba5111f5c65ed6417ce351ca11949d0379f1d11685de8
                                                                                                • Opcode Fuzzy Hash: da4beb9b2eeef9ed78656fab5f51ec2ce10fcb4486104aea7504d744f20c990e
                                                                                                • Instruction Fuzzy Hash: 261182377043048BD320EB7AEC8496BF3ECFB89721B08092EE645D2650DA75ED04C7A5
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000007F), ref: 03D3DD32
                                                                                                • SetLastError.KERNEL32(0000007F), ref: 03D3DE35
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast
                                                                                                • String ID: Main
                                                                                                • API String ID: 1452528299-521822810
                                                                                                • Opcode ID: b41e2bbda27694de643c530638d0cbf56e2a3a611c29f5b437ac3253b408932c
                                                                                                • Instruction ID: b1ced09d3fcb90a1d9047356ff7b3f839de356edb1bae2d1262995384a9e3b82
                                                                                                • Opcode Fuzzy Hash: b41e2bbda27694de643c530638d0cbf56e2a3a611c29f5b437ac3253b408932c
                                                                                                • Instruction Fuzzy Hash: 8241D132A00305DFD720DF58EC80B6AB7EAFF95714F0845A9E8459B311E771E945CB90
                                                                                                APIs
                                                                                                • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,CDB86E77,QQ7l,6C37CD1F,QQ7l,?,00000000), ref: 6C37CCD1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeLibrary
                                                                                                • String ID: QQ7l$api-ms-$ext-ms-
                                                                                                • API String ID: 3664257935-1992630856
                                                                                                • Opcode ID: 96871eaa3e5962ebd3e43c469d829b5c98f42bd392e0f993a4a197bba74748c6
                                                                                                • Instruction ID: c7afd4720e9a2ce6247c7e1744fddf826a562662fc6e4fc600f02901632aa372
                                                                                                • Opcode Fuzzy Hash: 96871eaa3e5962ebd3e43c469d829b5c98f42bd392e0f993a4a197bba74748c6
                                                                                                • Instruction Fuzzy Hash: 83212B31A42212A7DB21BF6DAC54A4A377CDF43764F240210E915B7680E736ED02CEF4
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?), ref: 6C36CB70
                                                                                                • __alloca_probe_16.LIBCMT ref: 6C36CB9C
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?,00000000,00000000), ref: 6C36CBDB
                                                                                                • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6C36CBF8
                                                                                                • LCMapStringEx.KERNEL32(?,?,00000000,00000000,?,?,00000000,00000000,00000000), ref: 6C36CC37
                                                                                                • __alloca_probe_16.LIBCMT ref: 6C36CC54
                                                                                                • LCMapStringEx.KERNEL32(?,?,00000000,00000001,00000000,00000000,00000000,00000000,00000000), ref: 6C36CC96
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6C36CCB9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                                                                                • String ID:
                                                                                                • API String ID: 2040435927-0
                                                                                                • Opcode ID: a4ebd9dd1d0fe9e6a05624f4bd14e5bec0ce197c82a90e92bb173d439c037266
                                                                                                • Instruction ID: 0f7b0704b9d3c07239914474303f6ef4f7d00103248a50152440489c1c872bfa
                                                                                                • Opcode Fuzzy Hash: a4ebd9dd1d0fe9e6a05624f4bd14e5bec0ce197c82a90e92bb173d439c037266
                                                                                                • Instruction Fuzzy Hash: AD51B172601206ABEF106F6ADC44FAB3BB8EF4675CF204424F92096998E771D911DF60
                                                                                                APIs
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 10003F65
                                                                                                • SetLastError.KERNEL32(0000139F,?,74DEDFA0,10003648), ref: 10004054
                                                                                                  • Part of subcall function 10002B80: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 10002B96
                                                                                                  • Part of subcall function 10002B80: SwitchToThread.KERNEL32 ref: 10002BAA
                                                                                                • send.WS2_32(?,10017440,00000010,00000000), ref: 10003FC6
                                                                                                • SetEvent.KERNEL32(?), ref: 10003FE9
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 10003FF5
                                                                                                • WSACloseEvent.WS2_32(?), ref: 10004003
                                                                                                • shutdown.WS2_32(?,00000001), ref: 1000401B
                                                                                                • closesocket.WS2_32(?), ref: 10004025
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: EventExchangeInterlockedThread$CloseCompareCurrentErrorLastSwitchclosesocketsendshutdown
                                                                                                • String ID:
                                                                                                • API String ID: 3254528666-0
                                                                                                • Opcode ID: 5b0e511d635cae701d0a261cd8daf94e2af27413da8a227727d1db7110453b86
                                                                                                • Instruction ID: f90f9a9b3ecf0f3d74d2563f24973b51980f03fc9dc1a8ff13de2f0f8c7e6f1d
                                                                                                • Opcode Fuzzy Hash: 5b0e511d635cae701d0a261cd8daf94e2af27413da8a227727d1db7110453b86
                                                                                                • Instruction Fuzzy Hash: 822148B56007109BE321DF64C888B9BB7F9FB44791F04891DF6869B690CBB6F845CB50
                                                                                                APIs
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 03D33F65
                                                                                                • SetLastError.KERNEL32(0000139F,?,74DEDFA0,03D33648), ref: 03D34054
                                                                                                  • Part of subcall function 03D32BC0: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 03D32BD6
                                                                                                  • Part of subcall function 03D32BC0: SwitchToThread.KERNEL32 ref: 03D32BEA
                                                                                                • send.WS2_32(?,03D549C0,00000010,00000000), ref: 03D33FC6
                                                                                                • SetEvent.KERNEL32(?), ref: 03D33FE9
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 03D33FF5
                                                                                                • WSACloseEvent.WS2_32(?), ref: 03D34003
                                                                                                • shutdown.WS2_32(?,00000001), ref: 03D3401B
                                                                                                • closesocket.WS2_32(?), ref: 03D34025
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: EventExchangeInterlockedThread$CloseCompareCurrentErrorLastSwitchclosesocketsendshutdown
                                                                                                • String ID:
                                                                                                • API String ID: 3254528666-0
                                                                                                • Opcode ID: 9316b744e5126566d261bce32b77920cd36bde3ba887374889d86d45eccbf8e1
                                                                                                • Instruction ID: 05a0bc365f42b1075c9c8ff7fcde2100dd01725ea9bffcbd54c04d8786e4f74f
                                                                                                • Opcode Fuzzy Hash: 9316b744e5126566d261bce32b77920cd36bde3ba887374889d86d45eccbf8e1
                                                                                                • Instruction Fuzzy Hash: BE2117762007009BD330EB69D988B9BB7B9FB45B11F580D1CE69287784C7B9E849CB50
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(?,?,00000000,10004039,?,74DEDFA0,10003648), ref: 10004074
                                                                                                • ResetEvent.KERNEL32(?,?,00000000,10004039,?,74DEDFA0,10003648), ref: 10004087
                                                                                                • ResetEvent.KERNEL32(?,?,00000000,10004039,?,74DEDFA0,10003648), ref: 10004090
                                                                                                • ResetEvent.KERNEL32(?,?,00000000,10004039,?,74DEDFA0,10003648), ref: 10004099
                                                                                                  • Part of subcall function 10001350: HeapFree.KERNEL32(?,00000000,?,?,?,100040A6,?,00000000,10004039,?,74DEDFA0,10003648), ref: 10001390
                                                                                                  • Part of subcall function 10001420: HeapFree.KERNEL32(?,00000000,?,?,?,100040B1,?,00000000,10004039,?,74DEDFA0,10003648), ref: 1000143D
                                                                                                  • Part of subcall function 10001420: _free.LIBCMT ref: 10001459
                                                                                                • HeapDestroy.KERNEL32(?,?,00000000,10004039,?,74DEDFA0,10003648), ref: 100040B9
                                                                                                • HeapCreate.KERNEL32(?,?,?,?,00000000,10004039,?,74DEDFA0,10003648), ref: 100040D4
                                                                                                • SetEvent.KERNEL32(?,?,00000000,10004039,?,74DEDFA0,10003648), ref: 10004150
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,00000000,10004039,?,74DEDFA0,10003648), ref: 10004157
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: EventHeap$Reset$CriticalFreeSection$CreateDestroyEnterLeave_free
                                                                                                • String ID:
                                                                                                • API String ID: 1219087420-0
                                                                                                • Opcode ID: a47338e344b9415d0666abf4aacaa3da54f4cea86e3874ea6b078b9e747c069c
                                                                                                • Instruction ID: 23a0d0040592214b09f8a584f6cc232509badf453808b3f4ba03db8ba96dcbd9
                                                                                                • Opcode Fuzzy Hash: a47338e344b9415d0666abf4aacaa3da54f4cea86e3874ea6b078b9e747c069c
                                                                                                • Instruction Fuzzy Hash: 043143B0200A02EFE705CB64C898B96F7A8FF48351F058249E4298B264CB35F951CFD0
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(?,?,00000000,03D34039,?,74DEDFA0,03D33648), ref: 03D34074
                                                                                                • ResetEvent.KERNEL32(?,?,00000000,03D34039,?,74DEDFA0,03D33648), ref: 03D34087
                                                                                                • ResetEvent.KERNEL32(?,?,00000000,03D34039,?,74DEDFA0,03D33648), ref: 03D34090
                                                                                                • ResetEvent.KERNEL32(?,?,00000000,03D34039,?,74DEDFA0,03D33648), ref: 03D34099
                                                                                                  • Part of subcall function 03D31350: HeapFree.KERNEL32(?,00000000,?,?,?,03D340A6,?,00000000,03D34039,?,74DEDFA0,03D33648), ref: 03D31390
                                                                                                  • Part of subcall function 03D31420: HeapFree.KERNEL32(?,00000000,?,?,?,03D340B1,?,00000000,03D34039,?,74DEDFA0,03D33648), ref: 03D3143D
                                                                                                  • Part of subcall function 03D31420: _free.LIBCMT ref: 03D31459
                                                                                                • HeapDestroy.KERNEL32(?,?,00000000,03D34039,?,74DEDFA0,03D33648), ref: 03D340B9
                                                                                                • HeapCreate.KERNEL32(?,?,?,?,00000000,03D34039,?,74DEDFA0,03D33648), ref: 03D340D4
                                                                                                • SetEvent.KERNEL32(?,?,00000000,03D34039,?,74DEDFA0,03D33648), ref: 03D34150
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,00000000,03D34039,?,74DEDFA0,03D33648), ref: 03D34157
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: EventHeap$Reset$CriticalFreeSection$CreateDestroyEnterLeave_free
                                                                                                • String ID:
                                                                                                • API String ID: 1219087420-0
                                                                                                • Opcode ID: e186b95648283b8c64be2590f00c4de8ee43b4de958b1dcc63f6f5abb6a14502
                                                                                                • Instruction ID: 5d8473fb2c3150fb1febab2716113eb4fbf3745152320ce76ab88c387dfcd27b
                                                                                                • Opcode Fuzzy Hash: e186b95648283b8c64be2590f00c4de8ee43b4de958b1dcc63f6f5abb6a14502
                                                                                                • Instruction Fuzzy Hash: 62314775200A06AFD705EF79D898B96F7B8FF49310F048649E4298B250CB39B919CFE0
                                                                                                APIs
                                                                                                • _set_app_type.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000002), ref: 00E0101E
                                                                                                • _set_fmode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000002), ref: 00E01029
                                                                                                • __p__commode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000002), ref: 00E01035
                                                                                                • __RTC_Initialize.LIBCMT ref: 00E0104D
                                                                                                • _configure_narrow_argv.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00E017FA), ref: 00E01062
                                                                                                  • Part of subcall function 00E0155C: InitializeSListHead.KERNEL32(00E030C0,00E01072), ref: 00E01561
                                                                                                • __setusermatherr.API-MS-WIN-CRT-MATH-L1-1-0(Function_0000154F), ref: 00E01080
                                                                                                • _configthreadlocale.API-MS-WIN-CRT-LOCALE-L1-1-0(00000000), ref: 00E0109B
                                                                                                • _initialize_narrow_environment.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E010AA
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3556290818.0000000000E01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00E00000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3556263696.0000000000E00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556319323.0000000000E02000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556351733.0000000000E03000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556384480.0000000000E04000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556384480.0000000000E46000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_e00000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Initialize$HeadList__p__commode__setusermatherr_configthreadlocale_configure_narrow_argv_initialize_narrow_environment_set_app_type_set_fmode
                                                                                                • String ID:
                                                                                                • API String ID: 1933938900-0
                                                                                                • Opcode ID: c817ba2512be2031d322d9c2297e7c2dbb61fa4f9f8897e9c827081e75bb5268
                                                                                                • Instruction ID: 44a8a1d9d8b7da258a08b01050d921d49fe4c84aa06eba29950b985451e2cc9c
                                                                                                • Opcode Fuzzy Hash: c817ba2512be2031d322d9c2297e7c2dbb61fa4f9f8897e9c827081e75bb5268
                                                                                                • Instruction Fuzzy Hash: C401CD80A4038251E92433F91C43AAE12CA4FC17A8F0439CAF882BF0C3EE65C4C044B3
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strrchr
                                                                                                • String ID:
                                                                                                • API String ID: 3213747228-0
                                                                                                • Opcode ID: a85807fc997ee618783a6036bf783e221dda6a75a837a72a657676350f801317
                                                                                                • Instruction ID: 4d0160e44ae8592100970800607038e176037fd695272873800febd88f7660d8
                                                                                                • Opcode Fuzzy Hash: a85807fc997ee618783a6036bf783e221dda6a75a837a72a657676350f801317
                                                                                                • Instruction Fuzzy Hash: 36B13232A053569FEB218E68CC81BEEBBA5EF06318F144555E840AFB81D3799901CFF5
                                                                                                APIs
                                                                                                  • Part of subcall function 10001610: __vswprintf.LIBCMT ref: 10001646
                                                                                                • _malloc.LIBCMT ref: 10002330
                                                                                                  • Part of subcall function 10006E83: __FF_MSGBANNER.LIBCMT ref: 10006E9C
                                                                                                  • Part of subcall function 10006E83: __NMSG_WRITE.LIBCMT ref: 10006EA3
                                                                                                  • Part of subcall function 10006E83: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F), ref: 10006EC8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap__vswprintf_malloc
                                                                                                • String ID: [RI] %d bytes$input ack: sn=%lu rtt=%ld rto=%ld$input probe$input psh: sn=%lu ts=%lu$input wins: %lu
                                                                                                • API String ID: 3723585974-868042568
                                                                                                • Opcode ID: 5cf1fff9a3ed07831e4285ee8707500ca474442d0b2f18c7a61f986e26f0da37
                                                                                                • Instruction ID: eab6198d38b35a21c7eee27abceaedf30942dd101684ecb5fd47972168577aa1
                                                                                                • Opcode Fuzzy Hash: 5cf1fff9a3ed07831e4285ee8707500ca474442d0b2f18c7a61f986e26f0da37
                                                                                                • Instruction Fuzzy Hash: A4B19075A002059BEB08CF68D8806AE7BE5FF44390F1546AEED499B34ADB31ED45CB90
                                                                                                APIs
                                                                                                  • Part of subcall function 03D31610: __vswprintf.LIBCMT ref: 03D31646
                                                                                                • _malloc.LIBCMT ref: 03D32330
                                                                                                  • Part of subcall function 03D3F673: __FF_MSGBANNER.LIBCMT ref: 03D3F68C
                                                                                                  • Part of subcall function 03D3F673: __NMSG_WRITE.LIBCMT ref: 03D3F693
                                                                                                  • Part of subcall function 03D3F673: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,03D44500,00000000,00000001,00000000,?,03D48DE6,00000018,03D56448,0000000C,03D48E76), ref: 03D3F6B8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap__vswprintf_malloc
                                                                                                • String ID: [RI] %d bytes$input ack: sn=%lu rtt=%ld rto=%ld$input probe$input psh: sn=%lu ts=%lu$input wins: %lu
                                                                                                • API String ID: 3723585974-868042568
                                                                                                • Opcode ID: ec4a52f397e58f0a59b0f700799ebfa69e5fd8756d0dbb54a274c236a73da952
                                                                                                • Instruction ID: 479d27a9f3cb7390d1f16c98c2831c826b3a79c792b4bd6e702f85d93f38d0e4
                                                                                                • Opcode Fuzzy Hash: ec4a52f397e58f0a59b0f700799ebfa69e5fd8756d0dbb54a274c236a73da952
                                                                                                • Instruction Fuzzy Hash: 18B1CF75E002098BCF18DF68C8806AAB7A5FF86710F084ABEDD599B346D731DD44CBA1
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 10001878
                                                                                                • _free.LIBCMT ref: 100018B6
                                                                                                • _free.LIBCMT ref: 100018F5
                                                                                                • _free.LIBCMT ref: 10001935
                                                                                                • _free.LIBCMT ref: 1000195D
                                                                                                • _free.LIBCMT ref: 10001981
                                                                                                • _free.LIBCMT ref: 100019B9
                                                                                                  • Part of subcall function 10006E49: HeapFree.KERNEL32(00000000,00000000,?,10009900,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F), ref: 10006E5F
                                                                                                  • Part of subcall function 10006E49: GetLastError.KERNEL32(00000000,?,10009900,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000), ref: 10006E71
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 6beac5a88b0ea45cad91d564d56e12dc9c07d13e28084cda825bb388b8fc93ec
                                                                                                • Instruction ID: a8bd5bf31f2101c09de15a5e31c6c05fc03f2a154fed00425f0cdbd26510a762
                                                                                                • Opcode Fuzzy Hash: 6beac5a88b0ea45cad91d564d56e12dc9c07d13e28084cda825bb388b8fc93ec
                                                                                                • Instruction Fuzzy Hash: 9C511C76A00211CFE704DF58C5D4899BBE6FF89294726C0ADD5096B326CB32BD42CB91
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 03D31878
                                                                                                • _free.LIBCMT ref: 03D318B6
                                                                                                • _free.LIBCMT ref: 03D318F5
                                                                                                • _free.LIBCMT ref: 03D31935
                                                                                                • _free.LIBCMT ref: 03D3195D
                                                                                                • _free.LIBCMT ref: 03D31981
                                                                                                • _free.LIBCMT ref: 03D319B9
                                                                                                  • Part of subcall function 03D3F639: RtlFreeHeap.NTDLL(00000000,00000000,?,03D43E4C,00000000,?,03D44500,00000000,00000001,00000000,?,03D48DE6,00000018,03D56448,0000000C,03D48E76), ref: 03D3F64F
                                                                                                  • Part of subcall function 03D3F639: GetLastError.KERNEL32(00000000,?,03D43E4C,00000000,?,03D44500,00000000,00000001,00000000,?,03D48DE6,00000018,03D56448,0000000C,03D48E76,00000000), ref: 03D3F661
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 2e23a68f7bcd1745e2d823a19940f1c625a7792bf46a9cc7ee6174a435443fee
                                                                                                • Instruction ID: 63fcbcc990d9a7b0f8178b58398509c0deb9dc3f8f30a2a6d94a628eacdd3d9b
                                                                                                • Opcode Fuzzy Hash: 2e23a68f7bcd1745e2d823a19940f1c625a7792bf46a9cc7ee6174a435443fee
                                                                                                • Instruction Fuzzy Hash: 88515FB6A00216DFC704EF58C584965BBA6FF8A21471980ADC52A5F321C732BD42CFA1
                                                                                                APIs
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 03D33883
                                                                                                • SetWaitableTimer.KERNEL32(?,?,?,00000000,00000000,00000000,?,00000000,FFFFD8F0,000000FF), ref: 03D338C4
                                                                                                • WSAWaitForMultipleEvents.WS2_32(00000004,?,00000000,000000FF,00000000), ref: 03D33931
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 03D3395C
                                                                                                • GetLastError.KERNEL32(?,00000000,000000FF,00000000), ref: 03D339F4
                                                                                                • SetLastError.KERNEL32(0000139F,?,00000000,000000FF,00000000), ref: 03D33A22
                                                                                                • WSAGetLastError.WS2_32(?,00000000,000000FF,00000000), ref: 03D33A39
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$CurrentThread$EventsMultipleTimerWaitWaitable
                                                                                                • String ID:
                                                                                                • API String ID: 3058130114-0
                                                                                                • Opcode ID: 3d47395a5f646ca1d56249c6efab2d19dbf3fd28ee1072236fba5a555dd81c06
                                                                                                • Instruction ID: f68c9963b516f2619ca97fabdac43c8b9d6d1e83bba47a58e3f110faffbef1b3
                                                                                                • Opcode Fuzzy Hash: 3d47395a5f646ca1d56249c6efab2d19dbf3fd28ee1072236fba5a555dd81c06
                                                                                                • Instruction Fuzzy Hash: EC5192B9604701DBDB20DF24CA84BAAB7E8FF06B14F144929E956DB380DB34ED44CB61
                                                                                                APIs
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 6C36DA47
                                                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 6C36DA4F
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 6C36DAD8
                                                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 6C36DB03
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 6C36DB58
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                • String ID: csm
                                                                                                • API String ID: 1170836740-1018135373
                                                                                                • Opcode ID: 0821064b77a1ea6eb35bf266c76f0abc52ca6632d82196fc1c04c8617eeb712c
                                                                                                • Instruction ID: b1c61ba608e0a948ca1293ea37359f7b1c0d4070a3eba997a66969be6ffff92f
                                                                                                • Opcode Fuzzy Hash: 0821064b77a1ea6eb35bf266c76f0abc52ca6632d82196fc1c04c8617eeb712c
                                                                                                • Instruction Fuzzy Hash: BE41E330A042089BCF00CF2AC880ADE7BB5EF45328F248155E8549BF99E736EA05CFD5
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,?,?,03D3E815,?,?,?,?,74DF23A0,00000000), ref: 03D3E6BD
                                                                                                • CreateFileW.KERNEL32(03D60D80,40000000,00000002,00000000,00000004,00000002,00000000,?,?,03D3E815,?,?,?,?,74DF23A0,00000000), ref: 03D3E6D7
                                                                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 03D3E6F2
                                                                                                • lstrlenW.KERNEL32(?,00000000,00000000), ref: 03D3E6FF
                                                                                                • WriteFile.KERNEL32(00000000,?,00000000), ref: 03D3E70A
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 03D3E711
                                                                                                • ReleaseMutex.KERNEL32(00000000), ref: 03D3E71E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateHandleMutexObjectPointerReleaseSingleWaitWritelstrlen
                                                                                                • String ID:
                                                                                                • API String ID: 4202892810-0
                                                                                                • Opcode ID: 38ec2e4a1c7893306da59d1ea2fccd080e32138e08b49e4d6063a403d7f3fa4a
                                                                                                • Instruction ID: e7e39673814a749e2b01d868033f15822fad3c2f43aab53f0d9c0881a684725d
                                                                                                • Opcode Fuzzy Hash: 38ec2e4a1c7893306da59d1ea2fccd080e32138e08b49e4d6063a403d7f3fa4a
                                                                                                • Instruction Fuzzy Hash: 30014477241314BBE224BBA4AC4FF5A366CEB09B25F504604F725A62C4D7B0A9188775
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,10017C00,00000008,100098EA,00000000,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C), ref: 100097F3
                                                                                                • __lock.LIBCMT ref: 10009827
                                                                                                  • Part of subcall function 1000C144: __mtinitlocknum.LIBCMT ref: 1000C15A
                                                                                                  • Part of subcall function 1000C144: __amsg_exit.LIBCMT ref: 1000C166
                                                                                                  • Part of subcall function 1000C144: EnterCriticalSection.KERNEL32(00000000,00000000,?,100099BA,0000000D,10017C28,00000008,10009AB1,00000000,?,10007711,00000000,10017B60,00000008,10007776,?), ref: 1000C16E
                                                                                                • InterlockedIncrement.KERNEL32(?), ref: 10009834
                                                                                                • __lock.LIBCMT ref: 10009848
                                                                                                • ___addlocaleref.LIBCMT ref: 10009866
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                                                                                • String ID: KERNEL32.DLL
                                                                                                • API String ID: 637971194-2576044830
                                                                                                • Opcode ID: 2fd8a646381f8c1273ec5aa8b514110e131a74dbccaeb09b5e4df53804c3848b
                                                                                                • Instruction ID: 89763b3cff33ace5d26e8772c174daa1abf762224351bfae7625883661725aa5
                                                                                                • Opcode Fuzzy Hash: 2fd8a646381f8c1273ec5aa8b514110e131a74dbccaeb09b5e4df53804c3848b
                                                                                                • Instruction Fuzzy Hash: 1A016D75804B00DFE320DF69C84574ABBE0EF41361F14890EE49A9B3A5CBB4F680CB55
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,03D56318,00000008,03D43E36,00000000,00000000,?,03D44500,00000000,00000001,00000000,?,03D48DE6,00000018,03D56448,0000000C), ref: 03D43D3F
                                                                                                • __lock.LIBCMT ref: 03D43D73
                                                                                                  • Part of subcall function 03D48E5B: __mtinitlocknum.LIBCMT ref: 03D48E71
                                                                                                  • Part of subcall function 03D48E5B: __amsg_exit.LIBCMT ref: 03D48E7D
                                                                                                  • Part of subcall function 03D48E5B: EnterCriticalSection.KERNEL32(00000000,00000000,?,03D43F06,0000000D,03D56340,00000008,03D43FFF,00000000,?,03D410F0,00000000,03D56278,00000008,03D41155,?), ref: 03D48E85
                                                                                                • InterlockedIncrement.KERNEL32(?), ref: 03D43D80
                                                                                                • __lock.LIBCMT ref: 03D43D94
                                                                                                • ___addlocaleref.LIBCMT ref: 03D43DB2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                                                                                • String ID: KERNEL32.DLL
                                                                                                • API String ID: 637971194-2576044830
                                                                                                • Opcode ID: b83666d61351a78063ffbf0b735e1661c920fc161d660abcdadab12be95db207
                                                                                                • Instruction ID: 1b30f71c35bbf6a70b353ffe1822bd99070f874dd5176d8e0b1e434f57118f98
                                                                                                • Opcode Fuzzy Hash: b83666d61351a78063ffbf0b735e1661c920fc161d660abcdadab12be95db207
                                                                                                • Instruction Fuzzy Hash: 9B016D7A841700EFDB20EFB9D804749BBF0EF50714F10890EE49A5B790CBB5A644CB25
                                                                                                APIs
                                                                                                • RegOpenKeyExW.ADVAPI32(80000001,Console,00000000,00000002), ref: 03D3B7A7
                                                                                                • RegDeleteValueW.ADVAPI32(?,IpDatespecial), ref: 03D3B7B7
                                                                                                • RegSetValueExW.ADVAPI32(?,IpDatespecial,00000000,00000003,?,00000004), ref: 03D3B7CE
                                                                                                • RegCloseKey.ADVAPI32(?,?,00000004), ref: 03D3B7D9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Value$CloseDeleteOpen
                                                                                                • String ID: Console$IpDatespecial
                                                                                                • API String ID: 3183427449-1840232981
                                                                                                • Opcode ID: e89b583ce4bc1d638e0694ecd39e582684b1796f8f7b00349f7ebf9bba6e73a0
                                                                                                • Instruction ID: 8c1e60f1b4259689a7788d439fe77e9e01b779d8b9eef6386735ed86cfbf7b19
                                                                                                • Opcode Fuzzy Hash: e89b583ce4bc1d638e0694ecd39e582684b1796f8f7b00349f7ebf9bba6e73a0
                                                                                                • Instruction Fuzzy Hash: F0F02033341340FFE325A774AC0FF1ABB64FB89B01F404E0DFB816628086A0B118C626
                                                                                                APIs
                                                                                                • __getptd.LIBCMT ref: 10013412
                                                                                                  • Part of subcall function 1000990F: __getptd_noexit.LIBCMT ref: 10009912
                                                                                                  • Part of subcall function 1000990F: __amsg_exit.LIBCMT ref: 1000991F
                                                                                                • __getptd.LIBCMT ref: 10013423
                                                                                                • __getptd.LIBCMT ref: 10013431
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                                                • String ID: MOC$RCC$csm
                                                                                                • API String ID: 803148776-2671469338
                                                                                                • Opcode ID: 6cafc6eb67b1167ca934f12c74b901a19b36c58c2209ef507fb1707306695bdb
                                                                                                • Instruction ID: 786e14bf1501c0e18a8257e8a75f03574bdb54e2dd84c562cebc2d2ff3df38bd
                                                                                                • Opcode Fuzzy Hash: 6cafc6eb67b1167ca934f12c74b901a19b36c58c2209ef507fb1707306695bdb
                                                                                                • Instruction Fuzzy Hash: 86E01A345042488FE720DB68C04AB5933E4FBC8294F5680A5F41ECF226C738FD908942
                                                                                                APIs
                                                                                                • __getptd.LIBCMT ref: 03D5031D
                                                                                                  • Part of subcall function 03D43E5B: __getptd_noexit.LIBCMT ref: 03D43E5E
                                                                                                  • Part of subcall function 03D43E5B: __amsg_exit.LIBCMT ref: 03D43E6B
                                                                                                • __getptd.LIBCMT ref: 03D5032E
                                                                                                • __getptd.LIBCMT ref: 03D5033C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                                                • String ID: MOC$RCC$csm
                                                                                                • API String ID: 803148776-2671469338
                                                                                                • Opcode ID: a1f0d33c8d38bd48e94782b4de51ff7935ea793739f44933f6f473294c896614
                                                                                                • Instruction ID: 123c9f91ccdd09cec7e4b25882894846f5db5e90c3d3d864446cd1a4d4213c4f
                                                                                                • Opcode Fuzzy Hash: a1f0d33c8d38bd48e94782b4de51ff7935ea793739f44933f6f473294c896614
                                                                                                • Instruction Fuzzy Hash: 68E09239914305CFDB20DBACC14AB6836D9FB54B15F5945B1E80CCF221D738D5949552
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(?,?,?,?,?,D9F8D1C9,?,?,10014228,000000FF), ref: 100050AA
                                                                                                • WSASetLastError.WS2_32(0000139F,?,?,?,?,D9F8D1C9,?,?,10014228,000000FF), ref: 100050C2
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 100050CC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterErrorLastLeave
                                                                                                • String ID:
                                                                                                • API String ID: 4082018349-0
                                                                                                • Opcode ID: e00a6cd020c07df668690f03d4002b5b8c2a1b96598de1bbe6df2cd43adfd620
                                                                                                • Instruction ID: 94e9e828bd4e4f39969e9d0b2c4f8dfc3b4d38cc2041e0ad1404f002baf5890c
                                                                                                • Opcode Fuzzy Hash: e00a6cd020c07df668690f03d4002b5b8c2a1b96598de1bbe6df2cd43adfd620
                                                                                                • Instruction Fuzzy Hash: DE316D76A04644EBE711CF95DD86BABB3E8FB48752F008A1AF906C7645D776E800CB90
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(000002FF), ref: 03D350CA
                                                                                                • WSASetLastError.WS2_32(0000139F), ref: 03D350E2
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,?,00000000,?,?,00000000,000000FF), ref: 03D350EC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterErrorLastLeave
                                                                                                • String ID:
                                                                                                • API String ID: 4082018349-0
                                                                                                • Opcode ID: 5a7c684cb64d51328d7b44ccf100a904fbe0a7d1240ba5de0a2e324aee13c1e4
                                                                                                • Instruction ID: b0c20f6a98876eefc4df5f8948b9cc40cc9a08a723f1c2c39ffe17b247e04522
                                                                                                • Opcode Fuzzy Hash: 5a7c684cb64d51328d7b44ccf100a904fbe0a7d1240ba5de0a2e324aee13c1e4
                                                                                                • Instruction Fuzzy Hash: CB31EF76A04708ABD710DF94E885B6AB3E9FB4AB10F00495EFC16C7780E736E904CB60
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,E484B528,?,?,?), ref: 100048E1
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,E484B528,?,?,?), ref: 100048EC
                                                                                                • Sleep.KERNEL32(00000258,?,E484B528,?,?,?), ref: 100048F9
                                                                                                • CloseHandle.KERNEL32(?,?,E484B528,?,?,?), ref: 10004914
                                                                                                • CloseHandle.KERNEL32(?,?,E484B528,?,?,?), ref: 1000491D
                                                                                                • Sleep.KERNEL32(0000012C,?,E484B528,?,?,?), ref: 1000492E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseHandleObjectSingleSleepWait
                                                                                                • String ID:
                                                                                                • API String ID: 640476663-0
                                                                                                • Opcode ID: f4c70dc776f0c36d6c3e242216426f5c740d9caf6da259f6a897f5b04df83c22
                                                                                                • Instruction ID: db8a483aedded49ec56de4fe6a38a5b8db7edc3383aabb911f028b40afcbc516
                                                                                                • Opcode Fuzzy Hash: f4c70dc776f0c36d6c3e242216426f5c740d9caf6da259f6a897f5b04df83c22
                                                                                                • Instruction Fuzzy Hash: E6216AB61046548FD750EBA8CC8498BF3F9FF893507198B08E5948B395CA34DC05CBA4
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(?,?,6C3793A7,6C379BB5,?,?,?,?,6C36D5F2,?,?,?,?,?,00000000,00000000), ref: 6C3793BE
                                                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6C3793CC
                                                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6C3793E5
                                                                                                • SetLastError.KERNEL32(00000000,?,?,6C36D5F2,?,?,?,?,?,00000000,00000000,00000000,?,?,?), ref: 6C379437
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLastValue___vcrt_
                                                                                                • String ID:
                                                                                                • API String ID: 3852720340-0
                                                                                                • Opcode ID: e3534f811fe96eb06e5d5a971e7c2a4058f0534f2c395f430d86065eb08d584b
                                                                                                • Instruction ID: 1e819512c9387c1122ff4a0f96b39336ef947355f18b6998f5fb0034cb62e176
                                                                                                • Opcode Fuzzy Hash: e3534f811fe96eb06e5d5a971e7c2a4058f0534f2c395f430d86065eb08d584b
                                                                                                • Instruction Fuzzy Hash: 1101B53231E7269FAA741E795C859972BACEB0667C720032AE5204AAD0FF1788158D79
                                                                                                APIs
                                                                                                • type_info::operator==.LIBVCRUNTIME ref: 6C379DC2
                                                                                                • CallUnexpected.LIBVCRUNTIME ref: 6C37A03B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CallUnexpectedtype_info::operator==
                                                                                                • String ID: csm$csm$csm
                                                                                                • API String ID: 2673424686-393685449
                                                                                                • Opcode ID: 8ad8d88741687de559914d19a923e820d28b13e784c9eef518a0b63f81827a64
                                                                                                • Instruction ID: 071f288406d566cb97640d8bcbb0e3ee5da9a81698cf1ca02e0b47805196fdcd
                                                                                                • Opcode Fuzzy Hash: 8ad8d88741687de559914d19a923e820d28b13e784c9eef518a0b63f81827a64
                                                                                                • Instruction Fuzzy Hash: 45B17A31800309EFCF24CFA5C980ADEB7B5FF04319B14425AE8556BA15D33ADA55CFAA
                                                                                                APIs
                                                                                                • __CreateFrameInfo.LIBCMT ref: 100136CB
                                                                                                  • Part of subcall function 1001325B: __getptd.LIBCMT ref: 10013269
                                                                                                  • Part of subcall function 1001325B: __getptd.LIBCMT ref: 10013277
                                                                                                • __getptd.LIBCMT ref: 100136D5
                                                                                                  • Part of subcall function 1000990F: __getptd_noexit.LIBCMT ref: 10009912
                                                                                                  • Part of subcall function 1000990F: __amsg_exit.LIBCMT ref: 1000991F
                                                                                                • __getptd.LIBCMT ref: 100136E3
                                                                                                • __getptd.LIBCMT ref: 100136F1
                                                                                                • __getptd.LIBCMT ref: 100136FC
                                                                                                • _CallCatchBlock2.LIBCMT ref: 10013722
                                                                                                  • Part of subcall function 10013300: __CallSettingFrame@12.LIBCMT ref: 1001334C
                                                                                                  • Part of subcall function 100137C9: __getptd.LIBCMT ref: 100137D8
                                                                                                  • Part of subcall function 100137C9: __getptd.LIBCMT ref: 100137E6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                                                                                • String ID:
                                                                                                • API String ID: 1602911419-0
                                                                                                • Opcode ID: 9bbf850cd10a9d142d7ef01923f7ba9f09fdf63f4c6847773a26cfd91f606182
                                                                                                • Instruction ID: 22efbb8b190092b33748bf873c8b025e1b03d977775ae1c5574abea826c94994
                                                                                                • Opcode Fuzzy Hash: 9bbf850cd10a9d142d7ef01923f7ba9f09fdf63f4c6847773a26cfd91f606182
                                                                                                • Instruction Fuzzy Hash: 06112BB5C04209DFDF10DFA4D445AEEBBB1FF48310F10806AF864AB251DB38AA559F50
                                                                                                APIs
                                                                                                • __CreateFrameInfo.LIBCMT ref: 03D505D6
                                                                                                  • Part of subcall function 03D500B7: __getptd.LIBCMT ref: 03D500C5
                                                                                                  • Part of subcall function 03D500B7: __getptd.LIBCMT ref: 03D500D3
                                                                                                • __getptd.LIBCMT ref: 03D505E0
                                                                                                  • Part of subcall function 03D43E5B: __getptd_noexit.LIBCMT ref: 03D43E5E
                                                                                                  • Part of subcall function 03D43E5B: __amsg_exit.LIBCMT ref: 03D43E6B
                                                                                                • __getptd.LIBCMT ref: 03D505EE
                                                                                                • __getptd.LIBCMT ref: 03D505FC
                                                                                                • __getptd.LIBCMT ref: 03D50607
                                                                                                • _CallCatchBlock2.LIBCMT ref: 03D5062D
                                                                                                  • Part of subcall function 03D5015C: __CallSettingFrame@12.LIBCMT ref: 03D501A8
                                                                                                  • Part of subcall function 03D506D4: __getptd.LIBCMT ref: 03D506E3
                                                                                                  • Part of subcall function 03D506D4: __getptd.LIBCMT ref: 03D506F1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                                                                                • String ID:
                                                                                                • API String ID: 1602911419-0
                                                                                                • Opcode ID: 6eea26d243c4843de531fb239ff070473d7571be2fd683889e0d9753e6040131
                                                                                                • Instruction ID: 53ecb9e8200e5a5b6aa1ecf17c7e393eebf60f5246de5cf90cc094a7dd048f60
                                                                                                • Opcode Fuzzy Hash: 6eea26d243c4843de531fb239ff070473d7571be2fd683889e0d9753e6040131
                                                                                                • Instruction Fuzzy Hash: E711D4B9D01309DFDF10EFA4D484BADBBB0FF08314F108169E829AB250DB389A559F60
                                                                                                APIs
                                                                                                • __getptd.LIBCMT ref: 1000D9CA
                                                                                                  • Part of subcall function 1000990F: __getptd_noexit.LIBCMT ref: 10009912
                                                                                                  • Part of subcall function 1000990F: __amsg_exit.LIBCMT ref: 1000991F
                                                                                                • __amsg_exit.LIBCMT ref: 1000D9EA
                                                                                                • __lock.LIBCMT ref: 1000D9FA
                                                                                                • InterlockedDecrement.KERNEL32(?), ref: 1000DA17
                                                                                                • _free.LIBCMT ref: 1000DA2A
                                                                                                • InterlockedIncrement.KERNEL32(03662830), ref: 1000DA42
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                                                                                • String ID:
                                                                                                • API String ID: 3470314060-0
                                                                                                • Opcode ID: 4e920ccd90d0088b349a7666ce33f112c59c5ff822d0f6e49aec8d69fe8d2c9d
                                                                                                • Instruction ID: a4a3804e7546e288cb55bc9b4da126fdc171610eea7e5ea66b0b3240b360b7e5
                                                                                                • Opcode Fuzzy Hash: 4e920ccd90d0088b349a7666ce33f112c59c5ff822d0f6e49aec8d69fe8d2c9d
                                                                                                • Instruction Fuzzy Hash: E2019235A057219BF701EF64988579EB3A1FF057D0F018116F851AB289CB34BA81CBE6
                                                                                                APIs
                                                                                                • __getptd.LIBCMT ref: 03D44891
                                                                                                  • Part of subcall function 03D43E5B: __getptd_noexit.LIBCMT ref: 03D43E5E
                                                                                                  • Part of subcall function 03D43E5B: __amsg_exit.LIBCMT ref: 03D43E6B
                                                                                                • __amsg_exit.LIBCMT ref: 03D448B1
                                                                                                • __lock.LIBCMT ref: 03D448C1
                                                                                                • InterlockedDecrement.KERNEL32(?), ref: 03D448DE
                                                                                                • _free.LIBCMT ref: 03D448F1
                                                                                                • InterlockedIncrement.KERNEL32(03E52830), ref: 03D44909
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                                                                                • String ID:
                                                                                                • API String ID: 3470314060-0
                                                                                                • Opcode ID: cab84db88aeed5900917773dd30bb9a5d1bae3e81e5a1b30933174e64d5cfad4
                                                                                                • Instruction ID: daa1e953a9caf86590ddf9d16c75cc91cc68d2f367a4f58047118103b690ac55
                                                                                                • Opcode Fuzzy Hash: cab84db88aeed5900917773dd30bb9a5d1bae3e81e5a1b30933174e64d5cfad4
                                                                                                • Instruction Fuzzy Hash: FA016D36D02751EBDB20EB6A940875DB7B0FF04B20F084115E814AB284CB3499C5CBE2
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,E484B528,?,?,?), ref: 100048E1
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,E484B528,?,?,?), ref: 100048EC
                                                                                                • Sleep.KERNEL32(00000258,?,E484B528,?,?,?), ref: 100048F9
                                                                                                • CloseHandle.KERNEL32(?,?,E484B528,?,?,?), ref: 10004914
                                                                                                • CloseHandle.KERNEL32(?,?,E484B528,?,?,?), ref: 1000491D
                                                                                                • Sleep.KERNEL32(0000012C,?,E484B528,?,?,?), ref: 1000492E
                                                                                                  • Part of subcall function 10003F60: GetCurrentThreadId.KERNEL32 ref: 10003F65
                                                                                                  • Part of subcall function 10003F60: send.WS2_32(?,10017440,00000010,00000000), ref: 10003FC6
                                                                                                  • Part of subcall function 10003F60: SetEvent.KERNEL32(?), ref: 10003FE9
                                                                                                  • Part of subcall function 10003F60: InterlockedExchange.KERNEL32(?,00000000), ref: 10003FF5
                                                                                                  • Part of subcall function 10003F60: WSACloseEvent.WS2_32(?), ref: 10004003
                                                                                                  • Part of subcall function 10003F60: shutdown.WS2_32(?,00000001), ref: 1000401B
                                                                                                  • Part of subcall function 10003F60: closesocket.WS2_32(?), ref: 10004025
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Close$EventHandleObjectSingleSleepWait$CurrentExchangeInterlockedThreadclosesocketsendshutdown
                                                                                                • String ID:
                                                                                                • API String ID: 1019945655-0
                                                                                                • Opcode ID: 3a30db2477d7f785b2e787c45e20f2cfe3e7392a271029e59f364346de097013
                                                                                                • Instruction ID: b3bd2b528433ae293362b27f5e3b1343b14dca1381540b702c4300f5d31fb9dc
                                                                                                • Opcode Fuzzy Hash: 3a30db2477d7f785b2e787c45e20f2cfe3e7392a271029e59f364346de097013
                                                                                                • Instruction Fuzzy Hash: 1AF096762046149BD210EBA9CC84D4BF3E9EFC8761B158B19F26987694CA71FC01CBA0
                                                                                                APIs
                                                                                                • DeleteObject.GDI32(?), ref: 03D39BD2
                                                                                                • EnterCriticalSection.KERNEL32(03D5FB64,?,?,?,03D39B7B), ref: 03D39BE3
                                                                                                • EnterCriticalSection.KERNEL32(03D5FB64,?,?,?,03D39B7B), ref: 03D39BF8
                                                                                                • GdiplusShutdown.GDIPLUS(00000000,?,?,?,03D39B7B), ref: 03D39C04
                                                                                                • LeaveCriticalSection.KERNEL32(03D5FB64,?,?,?,03D39B7B), ref: 03D39C15
                                                                                                • LeaveCriticalSection.KERNEL32(03D5FB64,?,?,?,03D39B7B), ref: 03D39C1C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterLeave$DeleteGdiplusObjectShutdown
                                                                                                • String ID:
                                                                                                • API String ID: 4268643673-0
                                                                                                • Opcode ID: b07d9f2b0567304069487d203d2cef1a05c14308ce05dbe46beac19bf67f44cc
                                                                                                • Instruction ID: 326111f0d36a4624947aaf3ea3eef1f9a9816e01ffdd6017684b0bade8deefd1
                                                                                                • Opcode Fuzzy Hash: b07d9f2b0567304069487d203d2cef1a05c14308ce05dbe46beac19bf67f44cc
                                                                                                • Instruction Fuzzy Hash: 51011AB6901304EFCB05EF6AA890419BBA8FA4971536485AEF529CB306C772D807CF95
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 03D348E1
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 03D348EC
                                                                                                • Sleep.KERNEL32(00000258), ref: 03D348F9
                                                                                                • CloseHandle.KERNEL32(?), ref: 03D34914
                                                                                                • CloseHandle.KERNEL32(?), ref: 03D3491D
                                                                                                • Sleep.KERNEL32(0000012C), ref: 03D3492E
                                                                                                  • Part of subcall function 03D33F60: GetCurrentThreadId.KERNEL32 ref: 03D33F65
                                                                                                  • Part of subcall function 03D33F60: send.WS2_32(?,03D549C0,00000010,00000000), ref: 03D33FC6
                                                                                                  • Part of subcall function 03D33F60: SetEvent.KERNEL32(?), ref: 03D33FE9
                                                                                                  • Part of subcall function 03D33F60: InterlockedExchange.KERNEL32(?,00000000), ref: 03D33FF5
                                                                                                  • Part of subcall function 03D33F60: WSACloseEvent.WS2_32(?), ref: 03D34003
                                                                                                  • Part of subcall function 03D33F60: shutdown.WS2_32(?,00000001), ref: 03D3401B
                                                                                                  • Part of subcall function 03D33F60: closesocket.WS2_32(?), ref: 03D34025
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Close$EventHandleObjectSingleSleepWait$CurrentExchangeInterlockedThreadclosesocketsendshutdown
                                                                                                • String ID:
                                                                                                • API String ID: 1019945655-0
                                                                                                • Opcode ID: e084b4ec2cb929dcb8c2136d53b3e2c5899c0d6cfced25fc50f6d3c991af9fc7
                                                                                                • Instruction ID: 064aaf7a073c2e488ebfc70560e9d93bc38eb1ee8e7aa606f653a0476016d469
                                                                                                • Opcode Fuzzy Hash: e084b4ec2cb929dcb8c2136d53b3e2c5899c0d6cfced25fc50f6d3c991af9fc7
                                                                                                • Instruction Fuzzy Hash: 9BF0307A2047045BC624EBA9DD84D4AF3E9EFC9720B254B09E26987394CA75EC05CBA0
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 03D33311
                                                                                                • Sleep.KERNEL32(00000258), ref: 03D3331E
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 03D33326
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 03D33332
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 03D3333A
                                                                                                • Sleep.KERNEL32(0000012C), ref: 03D3334B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ObjectSingleWait$Sleep$ExchangeInterlocked
                                                                                                • String ID:
                                                                                                • API String ID: 3137405945-0
                                                                                                • Opcode ID: f718c1d3b90d1664f321832ba1c6b6d1e3f102952192a07f702e70f074173b07
                                                                                                • Instruction ID: 7f557fa1be286648370493d93c0f7e5c660bfc96a6028d20c8a9d0948119ec9b
                                                                                                • Opcode Fuzzy Hash: f718c1d3b90d1664f321832ba1c6b6d1e3f102952192a07f702e70f074173b07
                                                                                                • Instruction Fuzzy Hash: 86F01C762047146BD620ABA9DC84E56F3E8AF99734B204B09F265933D4CAB5E805CBA0
                                                                                                APIs
                                                                                                • _callnewh.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E01D85
                                                                                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E01D92
                                                                                                • _CxxThrowException.VCRUNTIME140(?,00E027B4), ref: 00E01E99
                                                                                                • _CxxThrowException.VCRUNTIME140(?,00E02808), ref: 00E01EB6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3556290818.0000000000E01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00E00000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3556263696.0000000000E00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556319323.0000000000E02000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556351733.0000000000E03000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556384480.0000000000E04000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556384480.0000000000E46000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_e00000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionThrow$_callnewhmalloc
                                                                                                • String ID: Unknown exception
                                                                                                • API String ID: 4113974480-410509341
                                                                                                • Opcode ID: bb7dd929ebf786b3bea81b4e0fe90aa7d80236b20e886daccd8b83b9541287c8
                                                                                                • Instruction ID: af18a1f82e8eb20361ce491baccc24de2cabcdabfe7e50e76677bb8713f36a72
                                                                                                • Opcode Fuzzy Hash: bb7dd929ebf786b3bea81b4e0fe90aa7d80236b20e886daccd8b83b9541287c8
                                                                                                • Instruction Fuzzy Hash: 1BF0813560430E66CB04AAE8DC069AD77ED5E00355B60A5E9F914BE0D1EB71EAD6C1D0
                                                                                                APIs
                                                                                                • ___BuildCatchObject.LIBCMT ref: 10013A63
                                                                                                  • Part of subcall function 100139BE: ___BuildCatchObjectHelper.LIBCMT ref: 100139F4
                                                                                                • _UnwindNestedFrames.LIBCMT ref: 10013A7A
                                                                                                • ___FrameUnwindToState.LIBCMT ref: 10013A88
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                                                                                • String ID: csm$csm
                                                                                                • API String ID: 2163707966-3733052814
                                                                                                • Opcode ID: 5a0efde82555800522ebcbcdf0ebfc514e59fc27468206ba67c06b53666bf625
                                                                                                • Instruction ID: e6390535bab9e49693186baa48b022ad9d19c19648d68c038876df6954aae2ed
                                                                                                • Opcode Fuzzy Hash: 5a0efde82555800522ebcbcdf0ebfc514e59fc27468206ba67c06b53666bf625
                                                                                                • Instruction Fuzzy Hash: AE01F675401109BBDF12DF51CC45EAB7F6AEF08390F508024FD5819121D776E9B1DBA1
                                                                                                APIs
                                                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,CDB86E77,?,?,00000000,6C38C7DD,000000FF,?,6C3726D0,6C3725AA,?,6C37276C,00000000), ref: 6C372644
                                                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6C372656
                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000,6C38C7DD,000000FF,?,6C3726D0,6C3725AA,?,6C37276C,00000000), ref: 6C372678
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                                • API String ID: 4061214504-1276376045
                                                                                                • Opcode ID: d82f296681e4fb02b92f459ba583f04f00b985b406459a966a1268a0bfc25878
                                                                                                • Instruction ID: 3018993f6d1cdc8862c029edc4d241d58e248ac1c557b26ea394dd259dca4da6
                                                                                                • Opcode Fuzzy Hash: d82f296681e4fb02b92f459ba583f04f00b985b406459a966a1268a0bfc25878
                                                                                                • Instruction Fuzzy Hash: 6E018B31514659EFDF119F50CC09FAE7BBCFB05715F000929F822A26C0EB7A9900CE94
                                                                                                APIs
                                                                                                • ___BuildCatchObject.LIBCMT ref: 03D5096E
                                                                                                  • Part of subcall function 03D508C9: ___BuildCatchObjectHelper.LIBCMT ref: 03D508FF
                                                                                                • _UnwindNestedFrames.LIBCMT ref: 03D50985
                                                                                                • ___FrameUnwindToState.LIBCMT ref: 03D50993
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                                                                                • String ID: csm$csm
                                                                                                • API String ID: 2163707966-3733052814
                                                                                                • Opcode ID: a4ec08a577bcb042cc7356b16b645f83b0b4d35d15726398ffe3570c0dbe416a
                                                                                                • Instruction ID: 71143e9514be7364a88b02588df0052f64951fefa1c90a59b86c05e2dd55b4ea
                                                                                                • Opcode Fuzzy Hash: a4ec08a577bcb042cc7356b16b645f83b0b4d35d15726398ffe3570c0dbe416a
                                                                                                • Instruction Fuzzy Hash: B601F2B5401209BBEF12AF51CC44EAABF6AFF09390F088024FD5819164DB36D9B1DBA0
                                                                                                APIs
                                                                                                • PeekConsoleInputA.KERNEL32(?,gfff,6C399D70,00000000,?,6C373746,00000000,0000000C,6C399D70,66666667,?,?,6C3733F4,6C399D70,0000000C,6C351B27), ref: 6C380B35
                                                                                                • GetLastError.KERNEL32(?,6C373746,00000000,0000000C,6C399D70,66666667,?,?,6C3733F4,6C399D70,0000000C,6C351B27), ref: 6C380B41
                                                                                                  • Part of subcall function 6C380C1D: CloseHandle.KERNEL32(FFFFFFFF,6C380B05,?,6C3736DC,0000000C,66666667,?,?,6C3733F4,6C399D70,0000000C,6C351B27), ref: 6C380C2D
                                                                                                • ___initconin.LIBCMT ref: 6C380B51
                                                                                                  • Part of subcall function 6C380BFE: CreateFileW.KERNEL32(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C380A79,6C3736CB,66666667,?,?,6C3733F4,6C399D70,0000000C,6C351B27), ref: 6C380C11
                                                                                                • PeekConsoleInputA.KERNEL32(?,?,FFFFFFFF,?,6C373746,00000000,0000000C,6C399D70,66666667,?,?,6C3733F4,6C399D70,0000000C,6C351B27), ref: 6C380B65
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConsoleInputPeek$CloseCreateErrorFileHandleLast___initconin
                                                                                                • String ID: gfff
                                                                                                • API String ID: 1545762386-1553575800
                                                                                                • Opcode ID: 17b21d469809209df9fda145fc55a6aa42256eab1ac39d7f5e557aa4cc64408a
                                                                                                • Instruction ID: cf999231c3a56f140dcf8c4db2106d30307be4518fb9bd44d28e3892ed4aab45
                                                                                                • Opcode Fuzzy Hash: 17b21d469809209df9fda145fc55a6aa42256eab1ac39d7f5e557aa4cc64408a
                                                                                                • Instruction Fuzzy Hash: 45F0C03690615DBB8F122FD5DC049DD3F7AFB0A769B044110F91996620E733C8609F91
                                                                                                APIs
                                                                                                • RegOpenKeyExW.ADVAPI32(80000001,Console,00000000,00000002), ref: 03D3B800
                                                                                                • RegDeleteValueW.ADVAPI32(?,IpDatespecial), ref: 03D3B810
                                                                                                • RegCloseKey.ADVAPI32(?), ref: 03D3B81B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseDeleteOpenValue
                                                                                                • String ID: Console$IpDatespecial
                                                                                                • API String ID: 849931509-1840232981
                                                                                                • Opcode ID: 7146e940ba950477d3f4aa3b5fd750aa2798b9bf13010c119db34301001e7c83
                                                                                                • Instruction ID: 99ad48b2b00d6e2034ae0aacc1197fc1aec0616354974dad3202e95ff2d6f198
                                                                                                • Opcode Fuzzy Hash: 7146e940ba950477d3f4aa3b5fd750aa2798b9bf13010c119db34301001e7c83
                                                                                                • Instruction Fuzzy Hash: 09E08673246340AFD324A674BC4FF9D7764F78C711F00495DFA85A12418552E518C665
                                                                                                APIs
                                                                                                • __alloca_probe_16.LIBCMT ref: 6C37D42A
                                                                                                • __alloca_probe_16.LIBCMT ref: 6C37D4F3
                                                                                                • __freea.LIBCMT ref: 6C37D55A
                                                                                                  • Part of subcall function 6C37A641: RtlAllocateHeap.NTDLL(00000000,6C37DBE2,?,?,6C37DBE2,00000220,?,?,?), ref: 6C37A673
                                                                                                • __freea.LIBCMT ref: 6C37D56D
                                                                                                • __freea.LIBCMT ref: 6C37D57A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 1423051803-0
                                                                                                • Opcode ID: 506fb620f0a2eb73750dc901a595de2aafad21097f89a796812df520353573fc
                                                                                                • Instruction ID: 119a686c76fdd361016cea4f2d43d2f938578aae6694b90821595b52cab6d6ac
                                                                                                • Opcode Fuzzy Hash: 506fb620f0a2eb73750dc901a595de2aafad21097f89a796812df520353573fc
                                                                                                • Instruction Fuzzy Hash: 6051B3B26012066FEB208E65DC40EBB3BADDF4476CB210528FD1497A10EB39DD14CE75
                                                                                                APIs
                                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,E832A845), ref: 03D3B9DA
                                                                                                • _memset.LIBCMT ref: 03D3B9FB
                                                                                                • _memset.LIBCMT ref: 03D3BA4B
                                                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 03D3BA65
                                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 03D3BAB7
                                                                                                  • Part of subcall function 03D3F707: _malloc.LIBCMT ref: 03D3F721
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process32_memset$CreateFirstNextSnapshotToolhelp32_malloc
                                                                                                • String ID:
                                                                                                • API String ID: 2416807333-0
                                                                                                • Opcode ID: 18af85b80dad1380376f58e3fa6fa26ec4ef5a4956046142d9a8675c850b55e5
                                                                                                • Instruction ID: 01bd352a7fc7462b970d620d0bcaa6212f21a4818f352be358ae79b344f996f8
                                                                                                • Opcode Fuzzy Hash: 18af85b80dad1380376f58e3fa6fa26ec4ef5a4956046142d9a8675c850b55e5
                                                                                                • Instruction Fuzzy Hash: DF41C471900605AFEB10DF64CC85FAAB7B8FF16B14F044296E9159B2C0E7B59E44CBA1
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6C354CD5
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6C354CEF
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6C354D10
                                                                                                • __Getctype.LIBCPMT ref: 6C354DC4
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6C354DF7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getctype
                                                                                                • String ID:
                                                                                                • API String ID: 3087743877-0
                                                                                                • Opcode ID: 6307cfab759e476178303b77da506d02dc3d3c41461296ce6a181d407976bca1
                                                                                                • Instruction ID: a061c9b9268fb7bc3373028f994e70f32f4122460b4427b4386ce090a0f5a091
                                                                                                • Opcode Fuzzy Hash: 6307cfab759e476178303b77da506d02dc3d3c41461296ce6a181d407976bca1
                                                                                                • Instruction Fuzzy Hash: A1416A71E002248FCB14DF99D850BEEB7B4FF44718F544119D859ABB41E736A914CF92
                                                                                                APIs
                                                                                                • recv.WS2_32(?,?,00000598,00000000), ref: 03D33CBF
                                                                                                • SetLastError.KERNEL32(00000000,?,?,03D3399F,?,?,00000000,000000FF,00000000), ref: 03D33CFA
                                                                                                • GetLastError.KERNEL32(00000000), ref: 03D33D45
                                                                                                • WSAGetLastError.WS2_32(?,?,03D3399F,?,?,00000000,000000FF,00000000), ref: 03D33D7B
                                                                                                • WSASetLastError.WS2_32(0000000D,?,?,03D3399F,?,?,00000000,000000FF,00000000), ref: 03D33DA2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$recv
                                                                                                • String ID:
                                                                                                • API String ID: 316788870-0
                                                                                                • Opcode ID: 6baa188deffcfcd673b5b9291fbcee554c73143d664dd22e31666cb67c995181
                                                                                                • Instruction ID: a59c0054f1246e278ee5f44a06d86e7beab0d458ff35f29f07c75af857112cc0
                                                                                                • Opcode Fuzzy Hash: 6baa188deffcfcd673b5b9291fbcee554c73143d664dd22e31666cb67c995181
                                                                                                • Instruction Fuzzy Hash: 4C31F47A6043008FEB64DF68E9C8B6A77A9FB86320F04056AED05CB389D775DC848B51
                                                                                                APIs
                                                                                                • _malloc.LIBCMT ref: 1000E5E5
                                                                                                  • Part of subcall function 10006E83: __FF_MSGBANNER.LIBCMT ref: 10006E9C
                                                                                                  • Part of subcall function 10006E83: __NMSG_WRITE.LIBCMT ref: 10006EA3
                                                                                                  • Part of subcall function 10006E83: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F), ref: 10006EC8
                                                                                                • _free.LIBCMT ref: 1000E5F8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap_free_malloc
                                                                                                • String ID:
                                                                                                • API String ID: 1020059152-0
                                                                                                • Opcode ID: 073510cd7888ec162256f41c4b27844541b3ac2ad2a228e050a5b5aba56439fd
                                                                                                • Instruction ID: 99b6cfc0e9903126c7bed8e87128f69c37c5ff73db012c927cbf40cb5b0e6f66
                                                                                                • Opcode Fuzzy Hash: 073510cd7888ec162256f41c4b27844541b3ac2ad2a228e050a5b5aba56439fd
                                                                                                • Instruction Fuzzy Hash: 2F113A36900A61ABFB229BB4BC0564E37D5FF443F1B214525F848BB198DF36DD404B94
                                                                                                APIs
                                                                                                • _malloc.LIBCMT ref: 03D40EF9
                                                                                                  • Part of subcall function 03D3F673: __FF_MSGBANNER.LIBCMT ref: 03D3F68C
                                                                                                  • Part of subcall function 03D3F673: __NMSG_WRITE.LIBCMT ref: 03D3F693
                                                                                                  • Part of subcall function 03D3F673: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,03D44500,00000000,00000001,00000000,?,03D48DE6,00000018,03D56448,0000000C,03D48E76), ref: 03D3F6B8
                                                                                                • _free.LIBCMT ref: 03D40F0C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap_free_malloc
                                                                                                • String ID:
                                                                                                • API String ID: 1020059152-0
                                                                                                • Opcode ID: 02e141149021855cacc687559d48ca1e50b304c047f35ae008a1f3f31f7f2c88
                                                                                                • Instruction ID: 2210a2ab5a2360c98ff114b9f32d0c1bef5ba3ceb99d43a960e273ed3b89c7af
                                                                                                • Opcode Fuzzy Hash: 02e141149021855cacc687559d48ca1e50b304c047f35ae008a1f3f31f7f2c88
                                                                                                • Instruction Fuzzy Hash: B611E337808719AFCB21BF74A80465EB79DDF452A0B184836EA899F250DB30C98287B4
                                                                                                APIs
                                                                                                • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 10002BFF
                                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 10002C15
                                                                                                • TranslateMessage.USER32(?), ref: 10002C24
                                                                                                • DispatchMessageW.USER32(?), ref: 10002C2A
                                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 10002C38
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Message$Peek$DispatchMultipleObjectsTranslateWait
                                                                                                • String ID:
                                                                                                • API String ID: 2015114452-0
                                                                                                • Opcode ID: dbe9700d19ae9a12251f89c422866142aee7b4545ced7af6ef9db51ab6727882
                                                                                                • Instruction ID: 0e3c485fe407bbf507bfa30b8d40781191f7ce2fd7dbe990fe93c7e11cc8c17a
                                                                                                • Opcode Fuzzy Hash: dbe9700d19ae9a12251f89c422866142aee7b4545ced7af6ef9db51ab6727882
                                                                                                • Instruction Fuzzy Hash: 8901A972A80319F6F610EB948D91FAE736CEB04B91F504511FF04EE0D9DAB1E80587B4
                                                                                                APIs
                                                                                                • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 03D32C3F
                                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 03D32C55
                                                                                                • TranslateMessage.USER32(?), ref: 03D32C64
                                                                                                • DispatchMessageW.USER32(?), ref: 03D32C6A
                                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 03D32C78
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Message$Peek$DispatchMultipleObjectsTranslateWait
                                                                                                • String ID:
                                                                                                • API String ID: 2015114452-0
                                                                                                • Opcode ID: 128767ef5686b2d0e66940020f641e2b33b2cae491dc99e6571ab1195446b867
                                                                                                • Instruction ID: 5a9d03d54c0035b8134a5837e9eb6d993c6293a18fc96883b165ae65de0bb398
                                                                                                • Opcode Fuzzy Hash: 128767ef5686b2d0e66940020f641e2b33b2cae491dc99e6571ab1195446b867
                                                                                                • Instruction Fuzzy Hash: 36018677E5030DB6E610E694DC81FBA736CAB05B10F504911FB40EB1C4D6A5E90587A5
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(?,?,00000000), ref: 10004B63
                                                                                                • EnterCriticalSection.KERNEL32(?,?,00000000), ref: 10004B6D
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,00000000), ref: 10004B80
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,00000000), ref: 10004B83
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterLeave
                                                                                                • String ID:
                                                                                                • API String ID: 3168844106-0
                                                                                                • Opcode ID: 3c4cb16bca3ae15824b6f58c01f312d0d5f5bcc1af3ff3d380ee54a514ce913b
                                                                                                • Instruction ID: aa03fd3e3b24d4ff679a20f9d9d19219b814eae2566e95c25fa4737bddb7a95c
                                                                                                • Opcode Fuzzy Hash: 3c4cb16bca3ae15824b6f58c01f312d0d5f5bcc1af3ff3d380ee54a514ce913b
                                                                                                • Instruction Fuzzy Hash: 4A0184765006109FE310DB75ECC8B9BB3E8EB8C355F064819E10687100C735FC458AA4
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(?,?,00000000), ref: 03D34B83
                                                                                                • EnterCriticalSection.KERNEL32(?,?,00000000), ref: 03D34B8D
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,00000000), ref: 03D34BA0
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,00000000), ref: 03D34BA3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterLeave
                                                                                                • String ID:
                                                                                                • API String ID: 3168844106-0
                                                                                                • Opcode ID: 4cd9871afe01f07fb66924bdb0205dce9095d808c09bcd5bc31d321fac7b5d04
                                                                                                • Instruction ID: 5992c0b9cfa9f82e7700272a204c0b4443cc37f7a0750a3108ff40a97414bc6d
                                                                                                • Opcode Fuzzy Hash: 4cd9871afe01f07fb66924bdb0205dce9095d808c09bcd5bc31d321fac7b5d04
                                                                                                • Instruction Fuzzy Hash: 3E018F7B2003149BD721EB2AFCC4B5BB7F8EB89754F054869E14683204C738ED49CA60
                                                                                                APIs
                                                                                                • __EH_prolog3.LIBCMT ref: 6C36B2D6
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6C36B2E1
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6C36B34F
                                                                                                  • Part of subcall function 6C36B1D8: std::locale::_Locimp::_Locimp.LIBCPMT ref: 6C36B1F0
                                                                                                • std::locale::_Setgloballocale.LIBCPMT ref: 6C36B2FC
                                                                                                • _Yarn.LIBCPMT ref: 6C36B312
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                                • String ID:
                                                                                                • API String ID: 1088826258-0
                                                                                                • Opcode ID: fb14b32e13500793f5dceee9a7f4aca681123774f9dc06365953a1a95fcebe6f
                                                                                                • Instruction ID: 29abf9097a507ba1f734c7fc216ad46c37d011e9bb6cd44bd7e2d7dea210be0f
                                                                                                • Opcode Fuzzy Hash: fb14b32e13500793f5dceee9a7f4aca681123774f9dc06365953a1a95fcebe6f
                                                                                                • Instruction Fuzzy Hash: 1E01F275701221DBCB06EF22D8046BC7B75BF81248B240008E8515BF84EF35AE0ADFC2
                                                                                                APIs
                                                                                                • setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 03D32D5C
                                                                                                • CancelIo.KERNEL32(?), ref: 03D32D66
                                                                                                • InterlockedExchange.KERNEL32(00000000,00000000), ref: 03D32D6F
                                                                                                • closesocket.WS2_32(?), ref: 03D32D79
                                                                                                • SetEvent.KERNEL32(00000001), ref: 03D32D83
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
                                                                                                • String ID:
                                                                                                • API String ID: 1486965892-0
                                                                                                • Opcode ID: 3bdde51e9bd645ba97d8f330b081b0fa6a162b67443ec4eacb5ae40a6c7877a6
                                                                                                • Instruction ID: 8fae26a0f77400844e8f93f4ee999e17d20f5b99002934baedd7bbcebd6ce04f
                                                                                                • Opcode Fuzzy Hash: 3bdde51e9bd645ba97d8f330b081b0fa6a162b67443ec4eacb5ae40a6c7877a6
                                                                                                • Instruction Fuzzy Hash: 46F03C76500704ABD224AF54ED49F6777B8BB49B11F100A1CF69296784C6B0B9088BA0
                                                                                                APIs
                                                                                                • __getptd.LIBCMT ref: 1000E14B
                                                                                                  • Part of subcall function 1000990F: __getptd_noexit.LIBCMT ref: 10009912
                                                                                                  • Part of subcall function 1000990F: __amsg_exit.LIBCMT ref: 1000991F
                                                                                                • __getptd.LIBCMT ref: 1000E162
                                                                                                • __amsg_exit.LIBCMT ref: 1000E170
                                                                                                • __lock.LIBCMT ref: 1000E180
                                                                                                • __updatetlocinfoEx_nolock.LIBCMT ref: 1000E194
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                                                                • String ID:
                                                                                                • API String ID: 938513278-0
                                                                                                • Opcode ID: 0522d91088f6fb7310532faddd65fc2dc9ce4b376bceba7dbe74de096dd3a9dc
                                                                                                • Instruction ID: 612b0c8b07e52b5ee846fa9c2d173a4fa9df34f322aac77c2402261cad3e7578
                                                                                                • Opcode Fuzzy Hash: 0522d91088f6fb7310532faddd65fc2dc9ce4b376bceba7dbe74de096dd3a9dc
                                                                                                • Instruction Fuzzy Hash: 59F090369446249BF721EBB8980278D32F0EF40BE0F118149F494771DACB74AD40CA56
                                                                                                APIs
                                                                                                • __getptd.LIBCMT ref: 03D45012
                                                                                                  • Part of subcall function 03D43E5B: __getptd_noexit.LIBCMT ref: 03D43E5E
                                                                                                  • Part of subcall function 03D43E5B: __amsg_exit.LIBCMT ref: 03D43E6B
                                                                                                • __getptd.LIBCMT ref: 03D45029
                                                                                                • __amsg_exit.LIBCMT ref: 03D45037
                                                                                                • __lock.LIBCMT ref: 03D45047
                                                                                                • __updatetlocinfoEx_nolock.LIBCMT ref: 03D4505B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                                                                • String ID:
                                                                                                • API String ID: 938513278-0
                                                                                                • Opcode ID: 0ed979b98fe39bd1ab0741bea5f3be69bb0b2d181dfdc8e57bf426e7507a9af9
                                                                                                • Instruction ID: 53354e42338e0237c53c029a9771db87e6994924af32802117c292d90c96346b
                                                                                                • Opcode Fuzzy Hash: 0ed979b98fe39bd1ab0741bea5f3be69bb0b2d181dfdc8e57bf426e7507a9af9
                                                                                                • Instruction Fuzzy Hash: 41F0B43ED45700DBDB70FBB8A405B4D73B1EF01F20F144219E515AF2C0CB3484918AA6
                                                                                                APIs
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,?,000001FE), ref: 03D3C932
                                                                                                • GetCommandLineW.KERNEL32 ref: 03D3C938
                                                                                                • GetStartupInfoW.KERNEL32(?), ref: 03D3C947
                                                                                                • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000020,00000000,00000000,?,?), ref: 03D3C96F
                                                                                                • ExitProcess.KERNEL32 ref: 03D3C977
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CommandCreateExitFileInfoLineModuleNameStartup
                                                                                                • String ID:
                                                                                                • API String ID: 3421218197-0
                                                                                                • Opcode ID: 844a06727a5b0873600f5da264abca8613863c5e101c8d18f81e7bab3ba3421b
                                                                                                • Instruction ID: 8e7b586040044f213da99f9e170283df27b881a5225e5293c97c0eefa62b0003
                                                                                                • Opcode Fuzzy Hash: 844a06727a5b0873600f5da264abca8613863c5e101c8d18f81e7bab3ba3421b
                                                                                                • Instruction Fuzzy Hash: 79F05473585318BBEB20ABA4DC4DFEB7778FB04B01F100694B719A61D4DA706A48CF54
                                                                                                APIs
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,?,000001FE), ref: 03D375D2
                                                                                                • GetCommandLineW.KERNEL32 ref: 03D375D8
                                                                                                • GetStartupInfoW.KERNEL32(?), ref: 03D375E7
                                                                                                • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000020,00000000,00000000,?,?), ref: 03D3760F
                                                                                                • ExitProcess.KERNEL32 ref: 03D37617
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CommandCreateExitFileInfoLineModuleNameStartup
                                                                                                • String ID:
                                                                                                • API String ID: 3421218197-0
                                                                                                • Opcode ID: b61c036bfbd5020a9d6175b0dd022dfd2f9ae9ce6d1d9ca5b6d9c1be65700322
                                                                                                • Instruction ID: 4290d7f3bdb9621ac5f80834a2253765185ea34473d65f8ac356c39ce2a908a8
                                                                                                • Opcode Fuzzy Hash: b61c036bfbd5020a9d6175b0dd022dfd2f9ae9ce6d1d9ca5b6d9c1be65700322
                                                                                                • Instruction Fuzzy Hash: DEF05473585319BBE720ABA4DC4DFDA7778EB04B01F500694B719A61C4D6706A48CF54
                                                                                                APIs
                                                                                                  • Part of subcall function 100082F0: _doexit.LIBCMT ref: 100082FC
                                                                                                • ___set_flsgetvalue.LIBCMT ref: 100071BC
                                                                                                  • Part of subcall function 10009754: TlsGetValue.KERNEL32(00000000,100098AD,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000), ref: 1000975D
                                                                                                  • Part of subcall function 10009754: DecodePointer.KERNEL32(?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000,?,100099BA,0000000D), ref: 1000976F
                                                                                                  • Part of subcall function 10009754: TlsSetValue.KERNEL32(00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000,?,100099BA), ref: 1000977E
                                                                                                • ___fls_getvalue@4.LIBCMT ref: 100071C7
                                                                                                  • Part of subcall function 10009734: TlsGetValue.KERNEL32(?,?,100071CC,00000000), ref: 10009742
                                                                                                • ___fls_setvalue@8.LIBCMT ref: 100071DA
                                                                                                  • Part of subcall function 10009788: DecodePointer.KERNEL32(?,?,?,100071DF,00000000,?,00000000), ref: 10009799
                                                                                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 100071E3
                                                                                                • ExitThread.KERNEL32 ref: 100071EA
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 100071F0
                                                                                                • __freefls@4.LIBCMT ref: 10007210
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Value$DecodePointerThread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                                                                • String ID:
                                                                                                • API String ID: 781180411-0
                                                                                                • Opcode ID: 0a01c43476d108d4c9d86bcd5ae0e752dcea8e710ecd95c49a8faa49c4d187ed
                                                                                                • Instruction ID: 877ff296740ff87ffef8dcd6d6c63871bb1eb85cd0bb9270c275db20a0a7633c
                                                                                                • Opcode Fuzzy Hash: 0a01c43476d108d4c9d86bcd5ae0e752dcea8e710ecd95c49a8faa49c4d187ed
                                                                                                • Instruction Fuzzy Hash: 22E04F3A81865967FB01ABF18D4E8CF366CEF052D5B158420FA189701BDB38E90146A1
                                                                                                APIs
                                                                                                  • Part of subcall function 03D41CD0: _doexit.LIBCMT ref: 03D41CDC
                                                                                                • ___set_flsgetvalue.LIBCMT ref: 03D3F9CA
                                                                                                  • Part of subcall function 03D43CA0: TlsGetValue.KERNEL32(00000000,03D43DF9,?,03D44500,00000000,00000001,00000000,?,03D48DE6,00000018,03D56448,0000000C,03D48E76,00000000,00000000), ref: 03D43CA9
                                                                                                  • Part of subcall function 03D43CA0: DecodePointer.KERNEL32(?,03D44500,00000000,00000001,00000000,?,03D48DE6,00000018,03D56448,0000000C,03D48E76,00000000,00000000,?,03D43F06,0000000D), ref: 03D43CBB
                                                                                                  • Part of subcall function 03D43CA0: TlsSetValue.KERNEL32(00000000,?,03D44500,00000000,00000001,00000000,?,03D48DE6,00000018,03D56448,0000000C,03D48E76,00000000,00000000,?,03D43F06), ref: 03D43CCA
                                                                                                • ___fls_getvalue@4.LIBCMT ref: 03D3F9D5
                                                                                                  • Part of subcall function 03D43C80: TlsGetValue.KERNEL32(?,?,03D3F9DA,00000000), ref: 03D43C8E
                                                                                                • ___fls_setvalue@8.LIBCMT ref: 03D3F9E8
                                                                                                  • Part of subcall function 03D43CD4: DecodePointer.KERNEL32(?,?,?,03D3F9ED,00000000,?,00000000), ref: 03D43CE5
                                                                                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 03D3F9F1
                                                                                                • ExitThread.KERNEL32 ref: 03D3F9F8
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 03D3F9FE
                                                                                                • __freefls@4.LIBCMT ref: 03D3FA1E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Value$DecodePointerThread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                                                                • String ID:
                                                                                                • API String ID: 781180411-0
                                                                                                • Opcode ID: 8d2cdd95e371e80df5564dca792d75e1dd7ff445141c5f54999ced69a114312b
                                                                                                • Instruction ID: 1fbe4379d9bb5377c39f0c122f168a9aa674e3a4f56fa24386672e59cd1bd1ee
                                                                                                • Opcode Fuzzy Hash: 8d2cdd95e371e80df5564dca792d75e1dd7ff445141c5f54999ced69a114312b
                                                                                                • Instruction Fuzzy Hash: 16E0863EE003597BCF00B7F69D0D84F7A1CEE01291F148400FA049B104DE24D92187B1
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: DeleteFileFolderPath_strlen
                                                                                                • String ID: n79l
                                                                                                • API String ID: 1809683544-2434338032
                                                                                                • Opcode ID: 887ee8e46ba9e42fd64878d6bea2a5a1a5d30751b5672acc22c58ec6358893f3
                                                                                                • Instruction ID: 1a63d6ffca78fdcb237d9c5f95a13704df61df5d9648d8a11a77b3c7ee5259d6
                                                                                                • Opcode Fuzzy Hash: 887ee8e46ba9e42fd64878d6bea2a5a1a5d30751b5672acc22c58ec6358893f3
                                                                                                • Instruction Fuzzy Hash: 99C113B1D003548FDB10CFA9C9807EEBBB1BF4A308F144629D445ABB85E7759A84CF92
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                • API String ID: 4218353326-1866435925
                                                                                                • Opcode ID: e2b2fb8afe44fd2b81157048a5a54c35addb53d340716df6d459df27ec0d80f0
                                                                                                • Instruction ID: 0dc730f0571a26c49cb2687ab46cdc919dca9136727c781e8631df44f61aa43f
                                                                                                • Opcode Fuzzy Hash: e2b2fb8afe44fd2b81157048a5a54c35addb53d340716df6d459df27ec0d80f0
                                                                                                • Instruction Fuzzy Hash: D3C15875A006159FDB04CF68C880B9DBBF2BF48328F688258E815AB795C335ED55CF90
                                                                                                APIs
                                                                                                  • Part of subcall function 6C37A893: GetLastError.KERNEL32(?,?,6C375151,?,6C351A6D,00000000), ref: 6C37A897
                                                                                                  • Part of subcall function 6C37A893: SetLastError.KERNEL32(00000000,6C351A6D,00000000), ref: 6C37A939
                                                                                                • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,6C37B1CB,?,?,?,00000055,?,-00000050,?,?,?), ref: 6C385931
                                                                                                • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,6C37B1CB,?,?,?,00000055,?,-00000050,?,?), ref: 6C385968
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$CodePageValid
                                                                                                • String ID: PX9lE$utf8
                                                                                                • API String ID: 943130320-988321041
                                                                                                • Opcode ID: 8a2a1bc55f0879296ef93671fd968d4b5f557116336c951575e83a1aaec107a0
                                                                                                • Instruction ID: f986b1b3a4a6355f21eacbe76f1f7e8f4fa22d0bc52e906c507ddc7525c7448b
                                                                                                • Opcode Fuzzy Hash: 8a2a1bc55f0879296ef93671fd968d4b5f557116336c951575e83a1aaec107a0
                                                                                                • Instruction Fuzzy Hash: 26513632607301AAF7159B75CCC1BE673A8EF45708F14042AE59797A80F77AD6448FA2
                                                                                                APIs
                                                                                                  • Part of subcall function 6C36B2CF: __EH_prolog3.LIBCMT ref: 6C36B2D6
                                                                                                  • Part of subcall function 6C36B2CF: std::_Lockit::_Lockit.LIBCPMT ref: 6C36B2E1
                                                                                                  • Part of subcall function 6C36B2CF: std::locale::_Setgloballocale.LIBCPMT ref: 6C36B2FC
                                                                                                  • Part of subcall function 6C36B2CF: _Yarn.LIBCPMT ref: 6C36B312
                                                                                                  • Part of subcall function 6C36B2CF: std::_Lockit::~_Lockit.LIBCPMT ref: 6C36B34F
                                                                                                  • Part of subcall function 6C354CA0: std::_Lockit::_Lockit.LIBCPMT ref: 6C354CD5
                                                                                                  • Part of subcall function 6C354CA0: std::_Lockit::_Lockit.LIBCPMT ref: 6C354CEF
                                                                                                  • Part of subcall function 6C354CA0: std::_Lockit::~_Lockit.LIBCPMT ref: 6C354D10
                                                                                                  • Part of subcall function 6C354CA0: __Getctype.LIBCPMT ref: 6C354DC4
                                                                                                  • Part of subcall function 6C354CA0: std::_Lockit::~_Lockit.LIBCPMT ref: 6C354DF7
                                                                                                • std::ios_base::_Addstd.LIBCPMT ref: 6C35BE72
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Lockitstd::_$Lockit::_Lockit::~_$AddstdGetctypeH_prolog3SetgloballocaleYarnstd::ios_base::_std::locale::_
                                                                                                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                • API String ID: 3375204848-1866435925
                                                                                                • Opcode ID: 716dce46fcf853831fdfb82cd7025a7d699ad8750d746278b7c339540e4fdf94
                                                                                                • Instruction ID: 94dbf71e515e86baf8dc3aca531a2dfa5bb98cb0d8d0b8008691eb6ee063d2a5
                                                                                                • Opcode Fuzzy Hash: 716dce46fcf853831fdfb82cd7025a7d699ad8750d746278b7c339540e4fdf94
                                                                                                • Instruction Fuzzy Hash: 0C51E0B4A017498FDB04CF64D845BAEBBB0FF45318F14822CE91A6BB90E731A945CF91
                                                                                                APIs
                                                                                                  • Part of subcall function 6C36B51D: std::invalid_argument::invalid_argument.LIBCONCRT ref: 6C36B529
                                                                                                • _strlen.LIBCMT ref: 6C352718
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlenstd::invalid_argument::invalid_argument
                                                                                                • String ID: Y.5l$ios_base::badbit set$string too long
                                                                                                • API String ID: 4097767454-873314978
                                                                                                • Opcode ID: 1763c5afea24cbb33d808690f29f8b6a78befe3bd99690b27de8db0d798a7ff4
                                                                                                • Instruction ID: 3f55d453845cfc7e33c29bbf1497e72086df5fcfe5043ee3db40fb15b148b7f6
                                                                                                • Opcode Fuzzy Hash: 1763c5afea24cbb33d808690f29f8b6a78befe3bd99690b27de8db0d798a7ff4
                                                                                                • Instruction Fuzzy Hash: 2141D5B2C002589FCB10CFA4DD84BDEBBB9EF48314F550225E844A7B41E3369958CFA1
                                                                                                APIs
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 03D384C9
                                                                                                  • Part of subcall function 03D3EF86: std::exception::exception.LIBCMT ref: 03D3EF9B
                                                                                                  • Part of subcall function 03D3EF86: __CxxThrowException@8.LIBCMT ref: 03D3EFB0
                                                                                                  • Part of subcall function 03D3EF86: std::exception::exception.LIBCMT ref: 03D3EFC1
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 03D384E7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw
                                                                                                • String ID: invalid string position$string too long
                                                                                                • API String ID: 963545896-4289949731
                                                                                                • Opcode ID: fde69f5cdb59c3d20491ba3f2f7db4ddb40761d4284ad0326eb1ebe93cddaab1
                                                                                                • Instruction ID: 832aa1fde6a11f6e07e9f6098e098987460c3152bbc89ada476c279a3a876744
                                                                                                • Opcode Fuzzy Hash: fde69f5cdb59c3d20491ba3f2f7db4ddb40761d4284ad0326eb1ebe93cddaab1
                                                                                                • Instruction Fuzzy Hash: B9217F76700306AF8B14DF6CE880C59B3AAFF893147144669F916CB641EB70EE58C7A1
                                                                                                APIs
                                                                                                • __current_exception.VCRUNTIME140 ref: 00E017AF
                                                                                                • __current_exception_context.VCRUNTIME140 ref: 00E017B9
                                                                                                • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E017C0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3556290818.0000000000E01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00E00000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3556263696.0000000000E00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556319323.0000000000E02000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556351733.0000000000E03000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556384480.0000000000E04000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556384480.0000000000E46000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_e00000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __current_exception__current_exception_contextterminate
                                                                                                • String ID: csm
                                                                                                • API String ID: 2542180945-1018135373
                                                                                                • Opcode ID: 41fdafd931ad9aaddf137b82d0d58c14b10d2b972e8e795f6593ee17b9bb6dd7
                                                                                                • Instruction ID: a205a7f81fb782ca9f7a20a1a7ea7d579afcc716d66cf7aa909ee3f18c238d11
                                                                                                • Opcode Fuzzy Hash: 41fdafd931ad9aaddf137b82d0d58c14b10d2b972e8e795f6593ee17b9bb6dd7
                                                                                                • Instruction Fuzzy Hash: 79F082354002008FCB345E29948551DB7ADAEA336539C24D7F484AFA90CB70EDD1C6D1
                                                                                                APIs
                                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,6C383F2D,?,?,00000000,?,?,?,6C383DEB,00000002,FlsGetValue,6C3917C4,6C3917CC), ref: 6C383E9E
                                                                                                • GetLastError.KERNEL32(?,6C383F2D,?,?,00000000,?,?,?,6C383DEB,00000002,FlsGetValue,6C3917C4,6C3917CC,?,?,6C3793D1), ref: 6C383EA8
                                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,?,?), ref: 6C383ED0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: LibraryLoad$ErrorLast
                                                                                                • String ID: api-ms-
                                                                                                • API String ID: 3177248105-2084034818
                                                                                                • Opcode ID: a2892f4408eda00a6e5507c7a085ba52eecf1f2e5c5cfb5d8456330cf6382c09
                                                                                                • Instruction ID: dfa7250df6c720a3a2cadedad7edc00ec9ee5f3bad4ef4144c0febaf2264b878
                                                                                                • Opcode Fuzzy Hash: a2892f4408eda00a6e5507c7a085ba52eecf1f2e5c5cfb5d8456330cf6382c09
                                                                                                • Instruction Fuzzy Hash: 9FE04F32386208BBEF511E61DC0AB993B79AB02B45F208420FA0CE9DD1E763F5109E94
                                                                                                APIs
                                                                                                • AcquireSRWLockExclusive.KERNEL32(6C39C354,G.5l,?,6C352362,6C39C244,?,00000001,?,?,?,?,?,?,?), ref: 6C36AAE9
                                                                                                • ReleaseSRWLockExclusive.KERNEL32(6C39C354,?,6C352362,6C39C244,?,00000001,?,?,?,?,?,?,?), ref: 6C36AB1C
                                                                                                • WakeAllConditionVariable.KERNEL32(6C39C350,?,6C352362,6C39C244,?,00000001,?,?,?,?,?,?,?), ref: 6C36AB27
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExclusiveLock$AcquireConditionReleaseVariableWake
                                                                                                • String ID: G.5l
                                                                                                • API String ID: 1466638765-4083235767
                                                                                                • Opcode ID: 219e4b7e9a0fdd73e2db63af583defdbc9511ec813f9851a9777c88b9c8922b1
                                                                                                • Instruction ID: b9ceb2ea86b2f953cc52bf83401859594b78292762c770a51dc092e84380229c
                                                                                                • Opcode Fuzzy Hash: 219e4b7e9a0fdd73e2db63af583defdbc9511ec813f9851a9777c88b9c8922b1
                                                                                                • Instruction Fuzzy Hash: A5F0ED75701650DFCB15EF58E588D6477BDFB0B314B05405AF90987741EB366801CF95
                                                                                                APIs
                                                                                                • IsBadReadPtr.KERNEL32(?,00000014), ref: 03D3D868
                                                                                                • IsBadReadPtr.KERNEL32(?,00000014), ref: 03D3D938
                                                                                                • SetLastError.KERNEL32(0000007F), ref: 03D3D963
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Read$ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 2715074504-0
                                                                                                • Opcode ID: 48f84403086f8c57697d738f9e4e929390e18b66b829cd649c7dc3eeb64877f9
                                                                                                • Instruction ID: 3dc918b1a17d396217b47410ceb71243eb6e1fff20e47a781b16efe49e7e55c2
                                                                                                • Opcode Fuzzy Hash: 48f84403086f8c57697d738f9e4e929390e18b66b829cd649c7dc3eeb64877f9
                                                                                                • Instruction Fuzzy Hash: C1419CB1A00209ABDB10CF99D880B6AF3FAFF89714F1885A9D84997350D770F911CFA0
                                                                                                APIs
                                                                                                • GetConsoleOutputCP.KERNEL32(CDB86E77,00000000,00000000,?), ref: 6C381629
                                                                                                  • Part of subcall function 6C37A751: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6C37D550,?,00000000,-00000008), ref: 6C37A7B2
                                                                                                • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6C38187B
                                                                                                • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6C3818C1
                                                                                                • GetLastError.KERNEL32 ref: 6C381964
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                                • String ID:
                                                                                                • API String ID: 2112829910-0
                                                                                                • Opcode ID: 4e597b79ea5876224e06987a23c00c5d072e2d4d70eb5a4ef1ae4a47ec287d86
                                                                                                • Instruction ID: 72b072e3b534c21b16863f4c25605787d3801fda032215f8e833cc6d3eb132e5
                                                                                                • Opcode Fuzzy Hash: 4e597b79ea5876224e06987a23c00c5d072e2d4d70eb5a4ef1ae4a47ec287d86
                                                                                                • Instruction Fuzzy Hash: 3DD15B75E052489FCF05CFA8C880AEDBBB9EF09314F24416AE466AB741E731E945CF60
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AdjustPointer
                                                                                                • String ID:
                                                                                                • API String ID: 1740715915-0
                                                                                                • Opcode ID: b2884c0d2eb7cc42eb52e7cb7886c3140c0320c443fbae133d8977d77caa582a
                                                                                                • Instruction ID: fe0c9b9d5492327621a31a3c39e8847a840f2c341ff19aff095f438a93949593
                                                                                                • Opcode Fuzzy Hash: b2884c0d2eb7cc42eb52e7cb7886c3140c0320c443fbae133d8977d77caa582a
                                                                                                • Instruction Fuzzy Hash: BC51D072606706AFDF249F15C880BAA73B4EF45318F204729D85547A90E73AE844CFB9
                                                                                                APIs
                                                                                                • _strlen.LIBCMT ref: 6C3552FB
                                                                                                • Concurrency::cancel_current_task.LIBCPMT ref: 6C3553A7
                                                                                                • Concurrency::cancel_current_task.LIBCPMT ref: 6C3553B3
                                                                                                • Concurrency::cancel_current_task.LIBCPMT ref: 6C3553BF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Concurrency::cancel_current_task$_strlen
                                                                                                • String ID:
                                                                                                • API String ID: 3047427315-0
                                                                                                • Opcode ID: 89b9c0be83b5809f2fa7096451b2df44988ce7056f5b6246d86f2bf4ec770376
                                                                                                • Instruction ID: dd2206160a76f392eb2d6834ff5ead0feced2057045e9adc2e36ffa051740a79
                                                                                                • Opcode Fuzzy Hash: 89b9c0be83b5809f2fa7096451b2df44988ce7056f5b6246d86f2bf4ec770376
                                                                                                • Instruction Fuzzy Hash: B441E4B1C003888FDB10CFA4D841B9EBBB4AF05318F084529E4995BB51E7B5E618CFA2
                                                                                                APIs
                                                                                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 1000E459
                                                                                                • __isleadbyte_l.LIBCMT ref: 1000E48C
                                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?,?), ref: 1000E4BD
                                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?,?), ref: 1000E52B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                • String ID:
                                                                                                • API String ID: 3058430110-0
                                                                                                • Opcode ID: faff6b0e24b146ed5f76b5f803dc00f384076012b6a75b333959b6e0697892ea
                                                                                                • Instruction ID: 678bb179593d23e830fa626ca8f93fbb1acc7737e5ff7f739f33e090e4c13c79
                                                                                                • Opcode Fuzzy Hash: faff6b0e24b146ed5f76b5f803dc00f384076012b6a75b333959b6e0697892ea
                                                                                                • Instruction Fuzzy Hash: 9731AE71A042D6EFEB10CFA4C884AAD3BE6EF013D1B1585A9E4A4AB099D730DD40DB51
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6C354EA5
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6C354EC2
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6C354EE3
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6C354F79
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                                                • String ID:
                                                                                                • API String ID: 593203224-0
                                                                                                • Opcode ID: a45d4f1d03c7bf15de1660b860364b22fe0641a98a64314e83b8b6a1f7affcec
                                                                                                • Instruction ID: 2adf04b4143e9664c079350bd75afe8be770494e85e6c95285619d499dec94a7
                                                                                                • Opcode Fuzzy Hash: a45d4f1d03c7bf15de1660b860364b22fe0641a98a64314e83b8b6a1f7affcec
                                                                                                • Instruction Fuzzy Hash: 00417B71E002188FCF05DF99D844BEEB7B4FB09328F444229E8546BB50E736A964CF91
                                                                                                APIs
                                                                                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 03D4A5F6
                                                                                                • __isleadbyte_l.LIBCMT ref: 03D4A629
                                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,03D5FBA0,?,03D52564,00000000,?,?,?,?,03D5FBA0,03D52564), ref: 03D4A65A
                                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,03D5FBA0,00000001,03D52564,00000000,?,?,?,?,03D5FBA0,03D52564), ref: 03D4A6C8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                • String ID:
                                                                                                • API String ID: 3058430110-0
                                                                                                • Opcode ID: dfd5505b5dfa0bebef902232b624045d88e704a8e98c09da16138392f358648b
                                                                                                • Instruction ID: 938bf7c38b6b36f402712b50a21362ebb994e762a672cca5445d81e438bbd9b7
                                                                                                • Opcode Fuzzy Hash: dfd5505b5dfa0bebef902232b624045d88e704a8e98c09da16138392f358648b
                                                                                                • Instruction Fuzzy Hash: EF31B071A40356EFDB21DFA4C890ABE7BB9FF01711F1985A9E4618B191E730DD40CB50
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6C352EE5
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6C352EFF
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6C352F20
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6C352FF5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                                                • String ID:
                                                                                                • API String ID: 593203224-0
                                                                                                • Opcode ID: 95dce12b872f25db8ffbfaefc8a7524f2f370ef02c66e19a653af73aba41d10e
                                                                                                • Instruction ID: ff9234dd6920c9b76fd976377e65a547065a2ddb5e03e18698411ea60588fc71
                                                                                                • Opcode Fuzzy Hash: 95dce12b872f25db8ffbfaefc8a7524f2f370ef02c66e19a653af73aba41d10e
                                                                                                • Instruction Fuzzy Hash: 87416971E002248FCB10DF95D554BDEB7B4FF49B18F448219D899ABB90E736A904CF92
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6C35CBA5
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6C35CBBF
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6C35CBE0
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6C35CCB5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                                                • String ID:
                                                                                                • API String ID: 593203224-0
                                                                                                • Opcode ID: 02f39ec4259e6628810387b443888688627abdc2bc4b3051ba457f3448739ad6
                                                                                                • Instruction ID: 5ffdffd3028850dd641bff58f1a5b39303bf30b5b275ea290525c4636c5d3285
                                                                                                • Opcode Fuzzy Hash: 02f39ec4259e6628810387b443888688627abdc2bc4b3051ba457f3448739ad6
                                                                                                • Instruction Fuzzy Hash: EA417971E002188FCF00EF98D550B9EB7B4FF48B18F444119D899ABB80E736A945CFA2
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6C35B515
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6C35B52F
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6C35B550
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6C35B625
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                                                • String ID:
                                                                                                • API String ID: 593203224-0
                                                                                                • Opcode ID: 326f9aa1faa9b4b9c6ba08e4ea9d597f37fcb053945753ba1f3f5f8be94ba448
                                                                                                • Instruction ID: 3e4f7013c694309beada06de8ee59bdf9a7c4d325987b564efe71db0f0cef017
                                                                                                • Opcode Fuzzy Hash: 326f9aa1faa9b4b9c6ba08e4ea9d597f37fcb053945753ba1f3f5f8be94ba448
                                                                                                • Instruction Fuzzy Hash: 0A415871E002188FDF14DF95D450BAEBBB4FF45718F844219D899ABB84EB36A904CF92
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: lstrlen$_memset
                                                                                                • String ID:
                                                                                                • API String ID: 2425037729-0
                                                                                                • Opcode ID: c82cf4ed43a9dd9f8bff1359099ded3c00e2078c96f9a5af5af153413db0c827
                                                                                                • Instruction ID: b5eee58a7e9b504861b41addb2eb32b71beede9eb410df191f9db988f3f0178b
                                                                                                • Opcode Fuzzy Hash: c82cf4ed43a9dd9f8bff1359099ded3c00e2078c96f9a5af5af153413db0c827
                                                                                                • Instruction Fuzzy Hash: 8C21F876B002089BCF14DE68DC809FEB3A9EBC5B20B29406DFD0987601F771DD6996A0
                                                                                                APIs
                                                                                                  • Part of subcall function 6C37A751: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6C37D550,?,00000000,-00000008), ref: 6C37A7B2
                                                                                                • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 6C37F6C9
                                                                                                • __dosmaperr.LIBCMT ref: 6C37F6D0
                                                                                                • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000), ref: 6C37F70A
                                                                                                • __dosmaperr.LIBCMT ref: 6C37F711
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                                • String ID:
                                                                                                • API String ID: 1913693674-0
                                                                                                • Opcode ID: 6cfb3b808bafebfcc401d42a6af3781a0c2d7bcd1f73aa7228cde1c40e000203
                                                                                                • Instruction ID: 615986eca1b7f1c26acb208682955722044f7e4ba74887ffe9f320dd33c0881e
                                                                                                • Opcode Fuzzy Hash: 6cfb3b808bafebfcc401d42a6af3781a0c2d7bcd1f73aa7228cde1c40e000203
                                                                                                • Instruction Fuzzy Hash: 6A218371604245AFDB309FA6CC8499AB7BDFF093AC7048619E85497B50E73AEC108F79
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 320c949b8fc211e69c6a920fb377696dd2d880cd4efc4bd1db6d4879c7e8a3fd
                                                                                                • Instruction ID: ca8d0a599ceed4892aa4f53c595e5470b88dd8ce6856e71de3950070b133466b
                                                                                                • Opcode Fuzzy Hash: 320c949b8fc211e69c6a920fb377696dd2d880cd4efc4bd1db6d4879c7e8a3fd
                                                                                                • Instruction Fuzzy Hash: 64218032204206BB8B10AF678C84A8A77FDAF0A36C7148615E856D7F44EB32DC00CF61
                                                                                                APIs
                                                                                                • GetEnvironmentStringsW.KERNEL32 ref: 6C380C90
                                                                                                  • Part of subcall function 6C37A751: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6C37D550,?,00000000,-00000008), ref: 6C37A7B2
                                                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6C380CC8
                                                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6C380CE8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                                • String ID:
                                                                                                • API String ID: 158306478-0
                                                                                                • Opcode ID: 1a16e369bb25be90d6e766cd540d3c1c844e8e0b31ee07c1b7bc7b2a57b1fc39
                                                                                                • Instruction ID: 0a93b9cc4cbd7adea4104a3d015d2e85dc85d02f82fcdd64a24f525ba3d94fc0
                                                                                                • Opcode Fuzzy Hash: 1a16e369bb25be90d6e766cd540d3c1c844e8e0b31ee07c1b7bc7b2a57b1fc39
                                                                                                • Instruction Fuzzy Hash: FC11D6B26075597FA7112BB68C8DCAF69BCCF4A29C3101115F801D1600FF79ED048D76
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,-00000A64,?,00000000,?,6C360BAE,?), ref: 6C3607C6
                                                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,?,?,?,?), ref: 6C360803
                                                                                                • WideCharToMultiByte.KERNEL32 ref: 6C360833
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 6C360862
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide
                                                                                                • String ID:
                                                                                                • API String ID: 626452242-0
                                                                                                • Opcode ID: 0ff682b2a20d65e405d3e0ed312c9b866b415eb74f7b711ff6009e1aa6420377
                                                                                                • Instruction ID: ebc8e8249b05f8e789a5007d179937e4b0fc6a445cc2671ada0ed61a1161a838
                                                                                                • Opcode Fuzzy Hash: 0ff682b2a20d65e405d3e0ed312c9b866b415eb74f7b711ff6009e1aa6420377
                                                                                                • Instruction Fuzzy Hash: D5112E717443047BF7105F219C09F573AACDB87778F150715F6685A2D0FB75A9088AA2
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000139F), ref: 100043EC
                                                                                                  • Part of subcall function 100013A0: HeapAlloc.KERNEL32(00000000,00000000,?,?,?,?), ref: 100013CB
                                                                                                  • Part of subcall function 10004C50: HeapFree.KERNEL32(?,00000000,?,00000000,10004E35,?,100042C8,10004E35,00000000,?,00000001,10004E35,?), ref: 10004C77
                                                                                                • SetLastError.KERNEL32(00000000,?), ref: 100043D7
                                                                                                • SetLastError.KERNEL32(00000057), ref: 10004401
                                                                                                • WSAGetLastError.WS2_32(?), ref: 10004410
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$Heap$AllocFree
                                                                                                • String ID:
                                                                                                • API String ID: 1906775185-0
                                                                                                • Opcode ID: 127eb3da1a419b9376193c7e08546e54e028199608b7fbb35670fae08a1c63d3
                                                                                                • Instruction ID: af902972c3ae3a33560ac4961c645c5895ff77c926fb996934c7b8e77325769a
                                                                                                • Opcode Fuzzy Hash: 127eb3da1a419b9376193c7e08546e54e028199608b7fbb35670fae08a1c63d3
                                                                                                • Instruction Fuzzy Hash: CA11CA76B055289BE700DFA9E8845DEB7A8EF883B2B0541B6FD0CD7204DA35DD0546D4
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000139F), ref: 03D343EC
                                                                                                  • Part of subcall function 03D313A0: HeapAlloc.KERNEL32(00000000,00000000,?,?,?,?), ref: 03D313CB
                                                                                                  • Part of subcall function 03D341E0: EnterCriticalSection.KERNEL32(03D34FB5,03D34E55,03D342BE,00000000,?,?,03D34E55,?,?,?,?,00000000,000000FF), ref: 03D341E8
                                                                                                  • Part of subcall function 03D341E0: LeaveCriticalSection.KERNEL32(03D34FB5,?,?,?,00000000,000000FF), ref: 03D341F6
                                                                                                  • Part of subcall function 03D34C70: HeapFree.KERNEL32(?,00000000,?,00000000,03D34E55,?,03D342C8,03D34E55,00000000,?,?,03D34E55,?), ref: 03D34C97
                                                                                                • SetLastError.KERNEL32(00000000,?), ref: 03D343D7
                                                                                                • SetLastError.KERNEL32(00000057), ref: 03D34401
                                                                                                • WSAGetLastError.WS2_32(?), ref: 03D34410
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$CriticalHeapSection$AllocEnterFreeLeave
                                                                                                • String ID:
                                                                                                • API String ID: 2060118545-0
                                                                                                • Opcode ID: 9739e87d5bbd74516c5c7fb5a0309c9ff7f1457d9aed7f5037284b07a9b65177
                                                                                                • Instruction ID: 357687e8c66cdd02485819aa36ec39560f2ef738a61ec3668cc498249e8fa92d
                                                                                                • Opcode Fuzzy Hash: 9739e87d5bbd74516c5c7fb5a0309c9ff7f1457d9aed7f5037284b07a9b65177
                                                                                                • Instruction Fuzzy Hash: 5411A33BE056189B9710FE7AF8845DEB7A8EF85722B0845AAEC0CD7200E6359E0546E1
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 03D3DE93
                                                                                                • _free.LIBCMT ref: 03D3DED5
                                                                                                • GetProcessHeap.KERNEL32(00000000,00000000,03D3DC95), ref: 03D3DEFC
                                                                                                • HeapFree.KERNEL32(00000000), ref: 03D3DF03
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Heap_free$FreeProcess
                                                                                                • String ID:
                                                                                                • API String ID: 1072109031-0
                                                                                                • Opcode ID: c4a63ec683f3afac98e3cf20c79ccac8eff858e5ff9b142854cf5060e2825afd
                                                                                                • Instruction ID: 3ee77c54b81b44a1cae70b572423e4257ebec68869481dfc638aada77530823f
                                                                                                • Opcode Fuzzy Hash: c4a63ec683f3afac98e3cf20c79ccac8eff858e5ff9b142854cf5060e2825afd
                                                                                                • Instruction Fuzzy Hash: 93115B756417009FD730DB64CC45B27B3AABB85B10F18891CE59A97A90D774F842CFA1
                                                                                                APIs
                                                                                                • WSAEventSelect.WS2_32(10003ABB,00000001,00000023), ref: 10003C02
                                                                                                • WSAGetLastError.WS2_32 ref: 10003C0D
                                                                                                • send.WS2_32(00000001,00000000,00000000,00000000), ref: 10003C58
                                                                                                • WSAGetLastError.WS2_32 ref: 10003C63
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$EventSelectsend
                                                                                                • String ID:
                                                                                                • API String ID: 259408233-0
                                                                                                • Opcode ID: 2fb520420096818f033348b16f08926af932f2b6a4c880f47cd01b5ee34dc08f
                                                                                                • Instruction ID: 2cb4a202ed201c3bbb9feb76d4ba786ae7603a0bc4fad51836a507335b835d1f
                                                                                                • Opcode Fuzzy Hash: 2fb520420096818f033348b16f08926af932f2b6a4c880f47cd01b5ee34dc08f
                                                                                                • Instruction Fuzzy Hash: 19116AB6600710ABE320CB79C8C8A47B7E9FB88750B014A2DE956C7690C732E8008B50
                                                                                                APIs
                                                                                                • WSAEventSelect.WS2_32(?,03D33ABB,00000023), ref: 03D33C02
                                                                                                • WSAGetLastError.WS2_32 ref: 03D33C0D
                                                                                                • send.WS2_32(?,00000000,00000000,00000000), ref: 03D33C58
                                                                                                • WSAGetLastError.WS2_32 ref: 03D33C63
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$EventSelectsend
                                                                                                • String ID:
                                                                                                • API String ID: 259408233-0
                                                                                                • Opcode ID: 2750fc36fc4fee70ce968cfba938431a2baa18494dc0d20d89f1d5925f7aaed9
                                                                                                • Instruction ID: 14fbe408c7dcae37a45f1da1e003a8ceeb60777822b5050a533513d6a7225068
                                                                                                • Opcode Fuzzy Hash: 2750fc36fc4fee70ce968cfba938431a2baa18494dc0d20d89f1d5925f7aaed9
                                                                                                • Instruction Fuzzy Hash: 9A115EBAA007009BD720DF79D988A57B6F9FB89B10F150A2DF566C7680DB35E800CB60
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                                • String ID:
                                                                                                • API String ID: 3016257755-0
                                                                                                • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                                                                • Instruction ID: 466f4f1e7ae25f0961f396d3557a49c78803b8d6a6677ae74fd306ec2772594f
                                                                                                • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                                                                • Instruction Fuzzy Hash: 08114E3640018AFBDF129E84CC41CEE3F62FB083A4B558419FE6859439C336DAB1BB81
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                                • String ID:
                                                                                                • API String ID: 3016257755-0
                                                                                                • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                                                                • Instruction ID: 94e7694aa9d3e371fc0d995a1b5445238152d83f09105b8aecd660e33bc33af1
                                                                                                • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                                                                • Instruction Fuzzy Hash: 4C114C3600014EBBCF169E94CC51CEE3F67BB68650B588866FA9859130C736C5B1AB91
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(03D34FB5,03D34E55,03D342BE,00000000,?,?,03D34E55,?,?,?,?,00000000,000000FF), ref: 03D341E8
                                                                                                • LeaveCriticalSection.KERNEL32(03D34FB5,?,?,?,00000000,000000FF), ref: 03D341F6
                                                                                                • LeaveCriticalSection.KERNEL32(03D34FB5), ref: 03D34257
                                                                                                • SetEvent.KERNEL32(8520468B), ref: 03D34272
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$Leave$EnterEvent
                                                                                                • String ID:
                                                                                                • API String ID: 3394196147-0
                                                                                                • Opcode ID: f34c4f6bc4e682b369259fa6a44d94cf8331d03ab92865795c9f1c10aa7571c8
                                                                                                • Instruction ID: e227b793f8ef302fc7bd3e98b6b2ea9bb3c2e875c77619e5bf1456e7826fb37e
                                                                                                • Opcode Fuzzy Hash: f34c4f6bc4e682b369259fa6a44d94cf8331d03ab92865795c9f1c10aa7571c8
                                                                                                • Instruction Fuzzy Hash: 811145B9604B049FC724CF75C584A96BBF9BF49300B54C96DE45E8B301EB34EA01CB00
                                                                                                APIs
                                                                                                • timeGetTime.WINMM(00000001,?,00000001,?,10003C4F,?,?,00000001), ref: 10004AF5
                                                                                                • InterlockedIncrement.KERNEL32(?), ref: 10004B04
                                                                                                • InterlockedIncrement.KERNEL32(?), ref: 10004B11
                                                                                                • timeGetTime.WINMM(?,00000001,?,10003C4F,?,?,00000001), ref: 10004B28
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: IncrementInterlockedTimetime
                                                                                                • String ID:
                                                                                                • API String ID: 159728177-0
                                                                                                • Opcode ID: ecc8ba4fb7d149bb0e17cd39b255899764ae90b27ed04fa3fbe9ab010b97b0d8
                                                                                                • Instruction ID: 0a1d15bd5f988d4bea10877f224db5579cb700bf5039280ae9249a62ae1a06e8
                                                                                                • Opcode Fuzzy Hash: ecc8ba4fb7d149bb0e17cd39b255899764ae90b27ed04fa3fbe9ab010b97b0d8
                                                                                                • Instruction Fuzzy Hash: E20116B5601705AFD720DFBAC88098AFBF9EF4C650701892EE549CB611E771EA448FE0
                                                                                                APIs
                                                                                                • timeGetTime.WINMM(00000001,?,00000001,?,03D33C4F,?,?,00000001), ref: 03D34B15
                                                                                                • InterlockedIncrement.KERNEL32(00000001), ref: 03D34B24
                                                                                                • InterlockedIncrement.KERNEL32(00000001), ref: 03D34B31
                                                                                                • timeGetTime.WINMM(?,03D33C4F,?,?,00000001), ref: 03D34B48
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: IncrementInterlockedTimetime
                                                                                                • String ID:
                                                                                                • API String ID: 159728177-0
                                                                                                • Opcode ID: ada15f5589eaaadfb53b1b7630fb8a052695c8ba67156ca8add3795932f7e0a9
                                                                                                • Instruction ID: 0d13af5faaffdeb032acd021d5b08e1cdd1c72a8ea84eceaa1f05f8cfe1e5c4d
                                                                                                • Opcode Fuzzy Hash: ada15f5589eaaadfb53b1b7630fb8a052695c8ba67156ca8add3795932f7e0a9
                                                                                                • Instruction Fuzzy Hash: F701C8B66007059FC760EF6AD88094AFBF9EF59650700892EE549C7710E674EA448FA0
                                                                                                APIs
                                                                                                • CreateWaitableTimerW.KERNEL32(00000000,00000000,00000000), ref: 10003667
                                                                                                • _free.LIBCMT ref: 1000369C
                                                                                                  • Part of subcall function 10006E49: HeapFree.KERNEL32(00000000,00000000,?,10009900,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F), ref: 10006E5F
                                                                                                  • Part of subcall function 10006E49: GetLastError.KERNEL32(00000000,?,10009900,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000), ref: 10006E71
                                                                                                • _malloc.LIBCMT ref: 100036D7
                                                                                                • _memset.LIBCMT ref: 100036E5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateErrorFreeHeapLastTimerWaitable_free_malloc_memset
                                                                                                • String ID:
                                                                                                • API String ID: 3340475617-0
                                                                                                • Opcode ID: 391cc94a781e731dd4c35f2c6748f9c6c817e77f81a08f70d75bdfa6bee01c3e
                                                                                                • Instruction ID: 20f9dc9dccf48a4f32705b4407c0702e844904f7cd1830b54ea69625ce22a711
                                                                                                • Opcode Fuzzy Hash: 391cc94a781e731dd4c35f2c6748f9c6c817e77f81a08f70d75bdfa6bee01c3e
                                                                                                • Instruction Fuzzy Hash: 8401DEF5900B44DFE360CF7AD881B97B7E9EB45254F11882EE5AE87302DA31A8048F60
                                                                                                APIs
                                                                                                • CreateWaitableTimerW.KERNEL32(00000000,00000000,00000000), ref: 03D33667
                                                                                                • _free.LIBCMT ref: 03D3369C
                                                                                                  • Part of subcall function 03D3F639: RtlFreeHeap.NTDLL(00000000,00000000,?,03D43E4C,00000000,?,03D44500,00000000,00000001,00000000,?,03D48DE6,00000018,03D56448,0000000C,03D48E76), ref: 03D3F64F
                                                                                                  • Part of subcall function 03D3F639: GetLastError.KERNEL32(00000000,?,03D43E4C,00000000,?,03D44500,00000000,00000001,00000000,?,03D48DE6,00000018,03D56448,0000000C,03D48E76,00000000), ref: 03D3F661
                                                                                                • _malloc.LIBCMT ref: 03D336D7
                                                                                                • _memset.LIBCMT ref: 03D336E5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateErrorFreeHeapLastTimerWaitable_free_malloc_memset
                                                                                                • String ID:
                                                                                                • API String ID: 3340475617-0
                                                                                                • Opcode ID: b039a63549e92509bca327c131f49f04ccd9ce727bba74ace8857d8511f59d27
                                                                                                • Instruction ID: b079f537a5d6d5c9fb1a733a624a9d46f6c4b03176b71ca5b9288baab7652800
                                                                                                • Opcode Fuzzy Hash: b039a63549e92509bca327c131f49f04ccd9ce727bba74ace8857d8511f59d27
                                                                                                • Instruction Fuzzy Hash: A901DAF5940B04DFE360DF7A9881B97BBE9EB86214F14482ED5AE87301D630A8058F20
                                                                                                APIs
                                                                                                  • Part of subcall function 10001420: HeapFree.KERNEL32(?,00000000,?,?,?,100040B1,?,00000000,10004039,?,74DEDFA0,10003648), ref: 1000143D
                                                                                                  • Part of subcall function 10001420: _free.LIBCMT ref: 10001459
                                                                                                • HeapDestroy.KERNEL32(00000000), ref: 100064A3
                                                                                                • HeapCreate.KERNEL32(?,?,?), ref: 100064B5
                                                                                                • _free.LIBCMT ref: 100064C5
                                                                                                • HeapDestroy.KERNEL32 ref: 100064F2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Heap$Destroy_free$CreateFree
                                                                                                • String ID:
                                                                                                • API String ID: 4097506873-0
                                                                                                • Opcode ID: 93927da24fa2970c59e2ba275e76658273f805c74c1ab82e82c9513be7b43463
                                                                                                • Instruction ID: e941b2b67b7b789b38fb12685925c4a960f3707d906db07a4445c0daadc26747
                                                                                                • Opcode Fuzzy Hash: 93927da24fa2970c59e2ba275e76658273f805c74c1ab82e82c9513be7b43463
                                                                                                • Instruction Fuzzy Hash: 28F032B9600702ABE710CF65D848B53B7FAFF88791F218528E86987244DB35F851CBA0
                                                                                                APIs
                                                                                                  • Part of subcall function 03D31420: HeapFree.KERNEL32(?,00000000,?,?,?,03D340B1,?,00000000,03D34039,?,74DEDFA0,03D33648), ref: 03D3143D
                                                                                                  • Part of subcall function 03D31420: _free.LIBCMT ref: 03D31459
                                                                                                • HeapDestroy.KERNEL32(00000000), ref: 03D3CD93
                                                                                                • HeapCreate.KERNEL32(?,?,?), ref: 03D3CDA5
                                                                                                • _free.LIBCMT ref: 03D3CDB5
                                                                                                • HeapDestroy.KERNEL32 ref: 03D3CDE2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Heap$Destroy_free$CreateFree
                                                                                                • String ID:
                                                                                                • API String ID: 4097506873-0
                                                                                                • Opcode ID: 49828bcd7bc66f7b9de45a8eae37c39433611b0ca6b77ab3d06efd6f1c227005
                                                                                                • Instruction ID: f80d3d282a7b42f7e7ec166861fbae2784eb5fd5d58dd5fafe84aef453f1be8c
                                                                                                • Opcode Fuzzy Hash: 49828bcd7bc66f7b9de45a8eae37c39433611b0ca6b77ab3d06efd6f1c227005
                                                                                                • Instruction Fuzzy Hash: 6DF049BA100702ABD710EF24E808B63FBB8FF85B50F144919E859DB740DB34E955CBA0
                                                                                                APIs
                                                                                                • WriteConsoleW.KERNEL32(00000000,6C3807FB,00000000,00000000,00000000,?,6C38A519,00000000,00000001,00000000,?,?,6C3819B8,?,00000000,00000000), ref: 6C38B20E
                                                                                                • GetLastError.KERNEL32(?,6C38A519,00000000,00000001,00000000,?,?,6C3819B8,?,00000000,00000000,?,?,?,6C3812FE,?), ref: 6C38B21A
                                                                                                  • Part of subcall function 6C38B26B: CloseHandle.KERNEL32(FFFFFFFE,6C38B22A,?,6C38A519,00000000,00000001,00000000,?,?,6C3819B8,?,00000000,00000000,?,?), ref: 6C38B27B
                                                                                                • ___initconout.LIBCMT ref: 6C38B22A
                                                                                                  • Part of subcall function 6C38B24C: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6C38B1E8,6C38A506,?,?,6C3819B8,?,00000000,00000000,?), ref: 6C38B25F
                                                                                                • WriteConsoleW.KERNEL32(00000000,6C3807FB,00000000,00000000,?,6C38A519,00000000,00000001,00000000,?,?,6C3819B8,?,00000000,00000000,?), ref: 6C38B23F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                                • String ID:
                                                                                                • API String ID: 2744216297-0
                                                                                                • Opcode ID: ab0e4659e59ed8bd99a425d241b14a49ef6155e9c364b9270129be4b0ec422a9
                                                                                                • Instruction ID: ecfacaff163ad78d7eeb0ea437169f778c315373fb173cd99b9328328cc59dbc
                                                                                                • Opcode Fuzzy Hash: ab0e4659e59ed8bd99a425d241b14a49ef6155e9c364b9270129be4b0ec422a9
                                                                                                • Instruction Fuzzy Hash: 03F0AC36605115BBCF122FA5DC0998E7F7AFB0B3A9B454111FA1899560D73389209FD1
                                                                                                APIs
                                                                                                • ReadConsoleInputW.KERNEL32(0000000C,6C399D90,6C373444,00000000,?,6C3734C8,00000000,00000001,?,6C399DB0,00000038,6C373444,6C399D90,0000000C,6C351B30), ref: 6C380A9D
                                                                                                • GetLastError.KERNEL32(?,6C3734C8,00000000,00000001,?,6C399DB0,00000038,6C373444,6C399D90,0000000C,6C351B30), ref: 6C380AA9
                                                                                                  • Part of subcall function 6C380C1D: CloseHandle.KERNEL32(FFFFFFFF,6C380B05,?,6C3736DC,0000000C,66666667,?,?,6C3733F4,6C399D70,0000000C,6C351B27), ref: 6C380C2D
                                                                                                • ___initconin.LIBCMT ref: 6C380AB9
                                                                                                  • Part of subcall function 6C380BFE: CreateFileW.KERNEL32(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C380A79,6C3736CB,66666667,?,?,6C3733F4,6C399D70,0000000C,6C351B27), ref: 6C380C11
                                                                                                • ReadConsoleInputW.KERNEL32(0000000C,6C399D90,6C373444,?,6C3734C8,00000000,00000001,?,6C399DB0,00000038,6C373444,6C399D90,0000000C,6C351B30), ref: 6C380ACD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConsoleInputRead$CloseCreateErrorFileHandleLast___initconin
                                                                                                • String ID:
                                                                                                • API String ID: 838051604-0
                                                                                                • Opcode ID: fe83a6ede68fa075988afcf0d3c659fe3afa275578876a7e650e5173e856e38a
                                                                                                • Instruction ID: 3ea118ed41e9bf695525ec69f2f75acb3109866cbdaabdaafbe4035e128f9354
                                                                                                • Opcode Fuzzy Hash: fe83a6ede68fa075988afcf0d3c659fe3afa275578876a7e650e5173e856e38a
                                                                                                • Instruction Fuzzy Hash: A7F03036103058BBCF122FD5CC049E93F7AFB4A364B054050FE28A6220EB37C8209F81
                                                                                                APIs
                                                                                                • GetSystemTimeAsFileTime.KERNEL32(00000001), ref: 6C36D1D9
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 6C36D1E8
                                                                                                • GetCurrentProcessId.KERNEL32 ref: 6C36D1F1
                                                                                                • QueryPerformanceCounter.KERNEL32(?), ref: 6C36D1FE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                • String ID:
                                                                                                • API String ID: 2933794660-0
                                                                                                • Opcode ID: 7c888f0824c5de01cf898d49028607955329e546d115220a57ce9fac82c63dfb
                                                                                                • Instruction ID: 5b360878183620c1387ccbeb55e236ec30f43e982f4ae47b35806150e3851bb8
                                                                                                • Opcode Fuzzy Hash: 7c888f0824c5de01cf898d49028607955329e546d115220a57ce9fac82c63dfb
                                                                                                • Instruction Fuzzy Hash: 82F05F74D1020DEBCF00DFB4C64999EBBF8EF1E200B914596A412E6140E630AA44DF50
                                                                                                APIs
                                                                                                • GetNumberOfConsoleInputEvents.KERNEL32(?,?,?,6C3736DC,0000000C,66666667,?,?,6C3733F4,6C399D70,0000000C,6C351B27), ref: 6C380AE9
                                                                                                • GetLastError.KERNEL32(?,6C3736DC,0000000C,66666667,?,?,6C3733F4,6C399D70,0000000C,6C351B27), ref: 6C380AF5
                                                                                                  • Part of subcall function 6C380C1D: CloseHandle.KERNEL32(FFFFFFFF,6C380B05,?,6C3736DC,0000000C,66666667,?,?,6C3733F4,6C399D70,0000000C,6C351B27), ref: 6C380C2D
                                                                                                • ___initconin.LIBCMT ref: 6C380B05
                                                                                                  • Part of subcall function 6C380BFE: CreateFileW.KERNEL32(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C380A79,6C3736CB,66666667,?,?,6C3733F4,6C399D70,0000000C,6C351B27), ref: 6C380C11
                                                                                                • GetNumberOfConsoleInputEvents.KERNEL32(?,?,6C3736DC,0000000C,66666667,?,?,6C3733F4,6C399D70,0000000C,6C351B27), ref: 6C380B13
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConsoleEventsInputNumber$CloseCreateErrorFileHandleLast___initconin
                                                                                                • String ID:
                                                                                                • API String ID: 1600138625-0
                                                                                                • Opcode ID: 6167f06320d74fcab8e1903f1cb06a849d20a66f3f4acc1d0ec177f331439040
                                                                                                • Instruction ID: c8fb313b5d6ef5d4a50c8e12be166dfe5a6ed5dd16620a2c4d452a85d2e9a13f
                                                                                                • Opcode Fuzzy Hash: 6167f06320d74fcab8e1903f1cb06a849d20a66f3f4acc1d0ec177f331439040
                                                                                                • Instruction Fuzzy Hash: 92E04F326061587B8F132FA9D8089C93E7DEB077A97450120F90993610EB23C850CFD1
                                                                                                APIs
                                                                                                • GetConsoleMode.KERNEL32(0000000C,?,?,6C3734A7,?,6C399DB0,00000038,6C373444,6C399D90,0000000C,6C351B30), ref: 6C380B81
                                                                                                • GetLastError.KERNEL32(?,6C3734A7,?,6C399DB0,00000038,6C373444,6C399D90,0000000C,6C351B30), ref: 6C380B8D
                                                                                                  • Part of subcall function 6C380C1D: CloseHandle.KERNEL32(FFFFFFFF,6C380B05,?,6C3736DC,0000000C,66666667,?,?,6C3733F4,6C399D70,0000000C,6C351B27), ref: 6C380C2D
                                                                                                • ___initconin.LIBCMT ref: 6C380B9D
                                                                                                  • Part of subcall function 6C380BFE: CreateFileW.KERNEL32(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C380A79,6C3736CB,66666667,?,?,6C3733F4,6C399D70,0000000C,6C351B27), ref: 6C380C11
                                                                                                • GetConsoleMode.KERNEL32(0000000C,?,6C3734A7,?,6C399DB0,00000038,6C373444,6C399D90,0000000C,6C351B30), ref: 6C380BAB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConsoleMode$CloseCreateErrorFileHandleLast___initconin
                                                                                                • String ID:
                                                                                                • API String ID: 3067319862-0
                                                                                                • Opcode ID: f5b3bfc959f535ddf46d3569375a2c0e365f5ce77ad21ae2606cbbf69ea4201e
                                                                                                • Instruction ID: 3bb8d116e6b1bc84af9a5bdcc714054d837613fad738a10ca96eaa60dcb0f6b3
                                                                                                • Opcode Fuzzy Hash: f5b3bfc959f535ddf46d3569375a2c0e365f5ce77ad21ae2606cbbf69ea4201e
                                                                                                • Instruction Fuzzy Hash: 2BE04F366062697B8F223F96D8199C93F79EB07BAD7050160F90993710EA23C851CFD1
                                                                                                APIs
                                                                                                • SetConsoleMode.KERNEL32(0000000C,00000000,?,6C3734AF,00000000,?,6C399DB0,00000038,6C373444,6C399D90,0000000C,6C351B30), ref: 6C380BC7
                                                                                                • GetLastError.KERNEL32(?,6C3734AF,00000000,?,6C399DB0,00000038,6C373444,6C399D90,0000000C,6C351B30), ref: 6C380BD3
                                                                                                  • Part of subcall function 6C380C1D: CloseHandle.KERNEL32(FFFFFFFF,6C380B05,?,6C3736DC,0000000C,66666667,?,?,6C3733F4,6C399D70,0000000C,6C351B27), ref: 6C380C2D
                                                                                                • ___initconin.LIBCMT ref: 6C380BE3
                                                                                                  • Part of subcall function 6C380BFE: CreateFileW.KERNEL32(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C380A79,6C3736CB,66666667,?,?,6C3733F4,6C399D70,0000000C,6C351B27), ref: 6C380C11
                                                                                                • SetConsoleMode.KERNEL32(0000000C,?,6C3734AF,00000000,?,6C399DB0,00000038,6C373444,6C399D90,0000000C,6C351B30), ref: 6C380BF1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConsoleMode$CloseCreateErrorFileHandleLast___initconin
                                                                                                • String ID:
                                                                                                • API String ID: 3067319862-0
                                                                                                • Opcode ID: 531041baf857d3ce39d7b6cc1d68b73e4ba721e855294b3438b5cec2eed51f48
                                                                                                • Instruction ID: 5f36002e5ddd050187f8df1acd28fe1423563b803657e141f567244ebf3d2996
                                                                                                • Opcode Fuzzy Hash: 531041baf857d3ce39d7b6cc1d68b73e4ba721e855294b3438b5cec2eed51f48
                                                                                                • Instruction Fuzzy Hash: 0DE0BF366471646B8F122FD5DC089D93E79EB477B97450160F90997610EA23C8909FD1
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __aulldiv
                                                                                                • String ID: -$0123456789abcdefghijklmnopqrstuvwxyz
                                                                                                • API String ID: 3732870572-1956417402
                                                                                                • Opcode ID: 9ae0cd0f19ab7aac5bc81fff766c41003aa5ed03cf0baebfaf7d5a05d0076354
                                                                                                • Instruction ID: 2b0ff100fa6cea58db5ed8fbe8270edfac6adfbb4292d8e629a7457fea985e16
                                                                                                • Opcode Fuzzy Hash: 9ae0cd0f19ab7aac5bc81fff766c41003aa5ed03cf0baebfaf7d5a05d0076354
                                                                                                • Instruction Fuzzy Hash: B3610670E442499FDB118E6BC4807AEBBF9AF4530CF244099F590EFE48D77589419F61
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __alloca_probe_16__freea
                                                                                                • String ID: gfff
                                                                                                • API String ID: 1635606685-1553575800
                                                                                                • Opcode ID: fb215a2d254c8aaa5eaa0ce01f524322453ae9e53b142db81232724c21c3e3f9
                                                                                                • Instruction ID: da28404dc71e1ac793f06dda4376921f9366ee1ba3487427511194449a2f82cf
                                                                                                • Opcode Fuzzy Hash: fb215a2d254c8aaa5eaa0ce01f524322453ae9e53b142db81232724c21c3e3f9
                                                                                                • Instruction Fuzzy Hash: FB315EB2A056919BCB708E69C88065FB7B89F4571CB210529C860D7E40E73FD5058FB9
                                                                                                APIs
                                                                                                • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,6C379FC8,?,?,00000000,00000000,00000000,?), ref: 6C37A0EC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: EncodePointer
                                                                                                • String ID: MOC$RCC
                                                                                                • API String ID: 2118026453-2084237596
                                                                                                • Opcode ID: 74876166b3b30da34ff77e0fb0ce76588c1b0a0962d87fe59a9053b4886f94c3
                                                                                                • Instruction ID: a2f44db02812177c2f3927921e9dcda52821277723543deaa9102376dd8677d2
                                                                                                • Opcode Fuzzy Hash: 74876166b3b30da34ff77e0fb0ce76588c1b0a0962d87fe59a9053b4886f94c3
                                                                                                • Instruction Fuzzy Hash: 95416871901209AFEF15CF94C880AEEBBB5FF48308F244159F91467651D33AD950DFA5
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6C3530E6
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6C353222
                                                                                                  • Part of subcall function 6C36B0F3: _Yarn.LIBCPMT ref: 6C36B113
                                                                                                  • Part of subcall function 6C36B0F3: _Yarn.LIBCPMT ref: 6C36B137
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: LockitYarnstd::_$Lockit::_Lockit::~_
                                                                                                • String ID: bad locale name
                                                                                                • API String ID: 2070049627-1405518554
                                                                                                • Opcode ID: d344264df1b64d7d64e26cc0d01610254629121dbda2ad7e1a388ba5ebd99e06
                                                                                                • Instruction ID: e8a84f3693d370a940f23702887cc0a2d8f32889d60c4fae6d9090ff02d5f42b
                                                                                                • Opcode Fuzzy Hash: d344264df1b64d7d64e26cc0d01610254629121dbda2ad7e1a388ba5ebd99e06
                                                                                                • Instruction Fuzzy Hash: 48413CF1A006459BEB10DF69D804B57BAF8BF04708F004528E4999BB40E37AE518CFE6
                                                                                                APIs
                                                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 6C379BAA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ___except_validate_context_record
                                                                                                • String ID: csm$csm
                                                                                                • API String ID: 3493665558-3733052814
                                                                                                • Opcode ID: 1cf300b58179cf41d951945e14d076bb32e9ceecc22e84eb1d7450c051c02caf
                                                                                                • Instruction ID: db1712fcb0bea52102d4764e2303730f8e1d53f7260b8fa8671084dbaf363d42
                                                                                                • Opcode Fuzzy Hash: 1cf300b58179cf41d951945e14d076bb32e9ceecc22e84eb1d7450c051c02caf
                                                                                                • Instruction Fuzzy Hash: 9431B47141431AAFCF329F51CC8099A3BA9FF09329B18435AFC5449520C33BC861DFAA
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: Y.5l$ios_base::badbit set
                                                                                                • API String ID: 4218353326-1301851943
                                                                                                • Opcode ID: f439333f6ff6cf16906ab3648569f5365b45e7ff09f59dda0341d6df1964763f
                                                                                                • Instruction ID: ef63d8aa9990eaabfeab94dbcc2fe3f757bed286d5ef40c9ce4e0afc4eeb206e
                                                                                                • Opcode Fuzzy Hash: f439333f6ff6cf16906ab3648569f5365b45e7ff09f59dda0341d6df1964763f
                                                                                                • Instruction Fuzzy Hash: F131A2B2D002589BDB10DFA4DD84BDEBBB5FF48324F540229E844A7781E3365A94CFA1
                                                                                                APIs
                                                                                                  • Part of subcall function 03D3BC70: GetDesktopWindow.USER32 ref: 03D3BC8F
                                                                                                  • Part of subcall function 03D3BC70: GetDC.USER32(00000000), ref: 03D3BC9C
                                                                                                  • Part of subcall function 03D3BC70: CreateCompatibleDC.GDI32(00000000), ref: 03D3BCA2
                                                                                                  • Part of subcall function 03D3BC70: GetDC.USER32(00000000), ref: 03D3BCAD
                                                                                                  • Part of subcall function 03D3BC70: GetDeviceCaps.GDI32(00000000,00000008), ref: 03D3BCBA
                                                                                                  • Part of subcall function 03D3BC70: GetDeviceCaps.GDI32(00000000,00000076), ref: 03D3BCC2
                                                                                                  • Part of subcall function 03D3BC70: ReleaseDC.USER32(00000000,00000000), ref: 03D3BCD3
                                                                                                  • Part of subcall function 03D3BC70: GetSystemMetrics.USER32(0000004C), ref: 03D3BD78
                                                                                                  • Part of subcall function 03D3BC70: GetSystemMetrics.USER32(0000004D), ref: 03D3BD8D
                                                                                                  • Part of subcall function 03D3BC70: CreateCompatibleBitmap.GDI32(?,?,00000000), ref: 03D3BDA6
                                                                                                  • Part of subcall function 03D3BC70: SelectObject.GDI32(?,00000000), ref: 03D3BDB4
                                                                                                  • Part of subcall function 03D3BC70: SetStretchBltMode.GDI32(?,00000003), ref: 03D3BDC0
                                                                                                  • Part of subcall function 03D3BC70: GetSystemMetrics.USER32(0000004F), ref: 03D3BDCD
                                                                                                  • Part of subcall function 03D3BC70: GetSystemMetrics.USER32(0000004E), ref: 03D3BDE0
                                                                                                  • Part of subcall function 03D3F707: _malloc.LIBCMT ref: 03D3F721
                                                                                                • _memset.LIBCMT ref: 03D3B1E1
                                                                                                • swprintf.LIBCMT ref: 03D3B204
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: MetricsSystem$CapsCompatibleCreateDevice$BitmapDesktopModeObjectReleaseSelectStretchWindow_malloc_memsetswprintf
                                                                                                • String ID: %s %s
                                                                                                • API String ID: 1028806752-581060391
                                                                                                • Opcode ID: b5392ec592fc09d24ffeb030a6afa8494c62c49a072f86717750b8cf39bdda0c
                                                                                                • Instruction ID: 6c358ae27bd3ac1ab702d7b9e7f94dc229a7c92f632bd8c3fdd0c8f9bb337630
                                                                                                • Opcode Fuzzy Hash: b5392ec592fc09d24ffeb030a6afa8494c62c49a072f86717750b8cf39bdda0c
                                                                                                • Instruction Fuzzy Hash: EC21B4B6904340ABD611EB65DC81E5FB7E8EFDA710F08052EF4895B241E661D908C7B3
                                                                                                APIs
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 03D39115
                                                                                                  • Part of subcall function 03D3EF39: std::exception::exception.LIBCMT ref: 03D3EF4E
                                                                                                  • Part of subcall function 03D3EF39: __CxxThrowException@8.LIBCMT ref: 03D3EF63
                                                                                                  • Part of subcall function 03D3EF39: std::exception::exception.LIBCMT ref: 03D3EF74
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 03D39128
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw
                                                                                                • String ID: string too long
                                                                                                • API String ID: 963545896-2556327735
                                                                                                • Opcode ID: 2545b8a5286953ea14ae6488629a1fa9406c5951f874ebbf4ae4a34aadd55d9b
                                                                                                • Instruction ID: 002137df32c62d742bac0a10e7a026e5a6ba0c6d7093a086cc26322c91efb791
                                                                                                • Opcode Fuzzy Hash: 2545b8a5286953ea14ae6488629a1fa9406c5951f874ebbf4ae4a34aadd55d9b
                                                                                                • Instruction Fuzzy Hash: A71190763047408BC321CE2CE814B1AB7E9EBA7A61F140A6AE5919B781C7B1DC09C3B4
                                                                                                APIs
                                                                                                • __CxxThrowException@8.LIBCMT ref: 03D3941D
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 03D3944A
                                                                                                Strings
                                                                                                • invalid string position, xrefs: 03D39445
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Exception@8ThrowXinvalid_argumentstd::_
                                                                                                • String ID: invalid string position
                                                                                                • API String ID: 3614006799-1799206989
                                                                                                • Opcode ID: b3f4398294c30fe8f6e8b4ad621c24dc8f8a496de32b09c44f52aa02ed9cf61a
                                                                                                • Instruction ID: aae800bf79d516978a1d02b641b6619a6ca336cffd240e9769b36c95aae3378d
                                                                                                • Opcode Fuzzy Hash: b3f4398294c30fe8f6e8b4ad621c24dc8f8a496de32b09c44f52aa02ed9cf61a
                                                                                                • Instruction Fuzzy Hash: E001F2336003045BC724EE78D89079AF39AEF42620F140A29F5629F680D7F1ED8483A4
                                                                                                APIs
                                                                                                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00E01AC2
                                                                                                • ___raise_securityfailure.LIBCMT ref: 00E01BAA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3556290818.0000000000E01000.00000020.00000001.01000000.00000005.sdmp, Offset: 00E00000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3556263696.0000000000E00000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556319323.0000000000E02000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556351733.0000000000E03000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556384480.0000000000E04000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3556384480.0000000000E46000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_e00000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                                                • String ID: 0
                                                                                                • API String ID: 3761405300-4015486719
                                                                                                • Opcode ID: cbcea1874721053ac6b2c0e4635107c00a9ca3643fbd05de90df007ab14e3b98
                                                                                                • Instruction ID: a4412e85e88a0a41f351c5aa2bd628330a6a5c951b2d43e64444e381bd186c46
                                                                                                • Opcode Fuzzy Hash: cbcea1874721053ac6b2c0e4635107c00a9ca3643fbd05de90df007ab14e3b98
                                                                                                • Instruction Fuzzy Hash: 6621B7B86122059ED314CF27E946A407BECBB0D314F10906AE959BA3A1E7B397C8CF44
                                                                                                APIs
                                                                                                • __output_l.LIBCMT ref: 03D3F815
                                                                                                  • Part of subcall function 03D3F91B: __getptd_noexit.LIBCMT ref: 03D3F91B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __getptd_noexit__output_l
                                                                                                • String ID: B
                                                                                                • API String ID: 2141734944-1255198513
                                                                                                • Opcode ID: 5bc75878e19a99f8b3291bc09011d637415e77d2edc72ea821797cd9c84227ee
                                                                                                • Instruction ID: 586b88d19c54552adac90d33f91c4ec4bd937514b3c567f6a28da6edc5e8002d
                                                                                                • Opcode Fuzzy Hash: 5bc75878e19a99f8b3291bc09011d637415e77d2edc72ea821797cd9c84227ee
                                                                                                • Instruction Fuzzy Hash: C0016DB5D0024DABDF00DFA5DC41AEEBBB8EB05364F144156F924AA280D7749911CBB5
                                                                                                APIs
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 03D3957F
                                                                                                  • Part of subcall function 03D3EF86: std::exception::exception.LIBCMT ref: 03D3EF9B
                                                                                                  • Part of subcall function 03D3EF86: __CxxThrowException@8.LIBCMT ref: 03D3EFB0
                                                                                                  • Part of subcall function 03D3EF86: std::exception::exception.LIBCMT ref: 03D3EFC1
                                                                                                • _memmove.LIBCMT ref: 03D395B5
                                                                                                Strings
                                                                                                • invalid string position, xrefs: 03D3957A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                                                                • String ID: invalid string position
                                                                                                • API String ID: 1785806476-1799206989
                                                                                                • Opcode ID: 3e6dd9a766c7b9c631fc7422387354dea18d2d82db5b3701ab52d11176afbaf9
                                                                                                • Instruction ID: ad471f00f08dc167cc9bc4dd20f9d49b2518cbdc4696651538a384b9336de705
                                                                                                • Opcode Fuzzy Hash: 3e6dd9a766c7b9c631fc7422387354dea18d2d82db5b3701ab52d11176afbaf9
                                                                                                • Instruction Fuzzy Hash: A7014F317047418BD725DA7CE9A471AB3E79FC65047684A28D092CB689D7F1DC8247A4
                                                                                                APIs
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 03D3D1D4
                                                                                                  • Part of subcall function 03D3EF39: std::exception::exception.LIBCMT ref: 03D3EF4E
                                                                                                  • Part of subcall function 03D3EF39: __CxxThrowException@8.LIBCMT ref: 03D3EF63
                                                                                                  • Part of subcall function 03D3EF39: std::exception::exception.LIBCMT ref: 03D3EF74
                                                                                                • _memmove.LIBCMT ref: 03D3D20D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                                                                • String ID: vector<T> too long
                                                                                                • API String ID: 1785806476-3788999226
                                                                                                • Opcode ID: 712a44c5b737c1158eb3bd5e6097f7e1081334e1313900049e5beaedb9d790df
                                                                                                • Instruction ID: 4748b1661b78bb79abbe0c58d01d5deb70cf4444e10a19648b23ebc039ddc393
                                                                                                • Opcode Fuzzy Hash: 712a44c5b737c1158eb3bd5e6097f7e1081334e1313900049e5beaedb9d790df
                                                                                                • Instruction Fuzzy Hash: 590184B7A002025FC704EE6EE891C6EB7A8E751251349423AEC36D7749E7B0ED158BB1
                                                                                                APIs
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 03D38443
                                                                                                  • Part of subcall function 03D3EF39: std::exception::exception.LIBCMT ref: 03D3EF4E
                                                                                                  • Part of subcall function 03D3EF39: __CxxThrowException@8.LIBCMT ref: 03D3EF63
                                                                                                  • Part of subcall function 03D3EF39: std::exception::exception.LIBCMT ref: 03D3EF74
                                                                                                • _memmove.LIBCMT ref: 03D3846E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                                                                • String ID: vector<T> too long
                                                                                                • API String ID: 1785806476-3788999226
                                                                                                • Opcode ID: a8728631c30db226ffcf1559cc42b45afa2a504eab3a5b82edef0ea7d68117fb
                                                                                                • Instruction ID: c8dc59a42a30fa727683d497774608a87aa69d34fed64458a2ef897f32970c7c
                                                                                                • Opcode Fuzzy Hash: a8728631c30db226ffcf1559cc42b45afa2a504eab3a5b82edef0ea7d68117fb
                                                                                                • Instruction Fuzzy Hash: 6101A2B2A003099FCB24DFB8DC9196BB3E9EB55610318492DE856CB740E670FC058B61
                                                                                                APIs
                                                                                                  • Part of subcall function 100132AE: __getptd.LIBCMT ref: 100132B4
                                                                                                  • Part of subcall function 100132AE: __getptd.LIBCMT ref: 100132C4
                                                                                                • __getptd.LIBCMT ref: 100137D8
                                                                                                  • Part of subcall function 1000990F: __getptd_noexit.LIBCMT ref: 10009912
                                                                                                  • Part of subcall function 1000990F: __amsg_exit.LIBCMT ref: 1000991F
                                                                                                • __getptd.LIBCMT ref: 100137E6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557923063.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557906665.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557943423.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557960696.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557977980.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3557996680.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                                                • String ID: csm
                                                                                                • API String ID: 803148776-1018135373
                                                                                                • Opcode ID: f0e1e4535676af74e2e30162e3fe80640730f6540ac6db6f2fff18db7859968d
                                                                                                • Instruction ID: 7ab74b7057de6af6c41b09604486a57fd509075c87a44dfcf8772f30d13ae725
                                                                                                • Opcode Fuzzy Hash: f0e1e4535676af74e2e30162e3fe80640730f6540ac6db6f2fff18db7859968d
                                                                                                • Instruction Fuzzy Hash: 2001283A8013468FDB24DF26C44069CB3F6FF00651F51842DF4955A6A1CF34EAD1CA11
                                                                                                APIs
                                                                                                  • Part of subcall function 03D5010A: __getptd.LIBCMT ref: 03D50110
                                                                                                  • Part of subcall function 03D5010A: __getptd.LIBCMT ref: 03D50120
                                                                                                • __getptd.LIBCMT ref: 03D506E3
                                                                                                  • Part of subcall function 03D43E5B: __getptd_noexit.LIBCMT ref: 03D43E5E
                                                                                                  • Part of subcall function 03D43E5B: __amsg_exit.LIBCMT ref: 03D43E6B
                                                                                                • __getptd.LIBCMT ref: 03D506F1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3557458220.0000000003D30000.00000040.00001000.00020000.00000000.sdmp, Offset: 03D30000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3557458220.0000000003D64000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3d30000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                                                • String ID: csm
                                                                                                • API String ID: 803148776-1018135373
                                                                                                • Opcode ID: b3fce28b2bddc590aa98f0218856aed1c2aaf2d0e4e6e47b24808f92d36aa4a8
                                                                                                • Instruction ID: bb99b8d06cf8ed71b9c8fdbe9043b569476b5b3099fa000ab5b0b1dc83d2177d
                                                                                                • Opcode Fuzzy Hash: b3fce28b2bddc590aa98f0218856aed1c2aaf2d0e4e6e47b24808f92d36aa4a8
                                                                                                • Instruction Fuzzy Hash: 0201A938801301CFCF34DF64C484AACB3BAAF00B11F28496EE8599A290CB308590CF61
                                                                                                APIs
                                                                                                • AcquireSRWLockExclusive.KERNEL32(6C39C354,?,G.5l,?,6C35233F,6C39C244,ios_base::badbit set,?,6C352E47,?,00000001), ref: 6C36AA9B
                                                                                                • ReleaseSRWLockExclusive.KERNEL32(6C39C354,?,6C35233F,6C39C244,ios_base::badbit set,?,6C352E47,?,00000001,?,?,?,?,?,?,?), ref: 6C36AAD5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3558036799.000000006C351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C350000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3558017188.000000006C350000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558073057.000000006C38D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558092477.000000006C39B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3558109546.000000006C3A0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6c350000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExclusiveLock$AcquireRelease
                                                                                                • String ID: G.5l
                                                                                                • API String ID: 17069307-4083235767
                                                                                                • Opcode ID: f8e724b335def437d08e8868f0c735e00d3f9b4aedf53769f94f9ba38071337b
                                                                                                • Instruction ID: 223f125aa50b7ad91c0714b707c09bde33839ca83d55ac2b8062b821018cc221
                                                                                                • Opcode Fuzzy Hash: f8e724b335def437d08e8868f0c735e00d3f9b4aedf53769f94f9ba38071337b
                                                                                                • Instruction Fuzzy Hash: 2EF08C35200265CFCB20AF1AC544A64B7B8FB87738F14022AEAA543E80E7361842CE61