Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
K3UtwU3CH9.msi

Overview

General Information

Sample name:K3UtwU3CH9.msi
renamed because original name is a hash value
Original sample name:468ff3b01cb98f3bb68e99b07d04c29869abc2e5c4ba3b8f075658e6121d0cd4.msi
Analysis ID:1586718
MD5:81907fbd20c219c1890c775c91468215
SHA1:37731a1a70b620d8a0694bfc15b78d31179742ad
SHA256:468ff3b01cb98f3bb68e99b07d04c29869abc2e5c4ba3b8f075658e6121d0cd4
Tags:msiuser-crep1x
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
PE file has a writeable .text section
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the installation date of Windows
Queries the volume information (name, serial number etc) of a device
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • msiexec.exe (PID: 6928 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\K3UtwU3CH9.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 7040 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7136 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 67D8AB6401B6284E54A24D810952612F C MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • ISBEW64.exe (PID: 4008 cmdline: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{DACCFEC1-0F8E-4735-B9C7-A60DBEC446EA} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • ISBEW64.exe (PID: 2056 cmdline: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8C031A3B-AD25-4CE4-AB49-01F87FDEE881} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • ISBEW64.exe (PID: 5844 cmdline: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{56D245EC-76C4-4C26-9039-E4C34B0EC544} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • ISBEW64.exe (PID: 1748 cmdline: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{D0C64754-86B5-489E-9A24-32FD984CC512} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • ISBEW64.exe (PID: 5796 cmdline: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{49CF2577-EEA4-4712-85B8-C177FE73A996} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • ISBEW64.exe (PID: 4076 cmdline: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{2288B9E7-ABB0-459A-A1F0-65CF795FB7C4} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • ISBEW64.exe (PID: 6336 cmdline: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{06852D7C-4042-4D98-A431-F2C81FD3913D} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • ISBEW64.exe (PID: 6912 cmdline: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{D0CC5960-99B5-429C-9C5D-234075E07B82} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • ISBEW64.exe (PID: 772 cmdline: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{19A60243-752F-4575-BE1B-A4589A300ACF} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • ISBEW64.exe (PID: 1448 cmdline: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F15C916D-5F9E-4609-A30F-4848C97C342B} MD5: 40F3A092744E46F3531A40B917CCA81E)
      • Dashboard.exe (PID: 5756 cmdline: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exe MD5: 704925ECFDB24EF81190B82DE0E5453C)
        • Dashboard.exe (PID: 1908 cmdline: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe MD5: 704925ECFDB24EF81190B82DE0E5453C)
          • cmd.exe (PID: 5796 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 2828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • MLE_Config_beta.exe (PID: 4904 cmdline: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe MD5: 967F4470627F823F4D7981E511C9824F)
  • Dashboard.exe (PID: 6696 cmdline: "C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe" MD5: 704925ECFDB24EF81190B82DE0E5453C)
    • cmd.exe (PID: 5180 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Dashboard.exe (PID: 6568 cmdline: "C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe" MD5: 704925ECFDB24EF81190B82DE0E5453C)
    • cmd.exe (PID: 6644 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • MLE_Config_beta.exe (PID: 2692 cmdline: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe MD5: 967F4470627F823F4D7981E511C9824F)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000D.00000002.1722528788.00000000093D7000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    0000001C.00000002.2272864695.00000000093CC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        0000001F.00000002.2605314044.00000000025BE000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            Click to see the 9 entries
            SourceRuleDescriptionAuthorStrings
            23.2.cmd.exe.2c107f8.1.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              23.2.cmd.exe.2c107f8.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
              • 0x10f60:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
              • 0x10f28:$s2: Elevation:Administrator!new:
              23.2.cmd.exe.4bc4acd.4.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                23.2.cmd.exe.4bc4acd.4.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                • 0x25f223:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                • 0x25f2ae:$s1: CoGetObject
                • 0x25f207:$s2: Elevation:Administrator!new:
                31.2.MLE_Config_beta.exe.260a6ed.2.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  Click to see the 27 entries
                  No Sigma rule has matched
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Local\Temp\xvjmsqbpJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\snfgsgfJoe Sandbox ML: detected

                  Exploits

                  barindex
                  Source: Yara matchFile source: 23.2.cmd.exe.2c107f8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 23.2.cmd.exe.4bc4acd.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 31.2.MLE_Config_beta.exe.260a6ed.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 23.2.cmd.exe.4bc56cd.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 29.2.cmd.exe.4d7aa00.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 29.2.cmd.exe.4dc06cd.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 21.2.MLE_Config_beta.exe.2654aed.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 31.2.MLE_Config_beta.exe.2609aed.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 23.2.cmd.exe.4b7fa00.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 29.2.cmd.exe.4dbfacd.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.cmd.exe.544ca00.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 21.2.MLE_Config_beta.exe.260fa20.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 21.2.MLE_Config_beta.exe.26556ed.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.cmd.exe.5491acd.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 31.2.MLE_Config_beta.exe.25c4a20.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.cmd.exe.54926cd.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000D.00000002.1722528788.00000000093D7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001C.00000002.2272864695.00000000093CC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001F.00000002.2605314044.00000000025BE000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000E.00000002.1780617372.00000000093E9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000017.00000002.2213346540.0000000002C10000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.2159661824.00000000093C5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5796, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MLE_Config_beta.exe PID: 4904, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5180, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 6644, type: MEMORYSTR
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeFile opened: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\msvcr80.dllJump to behavior
                  Source: Binary string: ntdll.pdb source: MLE_Config_beta.exe, 00000015.00000002.2137645351.000000000543C000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2136896029.0000000004E33000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132086318.00000000021C7000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138365672.0000000005C3F000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138555440.0000000005E3A000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2137466035.000000000523C000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139077290.0000000006430000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139757228.0000000006C3A000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140082920.0000000007039000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2135298838.000000000443E000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139242183.0000000006633000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2136061978.0000000004C38000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2135495477.0000000004638000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138191367.0000000005A3C000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132931895.0000000002B40000.00000004.00001000.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139915740.0000000006E3A000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138915984.0000000006237000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2134578448.0000000003E3C000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138737191.0000000006037000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138028436.0000000005837000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2135085639.0000000004231000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139561373.0000000006A31000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2135874843.0000000004A3A000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139398502.0000000006836000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2137849745.000000000563F000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2137091371.0000000005033000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2134793630.0000000004032000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.
                  Source: Binary string: UXCore.pdb0;p8 source: Dashboard.exe, 0000000D.00000002.1723540876.0000000070301000.00000020.00000001.01000000.00000005.sdmp, Dashboard.exe, 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Dashboard.exe, 00000016.00000002.2161871698.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Dashboard.exe, 0000001C.00000002.2274641957.0000000070301000.00000020.00000001.01000000.00000008.sdmp
                  Source: Binary string: wntdll.pdbUGP source: Dashboard.exe, 0000000D.00000002.1711569840.0000000000BE3000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000D.00000002.1723268048.00000000096D0000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1781256800.00000000096E0000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1776454119.0000000000C85000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1781547133.0000000009A9F000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2028008383.0000000005980000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027481864.0000000005090000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2150911668.0000000000C20000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2160681691.0000000009A71000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2160384217.00000000096C0000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2214116522.00000000050B0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213433190.00000000047D0000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2273794480.0000000009A72000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2268495789.0000000000C12000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2273499374.00000000096C0000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504796011.00000000052B0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504103025.00000000049CC000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntdll.pdbUGP source: MLE_Config_beta.exe, 00000015.00000002.2137645351.000000000543C000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2136896029.0000000004E33000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132086318.00000000021C7000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138365672.0000000005C3F000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138555440.0000000005E3A000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2137466035.000000000523C000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139077290.0000000006430000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139757228.0000000006C3A000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140082920.0000000007039000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2135298838.000000000443E000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139242183.0000000006633000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2136061978.0000000004C38000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2135495477.0000000004638000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138191367.0000000005A3C000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132931895.0000000002B40000.00000004.00001000.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139915740.0000000006E3A000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138915984.0000000006237000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2134578448.0000000003E3C000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138737191.0000000006037000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138028436.0000000005837000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2135085639.0000000004231000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139561373.0000000006A31000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2135874843.0000000004A3A000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139398502.0000000006836000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2137849745.000000000563F000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2137091371.0000000005033000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2134793630.0000000004032000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.000000
                  Source: Binary string: wntdll.pdb source: Dashboard.exe, 0000000D.00000002.1711569840.0000000000BE3000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000D.00000002.1723268048.00000000096D0000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1781256800.00000000096E0000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1776454119.0000000000C85000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1781547133.0000000009A9F000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2028008383.0000000005980000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027481864.0000000005090000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2150911668.0000000000C20000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2160681691.0000000009A71000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2160384217.00000000096C0000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2214116522.00000000050B0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213433190.00000000047D0000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2273794480.0000000009A72000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2268495789.0000000000C12000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2273499374.00000000096C0000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504796011.00000000052B0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504103025.00000000049CC000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: Dashboard.pdb source: Dashboard.exe, Dashboard.exe, 0000000D.00000000.1700565003.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Dashboard.exe, 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Dashboard.exe, 0000000E.00000002.1776784365.0000000001001000.00000020.00000001.01000000.00000007.sdmp, Dashboard.exe, 0000000E.00000000.1709046549.0000000001001000.00000020.00000001.01000000.00000007.sdmp, Dashboard.exe, 00000016.00000002.2151347870.0000000001001000.00000020.00000001.01000000.00000007.sdmp, Dashboard.exe, 00000016.00000000.2091087309.0000000001001000.00000020.00000001.01000000.00000007.sdmp, Dashboard.exe, 0000001C.00000002.2268714527.0000000001001000.00000020.00000001.01000000.00000007.sdmp, Dashboard.exe, 0000001C.00000000.2211863871.0000000001001000.00000020.00000001.01000000.00000007.sdmp
                  Source: Binary string: C:\CodeBases\isdev\Src\Runtime\InstallScript\ISBEW64\x64\Release\ISBEW64.pdb source: ISBEW64.exe, 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000003.00000000.1690551243.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000004.00000000.1691220232.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000004.00000002.1693257249.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000005.00000000.1691860250.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000005.00000002.1695605425.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000006.00000002.1696309871.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000006.00000000.1692654175.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000007.00000000.1694453663.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000007.00000002.1697407295.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000008.00000002.1718243220.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000008.00000000.1696177645.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000009.00000002.1699092395.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000009.00000000.1697351758.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000A.00000000.1698052577.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000A.00000002.1699820460.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000B.00000002.1700643366.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000B.00000000.1698727830.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000C.00000002.1702721653.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000C.00000000.1699370730.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp
                  Source: Binary string: UXCore.pdb source: Dashboard.exe, Dashboard.exe, 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Dashboard.exe, 00000016.00000002.2161871698.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Dashboard.exe, 0000001C.00000002.2274641957.0000000070301000.00000020.00000001.01000000.00000008.sdmp
                  Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014000A5E0 GetDlgItem,SendMessageW,SendMessageW,SendMessageW,wsprintfW,GetClientRect,SendMessageW,FindFirstFileW,lstrlenW,SendMessageW,FindNextFileW,FindClose,21_2_000000014000A5E0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_0000000140007628 FindClose,lstrlenW,lstrcpyW,FindFirstFileW,GetFullPathNameW,FindClose,SetLastError,lstrlenW,21_2_0000000140007628
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014000D848 GetLogicalDriveStringsW,GetDlgItem,GetDriveTypeW,_cwprintf_s_l,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SHGetSpecialFolderPathW,lstrlenW,SHGetSpecialFolderPathW,lstrlenW,SendMessageW,SendMessageW,GetDlgItem,SendMessageW,SendMessageW,GetDlgItem,SendMessageW,RegOpenKeyExW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,SendMessageW,SendMessageW,SendMessageW,RegCloseKey,21_2_000000014000D848
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                  Source: global trafficTCP traffic: 192.168.2.4:51697 -> 162.159.36.2:53
                  Source: unknownDNS traffic detected: query: plerukilo0.site replaycode: Name error (3)
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficDNS traffic detected: DNS query: plerukilo0.site
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                  Source: Dashboard.exeString found in binary or memory: http://ie.search.msn.com/
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0L
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                  Source: Dashboard.exeString found in binary or memory: http://runonce.msn.com/?v=msgrv75
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s2.symcb.com0
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crl0a
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crt0
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcd.com0&
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000000.1952616443.00000001401E0000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.???.xx/?search=%s
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.000000000913B000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.000000000914D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.00000000025C0000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.0000000009129000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B30000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009130000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D2B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.info-zip.org/
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000000.1952616443.00000001401E0000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.com
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.com/?Download=Find.Same.Images.OK
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.com/?Freeware/Find.Same.Images.OK
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.com/?Freeware/Find.Same.Images.OK/History
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.com/?seite=faq-Find.Same.Images.OK&faq=0
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000000.1952616443.00000001401E0000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.de
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.de/?Download=Find.Same.Images.OK
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.de/?Freeware/Find.Same.Images.OK
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.de/?Freeware/Find.Same.Images.OK/History
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.de/?seite=faq-Find.Same.Images.OK&faq=0
                  Source: cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.surfok.de/
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/cps0(
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/rpa00
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0/
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
                  Source: MLE_Config_beta.exe, 00000015.00000002.2131691175.000000000048A000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2115376077.00000000004CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/
                  Source: MLE_Config_beta.exe, 00000015.00000003.2119331870.00000000004C7000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2121519247.00000000004D1000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2119562347.00000000004D0000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2120026657.00000000004D0000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2119825749.00000000004CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/.M
                  Source: MLE_Config_beta.exe, 00000015.00000003.2121519247.00000000004D1000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2120026657.00000000004D0000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2119825749.00000000004CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/2M
                  Source: MLE_Config_beta.exe, 00000015.00000003.2127632449.00000000004C9000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2121519247.00000000004D1000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2120026657.00000000004D0000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2119825749.00000000004CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/6M
                  Source: MLE_Config_beta.exe, 00000015.00000003.2125904304.00000000004CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/:M
                  Source: MLE_Config_beta.exe, 00000015.00000003.2121519247.00000000004D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/BM
                  Source: MLE_Config_beta.exe, 00000015.00000003.2125904304.00000000004CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/FM
                  Source: MLE_Config_beta.exe, 00000015.00000002.2131867899.00000000004C9000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2131389036.00000000004C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/L
                  Source: MLE_Config_beta.exe, 00000015.00000003.2127632449.00000000004C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/LzM
                  Source: MLE_Config_beta.exe, 00000015.00000003.2124413253.00000000004CB000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2124349794.00000000004C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/N&M
                  Source: MLE_Config_beta.exe, 00000015.00000003.2125904304.00000000004CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/NNM
                  Source: MLE_Config_beta.exe, 00000015.00000003.2127632449.00000000004C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/RM
                  Source: MLE_Config_beta.exe, 00000015.00000003.2125904304.00000000004CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/ZM
                  Source: MLE_Config_beta.exe, 00000015.00000002.2131867899.00000000004C9000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2131389036.00000000004C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/bM
                  Source: MLE_Config_beta.exe, 00000015.00000002.2131691175.0000000000498000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/environment-canaY
                  Source: MLE_Config_beta.exe, 00000015.00000002.2131691175.00000000004AA000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2115376077.00000000004CA000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2119825749.00000000004CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/environment-canada-s-biosphere?vmkjypkrumtk=ey7u2s8PuxSar298wfGYABIRHbA4eVhz
                  Source: MLE_Config_beta.exe, 00000015.00000003.2122929016.00000000004CC000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2123102167.00000000004D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/fM
                  Source: MLE_Config_beta.exe, 00000015.00000002.2131691175.000000000048A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/g
                  Source: MLE_Config_beta.exe, 00000015.00000003.2116592118.00000000004CA000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2117988162.00000000004D0000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2117930955.00000000004C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/jM
                  Source: MLE_Config_beta.exe, 00000015.00000002.2131691175.000000000048A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/k
                  Source: MLE_Config_beta.exe, 00000015.00000003.2116592118.00000000004CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/nM
                  Source: MLE_Config_beta.exe, 00000015.00000003.2116592118.00000000004CA000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2117988162.00000000004D0000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2121519247.00000000004D1000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2117930955.00000000004C7000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2120026657.00000000004D0000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2119825749.00000000004CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/rM
                  Source: MLE_Config_beta.exe, 00000015.00000003.2124413253.00000000004CB000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2124349794.00000000004C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/vM
                  Source: MLE_Config_beta.exe, 00000015.00000003.2119913004.00000000004A4000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2116633662.00000000004A4000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2119384391.00000000004A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site:443
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_0000000140007860 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SetClipboardData,CloseClipboard,21_2_0000000140007860
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_0000000140007860 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SetClipboardData,CloseClipboard,21_2_0000000140007860
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_0000000140007274 GetDlgItem,GetDlgItem,GetWindowRect,ScreenToClient,ScreenToClient,GetClientRect,CreateDIBSection,GetDC,CreateCompatibleDC,SelectObject,SelectObject,ReleaseDC,SendMessageW,21_2_0000000140007274
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00000001400038A8 KillTimer,GetAsyncKeyState,SetTimer,21_2_00000001400038A8

                  System Summary

                  barindex
                  Source: 23.2.cmd.exe.2c107f8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 23.2.cmd.exe.4bc4acd.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 31.2.MLE_Config_beta.exe.260a6ed.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 23.2.cmd.exe.4bc56cd.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 29.2.cmd.exe.4d7aa00.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 29.2.cmd.exe.4dc06cd.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 21.2.MLE_Config_beta.exe.2654aed.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 31.2.MLE_Config_beta.exe.2609aed.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 23.2.cmd.exe.4b7fa00.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 29.2.cmd.exe.4dbfacd.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 15.2.cmd.exe.544ca00.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 21.2.MLE_Config_beta.exe.260fa20.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 21.2.MLE_Config_beta.exe.26556ed.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 15.2.cmd.exe.5491acd.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 31.2.MLE_Config_beta.exe.25c4a20.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 15.2.cmd.exe.54926cd.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: ISRT.dll.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014011FF38 CreateFileW,malloc,ReadFile,NtClose,21_2_000000014011FF38
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeCode function: 13_2_0100CCC8 ExitWindowsEx,13_2_0100CCC8
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC601AD03_2_00007FF6DC601AD0
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC6042303_2_00007FF6DC604230
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC604E103_2_00007FF6DC604E10
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC60D3083_2_00007FF6DC60D308
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC6142FC3_2_00007FF6DC6142FC
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC60CC643_2_00007FF6DC60CC64
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC60F11C3_2_00007FF6DC60F11C
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC60FCE43_2_00007FF6DC60FCE4
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_7032F01014_2_7032F010
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_7032380014_2_70323800
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_7031F86014_2_7031F860
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_7032008014_2_70320080
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_7032EA0014_2_7032EA00
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_70324BA014_2_70324BA0
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_70316B8014_2_70316B80
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_7036948F14_2_7036948F
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_70316DF014_2_70316DF0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014000BFFC21_2_000000014000BFFC
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014001D00021_2_000000014001D000
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014000B82421_2_000000014000B824
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014002F83821_2_000000014002F838
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014000D84821_2_000000014000D848
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014002106821_2_0000000140021068
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014000909C21_2_000000014000909C
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00000001400238F821_2_00000001400238F8
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014001A9B821_2_000000014001A9B8
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00000001400041C821_2_00000001400041C8
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00000001400231CC21_2_00000001400231CC
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_0000000140021A0021_2_0000000140021A00
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014000E21421_2_000000014000E214
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_0000000140024A7821_2_0000000140024A78
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014001F2A421_2_000000014001F2A4
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014000A37821_2_000000014000A378
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_0000000140122B9821_2_0000000140122B98
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014001339021_2_0000000140013390
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_0000000140020BB821_2_0000000140020BB8
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014000142421_2_0000000140001424
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_0000000140008C3C21_2_0000000140008C3C
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014000545021_2_0000000140005450
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014000D45821_2_000000014000D458
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014011B45021_2_000000014011B450
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014001048C21_2_000000014001048C
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00000001400EE4C421_2_00000001400EE4C4
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00000001400FC53C21_2_00000001400FC53C
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014000A5E021_2_000000014000A5E0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_0000000140022E3021_2_0000000140022E30
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014002267C21_2_000000014002267C
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014001AE8821_2_000000014001AE88
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_0000000140011EF421_2_0000000140011EF4
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00000001400FF71421_2_00000001400FF714
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014001DF4421_2_000000014001DF44
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_0000000140040F4821_2_0000000140040F48
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014001879021_2_0000000140018790
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93FEC021_2_00007FF75D93FEC0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93D64021_2_00007FF75D93D640
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93DE0021_2_00007FF75D93DE00
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75DA96D3021_2_00007FF75DA96D30
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D9450C021_2_00007FF75D9450C0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75DA7F24021_2_00007FF75DA7F240
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75DB8AA1021_2_00007FF75DB8AA10
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75DA7DA1021_2_00007FF75DA7DA10
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93F96021_2_00007FF75D93F960
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75DA7ECF021_2_00007FF75DA7ECF0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93549021_2_00007FF75D935490
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93F6C021_2_00007FF75D93F6C0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D9346A221_2_00007FF75D9346A2
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D97E6A021_2_00007FF75D97E6A0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D9346A221_2_00007FF75D9346A2
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93B64021_2_00007FF75D93B640
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D941E4021_2_00007FF75D941E40
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93260F21_2_00007FF75D93260F
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93C62021_2_00007FF75D93C620
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D99568021_2_00007FF75D995680
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D97EDD021_2_00007FF75D97EDD0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D9445A021_2_00007FF75D9445A0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D933E0021_2_00007FF75D933E00
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93260F21_2_00007FF75D93260F
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75DA6960021_2_00007FF75DA69600
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D943D4021_2_00007FF75D943D40
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75DA7D8A021_2_00007FF75DA7D8A0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D96A8B021_2_00007FF75D96A8B0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93911021_2_00007FF75D939110
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D94011021_2_00007FF75D940110
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D94682021_2_00007FF75D946820
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93A82921_2_00007FF75D93A829
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D98103021_2_00007FF75D981030
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D94487521_2_00007FF75D944875
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D98207021_2_00007FF75D982070
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93EFC021_2_00007FF75D93EFC0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D9817D021_2_00007FF75D9817D0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D968FA021_2_00007FF75D968FA0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93CFF021_2_00007FF75D93CFF0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93974021_2_00007FF75D939740
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D99875021_2_00007FF75D998750
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93874B21_2_00007FF75D93874B
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D97EF2021_2_00007FF75D97EF20
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D94579021_2_00007FF75D945790
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D938AA021_2_00007FF75D938AA0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D981AB021_2_00007FF75D981AB0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D933AFD21_2_00007FF75D933AFD
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93423E21_2_00007FF75D93423E
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93DA4021_2_00007FF75D93DA40
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D94024021_2_00007FF75D940240
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93AA5021_2_00007FF75D93AA50
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93421E21_2_00007FF75D93421E
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D969A2021_2_00007FF75D969A20
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D94123021_2_00007FF75D941230
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D94523021_2_00007FF75D945230
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D96D27C21_2_00007FF75D96D27C
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D9379C021_2_00007FF75D9379C0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D9469D021_2_00007FF75D9469D0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D9D1A1021_2_00007FF75D9D1A10
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93994021_2_00007FF75D939940
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93411A21_2_00007FF75D93411A
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93B16021_2_00007FF75D93B160
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93C4B021_2_00007FF75D93C4B0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D981CB021_2_00007FF75D981CB0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D9404E021_2_00007FF75D9404E0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93B4F021_2_00007FF75D93B4F0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D99845021_2_00007FF75D998450
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D98143021_2_00007FF75D981430
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D939C8021_2_00007FF75D939C80
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93EC9021_2_00007FF75D93EC90
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D97EC9021_2_00007FF75D97EC90
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93545D21_2_00007FF75D93545D
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93F45D21_2_00007FF75D93F45D
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D932C6621_2_00007FF75D932C66
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D995C7021_2_00007FF75D995C70
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D97E3B021_2_00007FF75D97E3B0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D99540021_2_00007FF75D995400
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93CC0021_2_00007FF75D93CC00
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75DA6A40021_2_00007FF75DA6A400
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D9443E021_2_00007FF75D9443E0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75DA7DBE021_2_00007FF75DA7DBE0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93935021_2_00007FF75D939350
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D942B2021_2_00007FF75D942B20
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D93537721_2_00007FF75D935377
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D94337021_2_00007FF75D943370
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe B22BF1210B5FD173A210EBFA9092390AA0513C41E1914CBE161EB547F049EF91
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeCode function: String function: 0100880F appears 56 times
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: String function: 7033F554 appears 47 times
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: String function: 70336A33 appears 75 times
                  Source: MSI3B8B.tmp.0.drStatic PE information: Resource name: PUBLICKEY type: b.out overlay separate pure segmented executable V2.3 186 286 286 386 Large Text Large Data Huge Objects Enabled
                  Source: MLE_Config_beta.exe.15.drStatic PE information: Resource name: ZIP type: Zip archive data (empty)
                  Source: xvjmsqbp.15.drStatic PE information: Number of sections : 12 > 10
                  Source: snfgsgf.29.drStatic PE information: Number of sections : 12 > 10
                  Source: 23.2.cmd.exe.2c107f8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 23.2.cmd.exe.4bc4acd.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 31.2.MLE_Config_beta.exe.260a6ed.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 23.2.cmd.exe.4bc56cd.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 29.2.cmd.exe.4d7aa00.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 29.2.cmd.exe.4dc06cd.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 21.2.MLE_Config_beta.exe.2654aed.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 31.2.MLE_Config_beta.exe.2609aed.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 23.2.cmd.exe.4b7fa00.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 29.2.cmd.exe.4dbfacd.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 15.2.cmd.exe.544ca00.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 21.2.MLE_Config_beta.exe.260fa20.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 21.2.MLE_Config_beta.exe.26556ed.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 15.2.cmd.exe.5491acd.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 31.2.MLE_Config_beta.exe.25c4a20.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 15.2.cmd.exe.54926cd.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: ISRT.dll.2.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  Source: ISRT.dll.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  Source: cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: IU.sln
                  Source: classification engineClassification label: mal88.expl.evad.winMSI@43/25@2/0
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeCode function: 13_2_0100CC59 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,13_2_0100CC59
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC603140 CoCreateInstance,3_2_00007FF6DC603140
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC605870 LoadLibraryExW,LoadLibraryExW,FindResourceW,LoadResource,SizeofResource,MultiByteToWideChar,FreeLibrary,3_2_00007FF6DC605870
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeFile created: C:\Users\user\AppData\Roaming\LoadupdateXi_alphaJump to behavior
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6664:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2828:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5000:120:WilError_03
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI3996.tmpJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeCommand line argument: WLXS\Dashboard13_2_0100769A
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeCommand line argument: DashboardRes13_2_0100769A
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeCommand line argument: 1.0.0.113_2_0100769A
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeCommand line argument: DashboardLoc13_2_0100769A
                  Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\IsConfig.iniJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: Dashboard.exeString found in binary or memory: Button-HELP;Button
                  Source: MLE_Config_beta.exeString found in binary or memory: -install -runas
                  Source: MLE_Config_beta.exeString found in binary or memory: -install
                  Source: MLE_Config_beta.exeString found in binary or memory: -install -nolisense
                  Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\K3UtwU3CH9.msi"
                  Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 67D8AB6401B6284E54A24D810952612F C
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{DACCFEC1-0F8E-4735-B9C7-A60DBEC446EA}
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8C031A3B-AD25-4CE4-AB49-01F87FDEE881}
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{56D245EC-76C4-4C26-9039-E4C34B0EC544}
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{D0C64754-86B5-489E-9A24-32FD984CC512}
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{49CF2577-EEA4-4712-85B8-C177FE73A996}
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{2288B9E7-ABB0-459A-A1F0-65CF795FB7C4}
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{06852D7C-4042-4D98-A431-F2C81FD3913D}
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{D0CC5960-99B5-429C-9C5D-234075E07B82}
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{19A60243-752F-4575-BE1B-A4589A300ACF}
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F15C916D-5F9E-4609-A30F-4848C97C342B}
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exe C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exe
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeProcess created: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe "C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe"
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe "C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe"
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 67D8AB6401B6284E54A24D810952612F CJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{DACCFEC1-0F8E-4735-B9C7-A60DBEC446EA}Jump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8C031A3B-AD25-4CE4-AB49-01F87FDEE881}Jump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{56D245EC-76C4-4C26-9039-E4C34B0EC544}Jump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{D0C64754-86B5-489E-9A24-32FD984CC512}Jump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{49CF2577-EEA4-4712-85B8-C177FE73A996}Jump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{2288B9E7-ABB0-459A-A1F0-65CF795FB7C4}Jump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{06852D7C-4042-4D98-A431-F2C81FD3913D}Jump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{D0CC5960-99B5-429C-9C5D-234075E07B82}Jump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{19A60243-752F-4575-BE1B-A4589A300ACF}Jump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F15C916D-5F9E-4609-A30F-4848C97C342B}Jump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exe C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeProcess created: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: msihnd.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched20.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: usp10.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msls31.dllJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeSection loaded: uxcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeSection loaded: msimg32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeSection loaded: dbghelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeSection loaded: pla.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeSection loaded: pdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeSection loaded: tdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeSection loaded: wevtapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: uxcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: msimg32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: dbghelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: pla.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: pdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: tdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: wevtapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: linkinfo.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntshrui.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cscapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bitsproxy.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: uxcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: msimg32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: dbghelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: pla.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: pdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: tdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: wevtapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msftedit.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: comsvcs.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmlua.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: uxcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: msimg32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: dbghelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: pla.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: pdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: tdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: wevtapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00020420-0000-0000-C000-000000000046}\InprocServer32Jump to behavior
                  Source: oxstqvsuk.15.drLNK file: ..\..\Roaming\LoadupdateXi_alpha\Dashboard.exe
                  Source: C:\Windows\SysWOW64\msiexec.exeFile written: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\IsConfig.iniJump to behavior
                  Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Windows\SysWOW64\RICHED32.DLLJump to behavior
                  Source: K3UtwU3CH9.msiStatic file information: File size 9586644 > 1048576
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeFile opened: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\msvcr80.dllJump to behavior
                  Source: Binary string: ntdll.pdb source: MLE_Config_beta.exe, 00000015.00000002.2137645351.000000000543C000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2136896029.0000000004E33000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132086318.00000000021C7000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138365672.0000000005C3F000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138555440.0000000005E3A000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2137466035.000000000523C000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139077290.0000000006430000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139757228.0000000006C3A000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140082920.0000000007039000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2135298838.000000000443E000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139242183.0000000006633000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2136061978.0000000004C38000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2135495477.0000000004638000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138191367.0000000005A3C000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132931895.0000000002B40000.00000004.00001000.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139915740.0000000006E3A000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138915984.0000000006237000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2134578448.0000000003E3C000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138737191.0000000006037000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138028436.0000000005837000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2135085639.0000000004231000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139561373.0000000006A31000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2135874843.0000000004A3A000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139398502.0000000006836000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2137849745.000000000563F000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2137091371.0000000005033000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2134793630.0000000004032000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.
                  Source: Binary string: UXCore.pdb0;p8 source: Dashboard.exe, 0000000D.00000002.1723540876.0000000070301000.00000020.00000001.01000000.00000005.sdmp, Dashboard.exe, 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Dashboard.exe, 00000016.00000002.2161871698.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Dashboard.exe, 0000001C.00000002.2274641957.0000000070301000.00000020.00000001.01000000.00000008.sdmp
                  Source: Binary string: wntdll.pdbUGP source: Dashboard.exe, 0000000D.00000002.1711569840.0000000000BE3000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000D.00000002.1723268048.00000000096D0000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1781256800.00000000096E0000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1776454119.0000000000C85000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1781547133.0000000009A9F000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2028008383.0000000005980000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027481864.0000000005090000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2150911668.0000000000C20000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2160681691.0000000009A71000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2160384217.00000000096C0000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2214116522.00000000050B0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213433190.00000000047D0000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2273794480.0000000009A72000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2268495789.0000000000C12000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2273499374.00000000096C0000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504796011.00000000052B0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504103025.00000000049CC000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntdll.pdbUGP source: MLE_Config_beta.exe, 00000015.00000002.2137645351.000000000543C000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2136896029.0000000004E33000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132086318.00000000021C7000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138365672.0000000005C3F000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138555440.0000000005E3A000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2137466035.000000000523C000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139077290.0000000006430000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139757228.0000000006C3A000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140082920.0000000007039000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2135298838.000000000443E000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139242183.0000000006633000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2136061978.0000000004C38000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2135495477.0000000004638000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138191367.0000000005A3C000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132931895.0000000002B40000.00000004.00001000.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139915740.0000000006E3A000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138915984.0000000006237000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2134578448.0000000003E3C000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138737191.0000000006037000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2138028436.0000000005837000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2135085639.0000000004231000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139561373.0000000006A31000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2135874843.0000000004A3A000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2139398502.0000000006836000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2137849745.000000000563F000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2137091371.0000000005033000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2134793630.0000000004032000.00000004.00000001.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.000000
                  Source: Binary string: wntdll.pdb source: Dashboard.exe, 0000000D.00000002.1711569840.0000000000BE3000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000D.00000002.1723268048.00000000096D0000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1781256800.00000000096E0000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1776454119.0000000000C85000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1781547133.0000000009A9F000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2028008383.0000000005980000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027481864.0000000005090000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2150911668.0000000000C20000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2160681691.0000000009A71000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2160384217.00000000096C0000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2214116522.00000000050B0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213433190.00000000047D0000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2273794480.0000000009A72000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2268495789.0000000000C12000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2273499374.00000000096C0000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504796011.00000000052B0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504103025.00000000049CC000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: Dashboard.pdb source: Dashboard.exe, Dashboard.exe, 0000000D.00000000.1700565003.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Dashboard.exe, 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Dashboard.exe, 0000000E.00000002.1776784365.0000000001001000.00000020.00000001.01000000.00000007.sdmp, Dashboard.exe, 0000000E.00000000.1709046549.0000000001001000.00000020.00000001.01000000.00000007.sdmp, Dashboard.exe, 00000016.00000002.2151347870.0000000001001000.00000020.00000001.01000000.00000007.sdmp, Dashboard.exe, 00000016.00000000.2091087309.0000000001001000.00000020.00000001.01000000.00000007.sdmp, Dashboard.exe, 0000001C.00000002.2268714527.0000000001001000.00000020.00000001.01000000.00000007.sdmp, Dashboard.exe, 0000001C.00000000.2211863871.0000000001001000.00000020.00000001.01000000.00000007.sdmp
                  Source: Binary string: C:\CodeBases\isdev\Src\Runtime\InstallScript\ISBEW64\x64\Release\ISBEW64.pdb source: ISBEW64.exe, 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000003.00000000.1690551243.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000004.00000000.1691220232.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000004.00000002.1693257249.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000005.00000000.1691860250.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000005.00000002.1695605425.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000006.00000002.1696309871.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000006.00000000.1692654175.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000007.00000000.1694453663.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000007.00000002.1697407295.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000008.00000002.1718243220.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000008.00000000.1696177645.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000009.00000002.1699092395.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 00000009.00000000.1697351758.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000A.00000000.1698052577.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000A.00000002.1699820460.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000B.00000002.1700643366.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000B.00000000.1698727830.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000C.00000002.1702721653.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp, ISBEW64.exe, 0000000C.00000000.1699370730.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmp
                  Source: Binary string: UXCore.pdb source: Dashboard.exe, Dashboard.exe, 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Dashboard.exe, 00000016.00000002.2161871698.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Dashboard.exe, 0000001C.00000002.2274641957.0000000070301000.00000020.00000001.01000000.00000008.sdmp
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC606B00 LoadLibraryW,GetProcAddress,FreeLibrary,FreeLibrary,3_2_00007FF6DC606B00
                  Source: initial sampleStatic PE information: section where entry point is pointing to: .rsrc
                  Source: MSI3B8B.tmp.0.drStatic PE information: real checksum: 0x0 should be: 0x285c7f
                  Source: xvjmsqbp.15.drStatic PE information: real checksum: 0x28e4d4 should be: 0x28e3f3
                  Source: UXCore.dll.2.drStatic PE information: real checksum: 0xd0519 should be: 0xd1e93
                  Source: UXCore.dll.13.drStatic PE information: real checksum: 0xd0519 should be: 0xd1e93
                  Source: snfgsgf.29.drStatic PE information: real checksum: 0x28e4d4 should be: 0x28e3f3
                  Source: _isres_0x0409.dll.2.drStatic PE information: real checksum: 0x0 should be: 0x1c5ec2
                  Source: MSI3B8B.tmp.0.drStatic PE information: section name: .orpc
                  Source: MLE_Config_beta.exe.15.drStatic PE information: section name: Shared
                  Source: xvjmsqbp.15.drStatic PE information: section name: .xdata
                  Source: xvjmsqbp.15.drStatic PE information: section name: hwafy
                  Source: snfgsgf.29.drStatic PE information: section name: .xdata
                  Source: snfgsgf.29.drStatic PE information: section name: hwafy
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeCode function: 13_2_010088FB push ecx; ret 13_2_0100890E
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeCode function: 13_2_010086D9 push ecx; ret 13_2_010086EC
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_7038FC63 push ecx; ret 14_2_7038FC76
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_7038FCED push ecx; ret 14_2_7038FD00
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014001282D push 8B480014h; retf 21_2_0000000140012832
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014001D949 push rsp; ret 21_2_000000014001D94B
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_0000000140013D4C pushfq ; ret 21_2_0000000140013D4D
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_0000000140013DE5 pushfq ; ret 21_2_0000000140013DE6
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_0000000140013F26 pushfq ; ret 21_2_0000000140013F27
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D931F2D push rdi; ret 21_2_00007FF75D931F2E
                  Source: ISRT.dll.2.drStatic PE information: section name: .text entropy: 7.9838191086194135
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI3996.tmpJump to dropped file
                  Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeFile created: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\msvcr80.dllJump to dropped file
                  Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\xvjmsqbpJump to dropped file
                  Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\UXCore.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI3B8B.tmpJump to dropped file
                  Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISRT.dllJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\_isres_0x0409.dllJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\snfgsgfJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeFile created: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\msvcr80.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeFile created: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\UXCore.dllJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\xvjmsqbpJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\snfgsgfJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00000001400853D4 GetPrivateProfileStringW,lstrlenW,21_2_00000001400853D4

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\XVJMSQBP
                  Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\SNFGSGF
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC607180 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,3_2_00007FF6DC607180
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeAPI/Special instruction interceptor: Address: 6C3D7C44
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeAPI/Special instruction interceptor: Address: 6C3D7C44
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeAPI/Special instruction interceptor: Address: 6C3D7945
                  Source: C:\Windows\SysWOW64\cmd.exeAPI/Special instruction interceptor: Address: 6C3D3B54
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeAPI/Special instruction interceptor: Address: 6C537C44
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeAPI/Special instruction interceptor: Address: 6C537945
                  Source: C:\Windows\SysWOW64\cmd.exeAPI/Special instruction interceptor: Address: 6C533B54
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI3996.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\msvcr80.dllJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\xvjmsqbpJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI3B8B.tmpJump to dropped file
                  Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISRT.dllJump to dropped file
                  Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\_isres_0x0409.dllJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\snfgsgfJump to dropped file
                  Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\msvcr80.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_3-8987
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeAPI coverage: 1.3 %
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe TID: 5900Thread sleep time: -150000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe TID: 1820Thread sleep time: -210000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014000A5E0 GetDlgItem,SendMessageW,SendMessageW,SendMessageW,wsprintfW,GetClientRect,SendMessageW,FindFirstFileW,lstrlenW,SendMessageW,FindNextFileW,FindClose,21_2_000000014000A5E0
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_0000000140007628 FindClose,lstrlenW,lstrcpyW,FindFirstFileW,GetFullPathNameW,FindClose,SetLastError,lstrlenW,21_2_0000000140007628
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014000D848 GetLogicalDriveStringsW,GetDlgItem,GetDriveTypeW,_cwprintf_s_l,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SHGetSpecialFolderPathW,lstrlenW,SHGetSpecialFolderPathW,lstrlenW,SendMessageW,SendMessageW,GetDlgItem,SendMessageW,SendMessageW,GetDlgItem,SendMessageW,RegOpenKeyExW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,SendMessageW,SendMessageW,SendMessageW,RegCloseKey,21_2_000000014000D848
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75DA7DA10 GetSystemInfo,21_2_00007FF75DA7DA10
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                  Source: cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noreply@vmware.com0
                  Source: cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0
                  Source: cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1!0
                  Source: cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0/
                  Source: cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1
                  Source: cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.0
                  Source: MLE_Config_beta.exe, 00000015.00000002.2131691175.000000000045C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllff
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeAPI call chain: ExitProcess graph end nodegraph_3-8988
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeAPI call chain: ExitProcess graph end nodegraph_21-21186
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeAPI call chain: ExitProcess graph end nodegraph_21-21169
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeAPI call chain: ExitProcess graph end nodegraph_21-21092
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeAPI call chain: ExitProcess graph end nodegraph_21-21128
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC60AB1C IsDebuggerPresent,__crtUnhandledException,GetCurrentProcess,TerminateProcess,3_2_00007FF6DC60AB1C
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC613008 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,3_2_00007FF6DC613008
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC606B00 LoadLibraryW,GetProcAddress,FreeLibrary,FreeLibrary,3_2_00007FF6DC606B00
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC60CAE4 GetProcessHeap,3_2_00007FF6DC60CAE4
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC6107D8 SetUnhandledExceptionFilter,3_2_00007FF6DC6107D8
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC60DCD4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00007FF6DC60DCD4
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeCode function: 13_2_010087FB IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,13_2_010087FB
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_7038FBA1 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,14_2_7038FBA1
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_00007FF75D9311B5 Sleep,exit,SetUnhandledExceptionFilter,exit,21_2_00007FF75D9311B5

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtReadVirtualMemory: Direct from: 0x7FF7AFD38157Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeNtQuerySystemInformation: Direct from: 0x703B69BDJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF7AFB083C4Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQueryValueKey: Direct from: 0x14011D93EJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQueryInformationProcess: Direct from: 0x7FF7AFC3DBC6Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtClose: Indirect: 0x14012000F
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF75D9354B2Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF7AFAFD662Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF7AFBCFAA7Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtCreateThreadEx: Direct from: 0x7FF7AFAF58E9Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF7AFB089F2Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQueryInformationToken: Direct from: 0x7FF75DA0FAA7Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtProtectVirtualMemory: Direct from: 0x7FF75DB8A53BJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtSetInformationProcess: Direct from: 0x7FF7AFBB1488Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF75D93F982Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtProtectVirtualMemory: Direct from: 0x7FF75DB8C696Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtClose: Direct from: 0x7FF7AFD3B06D
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FFE221C26A1Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtCreateThreadEx: Direct from: 0x7FF75D935763Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtSetInformationProcess: Direct from: 0x7FF75D9F1488Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF75D9489F2Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF7AFC08EFBJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeNtProtectVirtualMemory: Direct from: 0x6BC1E702Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtProtectVirtualMemory: Direct from: 0x7FF75D9DF77BJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtMapViewOfSection: Direct from: 0x7FF7AFD3C1EEJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtClose: Direct from: 0x7FF7AFD3D883
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x14011D808Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQueryValueKey: Direct from: 0x7FF75DA12D50Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtClose: Direct from: 0x7FF75DB7D86F
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtCreateFile: Direct from: 0x7FF75DB7B04FJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtReadFile: Direct from: 0x7FF7AFBAB9B1Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtCreateFile: Direct from: 0x7FF75DB78306Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQueryInformationProcess: Direct from: 0x7FF7AFD43CF1Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF7AFC0CA8AJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtSetInformationProcess: Direct from: 0x7FF7AFBB2A59Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQueryInformationToken: Direct from: 0x7FF75DA48EFBJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtReadFile: Direct from: 0x7FF75D9EB9B1Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtClose: Direct from: 0x7FF7AFD3D891
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF7AFC10D29Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeNtSetInformationThread: Direct from: 0x70305A36Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtProtectVirtualMemory: Direct from: 0x7FF75D9E3CC4Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtSetInformationProcess: Direct from: 0x7FF75D9F2A59Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtReadVirtualMemory: Direct from: 0x7FF75DB78157Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF7AFC0B813Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtOpenKeyEx: Direct from: 0x7FF7AFBD2816Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQueryValueKey: Direct from: 0x7FF7AFBD358AJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQuerySystemInformation: Direct from: 0x7FF75D9DF231Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtCreateFile: Direct from: 0x7FF75D9E3AEDJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF75D93D662Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF7AFBAD5CDJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQueryValueKey: Direct from: 0x7FF75DA13891Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF7AFD3C61CJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeNtProtectVirtualMemory: Direct from: 0x6C502CCCJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtCreateFile: Direct from: 0x7FF7AFBA3AEDJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtProtectVirtualMemory: Direct from: 0x7FF75DB7C1EEJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtClose: Direct from: 0x7FF75DB7D883
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtClose: Direct from: 0x7FF7AFBD3107
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF75D9ED5CDJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF7AFAF54B2Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQueryValueKey: Direct from: 0x7FF7AFBD323CJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF7AFB9F231Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtClose: Direct from: 0x7FF75DB7B06D
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtProtectVirtualMemory: Direct from: 0x7FF75DB8C5BEJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtClose: Direct from: 0x14011D864
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtCreateThreadEx: Direct from: 0x7FF75D9358E9Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FFE221E4B5EJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF75DA50D29Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF75DA4B813Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtClose: Direct from: 0x7FF7AFBB20AB
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtProtectVirtualMemory: Direct from: 0x7FF75D9D43A1Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQueryInformationProcess: Direct from: 0x7FF75D9F1568Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtClose: Direct from: 0x7FF75DB7D891
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtSetInformationThread: Direct from: 0x7FF7AFD4A53BJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQueryValueKey: Direct from: 0x7FF75DA1323CJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeNtProtectVirtualMemory: Direct from: 0x76EF7B2EJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQueryInformationProcess: Direct from: 0x7FF7AFBB1568Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF75D9F20ABJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQuerySystemInformation: Direct from: 0x7FF75DB83CF1Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtCreateThreadEx: Direct from: 0x7FF7AFAF5763Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtClose: Direct from: 0x7FF75DA13107
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtSetInformationProcess: Direct from: 0x7FF7AFB943A1Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtOpenKeyEx: Direct from: 0x7FF75DA12816Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQueryValueKey: Direct from: 0x7FF75DA1358AJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF75DB7C61CJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeNtProtectVirtualMemory: Direct from: 0x6C342D61Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQueryInformationProcess: Direct from: 0x7FF7AFBB1B62Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF7AFB0C1E1Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtReadFile: Direct from: 0x14011D832Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQueryInformationProcess: Direct from: 0x7FF75D9F1B62Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQueryValueKey: Direct from: 0x7FF7AFBD3891Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtSetInformationProcess: Direct from: 0x7FF7AFB9F77BJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF75D9EB954Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQuerySystemInformation: Direct from: 0x7FF75DA4CA8AJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtCreateFile: Direct from: 0x14011D7A4Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQuerySystemInformation: Direct from: 0x7FF75DA7DBC6Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtQueryValueKey: Direct from: 0x7FF7AFBD2D50Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtCreateFile: Direct from: 0x7FF7AFD3B04FJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtClose: Direct from: 0x7FF7AFD3D86F
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x7FF7AFBAB954Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtAllocateVirtualMemory: Direct from: 0x140120A3CJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeNtCreateFile: Direct from: 0x7FF7AFD38306Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe protection: read writeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe protection: read writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe protection: read writeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe base: 14011BC08Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe base: 3BD010Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe base: 14011BC08Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe base: 305010Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014000BFFC CharLowerW,lstrcmpiW,lstrcmpiW,lstrlenW,lstrlenW,lstrcmpiW,lstrcmpW,lstrlenW,GetActiveWindow,GetTempPathW,lstrlenW,GetModuleFileNameW,CopyFileW,MessageBoxW,lstrlenW,ShellExecuteW,GetModuleFileNameW,CharLowerW,lstrlenW,21_2_000000014000BFFC
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeJump to behavior
                  Source: Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: )[%d] Shell_TrayWndTrayNotifyWnd
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeCode function: 13_2_01015935 cpuid 13_2_01015935
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,13_2_0100821F
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exeCode function: 3_2_00007FF6DC611128 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,3_2_00007FF6DC611128
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_000000014000EE50 GetDlgItem,GetUserNameW,wsprintfW,GetDlgItem,SetWindowTextW,GetDlgItem,SetWindowTextW,21_2_000000014000EE50
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeCode function: 21_2_0000000140026184 GetTimeZoneInformation,21_2_0000000140026184
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeCode function: 13_2_0100737C __EH_prolog3_GS,GetVersionExW,13_2_0100737C
                  Source: C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exeCode function: 13_2_0101289C __EH_prolog3_GS,?StartDefer@Element@DirectUI@@SGXXZ,??2@YAPAXI@Z,??0CRMDUIParser@@QAE@XZ,?LoadAndCreateElement@CRMDUIParser@@QAEJIPB_WPAPAVElement@DirectUI@@PAV23@K0@Z,GetForegroundWindow,?Initialize@NativeHWNDHost@DirectUI@@QAEJPB_W0PAUHWND__@@PAUHICON__@@HHHHHHHPAUHINSTANCE__@@I@Z,?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ,?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ,GetSystemMenu,RemoveMenu,?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ,SetWindowPos,?RMLoadIcon@@YGPAUHICON__@@PB_WK0@Z,?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ,SendMessageW,?RMLoadString@@YGIIPA_WIKPB_W@Z,?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ,SetWindowTextW,?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ,?Create@HWNDElement@DirectUI@@SGJPAUHWND__@@_NI1PAPAVElement@2@@Z,?Host@NativeHWNDHost@DirectUI@@QAEXPAVElement@2@@Z,?AddListener@Element@DirectUI@@QAEJPAUIElementListener@2@@Z,?Add@Element@DirectUI@@QAEJPAV12@@Z,?Attach@CRMDUIParser@@QAEJPAVElement@DirectUI@@@Z,?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ,BuildDropTarget,?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ,?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ,PostMessageW,?EndDefer@Element@DirectUI@@SGXXZ,13_2_0101289C
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_7031401E ??0?$ListenedElementPtr@VElement@DirectUI@@@DirectUI@@QAE@PAVElement@1@@Z,?AddListener@Element@DirectUI@@QAEJPAUIElementListener@2@@Z,14_2_7031401E
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_70314074 ?OnListenerDetach@?$ListenedElementPtr@VElement@DirectUI@@@DirectUI@@UAEXPAVElement@2@@Z,14_2_70314074
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_70314048 ??1?$ListenedElementPtr@VElement@DirectUI@@@DirectUI@@QAE@XZ,?RemoveListener@Element@DirectUI@@QAEXPAUIElementListener@2@@Z,14_2_70314048
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_703140BA ??0?$IElementListenerImpl@VDialogHWNDHost@DirectUI@@@DirectUI@@QAE@ABV01@@Z,14_2_703140BA
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_70314080 ?OnListenedWindowMessage@?$IElementListenerImpl@VElement@DirectUI@@@DirectUI@@UAE_NPAVElement@2@PAUHWND__@@IIJPAJ@Z,14_2_70314080
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_703140D8 ??4?$IElementListenerImpl@VElement@DirectUI@@@DirectUI@@QAEAAV01@ABV01@@Z,14_2_703140D8
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_703140CA ??0?$IElementListenerImpl@VDialogHWNDHost@DirectUI@@@DirectUI@@QAE@XZ,14_2_703140CA
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_703141B1 ??1PopupWindow@DirectUI@@UAE@XZ,__EH_prolog3,??1?$ListenedElementPtr@VElement@DirectUI@@@DirectUI@@QAE@XZ,14_2_703141B1
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_703141F2 ??_F?$ListenedElementPtr@VElement@DirectUI@@@DirectUI@@QAEXXZ,14_2_703141F2
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_7033F27F ?AddListener@Element@DirectUI@@QAEJPAUIElementListener@2@@Z,14_2_7033F27F
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_7033F2E8 ?RemoveListener@Element@DirectUI@@QAEXPAUIElementListener@2@@Z,14_2_7033F2E8
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_70313E26 ??0?$ListenedElementPtr@VElement@DirectUI@@@DirectUI@@QAE@ABV01@@Z,14_2_70313E26
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_70313E18 ??0?$IElementListenerImpl@VElement@DirectUI@@@DirectUI@@QAE@XZ,14_2_70313E18
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_70313E08 ??0?$IElementListenerImpl@VElement@DirectUI@@@DirectUI@@QAE@ABV01@@Z,14_2_70313E08
                  Source: C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exeCode function: 14_2_70313E45 ??4?$ListenedElementPtr@VElement@DirectUI@@@DirectUI@@QAEAAV01@ABV01@@Z,14_2_70313E45
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure1
                  Replication Through Removable Media
                  2
                  Native API
                  11
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  1
                  Deobfuscate/Decode Files or Information
                  11
                  Input Capture
                  2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts3
                  Command and Scripting Interpreter
                  Boot or Logon Initialization Scripts1
                  Abuse Elevation Control Mechanism
                  1
                  Abuse Elevation Control Mechanism
                  LSASS Memory11
                  Peripheral Device Discovery
                  Remote Desktop Protocol1
                  Screen Capture
                  1
                  Non-Application Layer Protocol
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
                  DLL Side-Loading
                  3
                  Obfuscated Files or Information
                  Security Account Manager1
                  Account Discovery
                  SMB/Windows Admin Shares11
                  Input Capture
                  1
                  Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                  Access Token Manipulation
                  2
                  Software Packing
                  NTDS5
                  File and Directory Discovery
                  Distributed Component Object Model2
                  Clipboard Data
                  Protocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  11
                  DLL Side-Loading
                  LSA Secrets146
                  System Information Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                  Masquerading
                  Cached Domain Credentials131
                  Security Software Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Virtualization/Sandbox Evasion
                  DCSync1
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Access Token Manipulation
                  Proc Filesystem2
                  Process Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                  Process Injection
                  /etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1586718 Sample: K3UtwU3CH9.msi Startdate: 09/01/2025 Architecture: WINDOWS Score: 88 81 plerukilo0.site 2->81 91 Malicious sample detected (through community Yara rule) 2->91 93 Yara detected UAC Bypass using CMSTP 2->93 95 Machine Learning detection for dropped file 2->95 97 2 other signatures 2->97 11 msiexec.exe 2->11         started        13 Dashboard.exe 1 2->13         started        16 Dashboard.exe 1 2->16         started        18 msiexec.exe 7 2->18         started        signatures3 process4 file5 21 msiexec.exe 55 11->21         started        105 Maps a DLL or memory area into another process 13->105 107 Found direct / indirect Syscall (likely to bypass EDR) 13->107 24 cmd.exe 2 13->24         started        27 cmd.exe 1 16->27         started        61 C:\Users\user\AppData\Local\...\MSI3B8B.tmp, PE32 18->61 dropped 63 C:\Users\user\AppData\Local\...\MSI3996.tmp, PE32 18->63 dropped signatures6 process7 file8 65 C:\Users\user\AppData\Local\...\UXCore.dll, PE32 21->65 dropped 67 C:\Users\user\AppData\Local\...\Dashboard.exe, PE32 21->67 dropped 69 C:\Users\user\AppData\...\_isres_0x0409.dll, PE32 21->69 dropped 73 3 other files (2 malicious) 21->73 dropped 29 Dashboard.exe 6 21->29         started        33 ISBEW64.exe 21->33         started        35 ISBEW64.exe 21->35         started        43 8 other processes 21->43 71 C:\Users\user\AppData\Local\Temp\snfgsgf, PE32+ 24->71 dropped 101 Writes to foreign memory regions 24->101 103 Maps a DLL or memory area into another process 24->103 37 MLE_Config_beta.exe 24->37         started        39 conhost.exe 24->39         started        41 conhost.exe 27->41         started        signatures9 process10 file11 75 C:\Users\user\AppData\Roaming\...\UXCore.dll, PE32 29->75 dropped 77 C:\Users\user\AppData\...\Dashboard.exe, PE32 29->77 dropped 79 C:\Users\user\AppData\Roaming\...\msvcr80.dll, PE32 29->79 dropped 115 Switches to a custom stack to bypass stack traces 29->115 117 Found direct / indirect Syscall (likely to bypass EDR) 29->117 45 Dashboard.exe 1 29->45         started        signatures12 process13 signatures14 109 Maps a DLL or memory area into another process 45->109 111 Switches to a custom stack to bypass stack traces 45->111 113 Found direct / indirect Syscall (likely to bypass EDR) 45->113 48 cmd.exe 5 45->48         started        process15 file16 57 C:\Users\user\AppData\Local\Temp\xvjmsqbp, PE32+ 48->57 dropped 59 C:\Users\user\AppData\...\MLE_Config_beta.exe, PE32+ 48->59 dropped 83 Writes to foreign memory regions 48->83 85 Found hidden mapped module (file has been removed from disk) 48->85 87 Maps a DLL or memory area into another process 48->87 89 Switches to a custom stack to bypass stack traces 48->89 52 MLE_Config_beta.exe 48->52         started        55 conhost.exe 48->55         started        signatures17 process18 signatures19 99 Found direct / indirect Syscall (likely to bypass EDR) 52->99

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  K3UtwU3CH9.msi8%ReversingLabs
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\xvjmsqbp100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\snfgsgf100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\MSI3996.tmp0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\MSI3B8B.tmp0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISRT.dll0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\_isres_0x0409.dll0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exe0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\UXCore.dll9%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\msvcr80.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe0%ReversingLabs
                  C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\UXCore.dll9%ReversingLabs
                  C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\msvcr80.dll0%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://plerukilo0.site/LzM0%Avira URL Cloudsafe
                  https://plerukilo0.site/bM0%Avira URL Cloudsafe
                  https://plerukilo0.site/6M0%Avira URL Cloudsafe
                  https://plerukilo0.site/fM0%Avira URL Cloudsafe
                  https://plerukilo0.site/2M0%Avira URL Cloudsafe
                  http://www.softwareok.de/?Download=Find.Same.Images.OK0%Avira URL Cloudsafe
                  https://plerukilo0.site/ZM0%Avira URL Cloudsafe
                  https://plerukilo0.site/0%Avira URL Cloudsafe
                  https://plerukilo0.site/vM0%Avira URL Cloudsafe
                  https://plerukilo0.site/environment-canaY0%Avira URL Cloudsafe
                  https://plerukilo0.site/.M0%Avira URL Cloudsafe
                  https://plerukilo0.site/rM0%Avira URL Cloudsafe
                  http://ie.search.msn.com/0%Avira URL Cloudsafe
                  https://plerukilo0.site/g0%Avira URL Cloudsafe
                  https://plerukilo0.site/nM0%Avira URL Cloudsafe
                  http://www.softwareok.de/?Freeware/Find.Same.Images.OK0%Avira URL Cloudsafe
                  https://plerukilo0.site/jM0%Avira URL Cloudsafe
                  http://runonce.msn.com/?v=msgrv750%Avira URL Cloudsafe
                  https://plerukilo0.site/NNM0%Avira URL Cloudsafe
                  https://plerukilo0.site:4430%Avira URL Cloudsafe
                  https://plerukilo0.site/k0%Avira URL Cloudsafe
                  http://www.softwareok.de/?seite=faq-Find.Same.Images.OK&faq=00%Avira URL Cloudsafe
                  http://www.softwareok.de/?Freeware/Find.Same.Images.OK/History0%Avira URL Cloudsafe
                  https://plerukilo0.site/:M0%Avira URL Cloudsafe
                  https://plerukilo0.site/environment-canada-s-biosphere?vmkjypkrumtk=ey7u2s8PuxSar298wfGYABIRHbA4eVhz0%Avira URL Cloudsafe
                  https://plerukilo0.site/N&M0%Avira URL Cloudsafe
                  https://plerukilo0.site/L0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  plerukilo0.site
                  unknown
                  unknownfalse
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://plerukilo0.site/fMMLE_Config_beta.exe, 00000015.00000003.2122929016.00000000004CC000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2123102167.00000000004D0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.vmware.com/0Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://plerukilo0.site/bMMLE_Config_beta.exe, 00000015.00000002.2131867899.00000000004C9000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2131389036.00000000004C9000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.softwareok.com/?Freeware/Find.Same.Images.OK/Historycmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://plerukilo0.site/LzMMLE_Config_beta.exe, 00000015.00000003.2127632449.00000000004C9000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.softwareok.com/?Freeware/Find.Same.Images.OKcmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.softwareok.de/?Download=Find.Same.Images.OKcmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://plerukilo0.site/ZMMLE_Config_beta.exe, 00000015.00000003.2125904304.00000000004CA000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.vmware.com/0/Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://plerukilo0.site/6MMLE_Config_beta.exe, 00000015.00000003.2127632449.00000000004C9000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2121519247.00000000004D1000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2120026657.00000000004D0000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2119825749.00000000004CA000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://plerukilo0.site/vMMLE_Config_beta.exe, 00000015.00000003.2124413253.00000000004CB000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2124349794.00000000004C9000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.softwareok.com/?seite=faq-Find.Same.Images.OK&faq=0cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://plerukilo0.site/MLE_Config_beta.exe, 00000015.00000002.2131691175.000000000048A000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2115376077.00000000004CA000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://plerukilo0.site/2MMLE_Config_beta.exe, 00000015.00000003.2121519247.00000000004D1000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2120026657.00000000004D0000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2119825749.00000000004CA000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://plerukilo0.site/environment-canaYMLE_Config_beta.exe, 00000015.00000002.2131691175.0000000000498000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://plerukilo0.site/rMMLE_Config_beta.exe, 00000015.00000003.2116592118.00000000004CA000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2117988162.00000000004D0000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2121519247.00000000004D1000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2117930955.00000000004C7000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2120026657.00000000004D0000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2119825749.00000000004CA000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.???.xx/?search=%sDashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000000.1952616443.00000001401E0000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://ie.search.msn.com/Dashboard.exefalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.symauth.com/cps0(Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://plerukilo0.site/.MMLE_Config_beta.exe, 00000015.00000003.2119331870.00000000004C7000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2121519247.00000000004D1000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2119562347.00000000004D0000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2120026657.00000000004D0000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2119825749.00000000004CA000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://plerukilo0.site/nMMLE_Config_beta.exe, 00000015.00000003.2116592118.00000000004CA000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://plerukilo0.site/NNMMLE_Config_beta.exe, 00000015.00000003.2125904304.00000000004CA000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://plerukilo0.site/jMMLE_Config_beta.exe, 00000015.00000003.2116592118.00000000004CA000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2117988162.00000000004D0000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2117930955.00000000004C7000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://runonce.msn.com/?v=msgrv75Dashboard.exefalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.softwareok.de/?Freeware/Find.Same.Images.OKcmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://plerukilo0.site/FMMLE_Config_beta.exe, 00000015.00000003.2125904304.00000000004CA000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://plerukilo0.site/gMLE_Config_beta.exe, 00000015.00000002.2131691175.000000000048A000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://plerukilo0.site:443MLE_Config_beta.exe, 00000015.00000003.2119913004.00000000004A4000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2116633662.00000000004A4000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2119384391.00000000004A4000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://plerukilo0.site/BMMLE_Config_beta.exe, 00000015.00000003.2121519247.00000000004D1000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://plerukilo0.site/kMLE_Config_beta.exe, 00000015.00000002.2131691175.000000000048A000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.symauth.com/rpa00Dashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.softwareok.de/?seite=faq-Find.Same.Images.OK&faq=0cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.softwareok.deDashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000000.1952616443.00000001401E0000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://plerukilo0.site/environment-canada-s-biosphere?vmkjypkrumtk=ey7u2s8PuxSar298wfGYABIRHbA4eVhzMLE_Config_beta.exe, 00000015.00000002.2131691175.00000000004AA000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2115376077.00000000004CA000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2119825749.00000000004CA000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://plerukilo0.site/:MMLE_Config_beta.exe, 00000015.00000003.2125904304.00000000004CA000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.info-zip.org/Dashboard.exe, 0000000D.00000002.1722528788.000000000913B000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.000000000914D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.00000000025C0000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.0000000009129000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B30000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009130000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D2B000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.softwareok.de/?Freeware/Find.Same.Images.OK/Historycmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://plerukilo0.site/N&MMLE_Config_beta.exe, 00000015.00000003.2124413253.00000000004CB000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2124349794.00000000004C9000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.softwareok.com/?Download=Find.Same.Images.OKcmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://plerukilo0.site/RMMLE_Config_beta.exe, 00000015.00000003.2127632449.00000000004C9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://www.surfok.de/cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://plerukilo0.site/LMLE_Config_beta.exe, 00000015.00000002.2131867899.00000000004C9000.00000004.00000020.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000003.2131389036.00000000004C9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.softwareok.comDashboard.exe, 0000000D.00000002.1722528788.0000000009191000.00000004.00000020.00020000.00000000.sdmp, Dashboard.exe, 0000000E.00000002.1780617372.00000000091A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, MLE_Config_beta.exe, 00000015.00000000.1952616443.00000001401E0000.00000002.00000001.01000000.0000000D.sdmp, MLE_Config_beta.exe, 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Dashboard.exe, 00000016.00000002.2159661824.000000000917F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Dashboard.exe, 0000001C.00000002.2272864695.0000000009186000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    No contacted IP infos
                                                    Joe Sandbox version:42.0.0 Malachite
                                                    Analysis ID:1586718
                                                    Start date and time:2025-01-09 14:50:56 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 10m 19s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:32
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:1
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:K3UtwU3CH9.msi
                                                    renamed because original name is a hash value
                                                    Original Sample Name:468ff3b01cb98f3bb68e99b07d04c29869abc2e5c4ba3b8f075658e6121d0cd4.msi
                                                    Detection:MAL
                                                    Classification:mal88.expl.evad.winMSI@43/25@2/0
                                                    EGA Information:
                                                    • Successful, ratio: 50%
                                                    HCA Information:Failed
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .msi
                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, consent.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                    • Excluded IPs from analysis (whitelisted): 172.202.163.200, 173.222.162.32, 13.107.253.45
                                                    • Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, www.bing.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                    • Execution Graph export aborted for target Dashboard.exe, PID 1908 because there are no executed function
                                                    • Execution Graph export aborted for target Dashboard.exe, PID 5756 because there are no executed function
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • VT rate limit hit for: K3UtwU3CH9.msi
                                                    TimeTypeDescription
                                                    08:52:12API Interceptor1x Sleep call for process: cmd.exe modified
                                                    08:52:24API Interceptor40x Sleep call for process: MLE_Config_beta.exe modified
                                                    13:52:07AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BIT85B3.tmp
                                                    13:52:21AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AltnodeSC_alphav1.lnk
                                                    No context
                                                    No context
                                                    No context
                                                    No context
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe24EPV9vjc5.exeGet hashmaliciousUnknownBrowse
                                                      VmjvNTbD5J.exeGet hashmaliciousUnknownBrowse
                                                        1wrLmYiC62.exeGet hashmaliciousUnknownBrowse
                                                          vV5EOx0ipU.exeGet hashmaliciousUnknownBrowse
                                                            kXzODlqJak.exeGet hashmaliciousUnknownBrowse
                                                              8Rmoal0v85.exeGet hashmaliciousUnknownBrowse
                                                                cLm7ThwEvh.msiGet hashmaliciousUnknownBrowse
                                                                  LVkAi4PBv6.exeGet hashmaliciousUnknownBrowse
                                                                    w3245.exeGet hashmaliciousUnknownBrowse
                                                                      w3245.exeGet hashmaliciousUnknownBrowse
                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):2364728
                                                                        Entropy (8bit):6.606009669324617
                                                                        Encrypted:false
                                                                        SSDEEP:49152:lbCT2kOGRpfJMi3kLRQrjYgeeZyTDwMHfDYZNBi:TkOKMiY0BZMHfDYZNBi
                                                                        MD5:967F4470627F823F4D7981E511C9824F
                                                                        SHA1:416501B096DF80DDC49F4144C3832CF2CADB9CB2
                                                                        SHA-256:B22BF1210B5FD173A210EBFA9092390AA0513C41E1914CBE161EB547F049EF91
                                                                        SHA-512:8883EAD428C9D4B415046DE9F8398AA1F65AE81FE7945A840C822620E18F6F9930CCE2E10ACFF3B5DA8B9C817ADE3DABC1DE576CBD255087267F77341900A41C
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Joe Sandbox View:
                                                                        • Filename: 24EPV9vjc5.exe, Detection: malicious, Browse
                                                                        • Filename: VmjvNTbD5J.exe, Detection: malicious, Browse
                                                                        • Filename: 1wrLmYiC62.exe, Detection: malicious, Browse
                                                                        • Filename: vV5EOx0ipU.exe, Detection: malicious, Browse
                                                                        • Filename: kXzODlqJak.exe, Detection: malicious, Browse
                                                                        • Filename: 8Rmoal0v85.exe, Detection: malicious, Browse
                                                                        • Filename: cLm7ThwEvh.msi, Detection: malicious, Browse
                                                                        • Filename: LVkAi4PBv6.exe, Detection: malicious, Browse
                                                                        • Filename: w3245.exe, Detection: malicious, Browse
                                                                        • Filename: w3245.exe, Detection: malicious, Browse
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:<..To..To..To.:.o..To...o..To.:9o..To.:.o..To.:/o..To..Uoe.To...o|.To...o..To...o..To...o..ToRich..To................PE..d...^.?e..........#......H.....................@..............................%.....h.$.....................................................XW..,........q...p..$h....#.8)......................................(....................`...............................text...RG.......H.................. ..`.rdata..R/...`...0...L..............@..@.data................|..............@....pdata..$h...p...j..................@..@Shared...............p..............@....tls.................x..............@....rsrc....q.......r...z..............@..@................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):176032
                                                                        Entropy (8bit):6.237539940128702
                                                                        Encrypted:false
                                                                        SSDEEP:3072:opnAfE+giQ322hTQxecDHudFJhIA+iM7kD5zZPE5oytDMu:oRUQth08oa7JsOJ3owu
                                                                        MD5:A0E940A3D3C1523416675125E3B0C07E
                                                                        SHA1:2E29EEBA6DA9A4023BC8071158FEEE3B0277FD1B
                                                                        SHA-256:B8FA7AA425E4084EA3721780A13D11E08B8D53D1C5414B73F22FAECA1BFD314F
                                                                        SHA-512:736EA06824388372AEEF1938C6B11E66F4595E0B0589D7B4A87FF4ABBABE52E82DFF64D916293EAB47AA869CF372CED2C66755DD8A8471B2AB0D3A37BA91D0B2
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........h`....S...S...S...S...SA..S...S...S...S...S...S.~.S...S...S...S.~.S...SA..S...SA..S...SA..S...S...S...SA..S...SRich...S........PE..L...J.,a...........!......................................................................@..........................B..a...t5..........h...............................................................@............................................text............................... ..`.rdata..............................@..@.data...41...P......................@....rsrc...h............@..............@..@.reloc..rH.......J...F..............@..B........................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\System32\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):2639799
                                                                        Entropy (8bit):7.016165064226519
                                                                        Encrypted:false
                                                                        SSDEEP:49152:faOS6j4wt3618wn6DNEYJEImTRCjE0/NWOkBHM9jmOl2r3Nb7Sm:1S6j4wt36yFD3JlXJfwdXR
                                                                        MD5:60FAE6ACF78AEFCB6AB22DD0C98776CA
                                                                        SHA1:994DB94E2320587CF4C6BE70FF3D2A90FEF1D645
                                                                        SHA-256:2CD8DD23C4DE532047C214E14392D3E3B1B736D9F2412C981A5B5D3087AA893C
                                                                        SHA-512:E968F2E54952E4175CE098D07200DDBB9D24184D5991A2028B5FD797052DA355991A208DBB517A12FAE1153581608F020BFF95CD6B1F3EAA492C51BB97538D7D
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.........h.[...[...[.......R.......C.......Z.......................\.......Z......^.......L...[...........#.......Z.......Z...[..Z.......Z...Rich[...........................PE..L.....,a...........!.....N...........C.......p...............................P............@.........................@Z..g;..l4.......@....................... ...6...w..8...........................H...@............p..0... /.......................text...bI.......J.................. ..`.orpc... ....`.......N.............. ..`.rdata...%...p...&...R..............@..@.data...8............x..............@....rsrc........@.......f..............@..@.reloc...$... ...&...F..............@..B........................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):5740087
                                                                        Entropy (8bit):7.746216716550298
                                                                        Encrypted:false
                                                                        SSDEEP:98304:YnkHU0+KWpIm3UgMh/anD/xiwqKGutajFkMAQpGxI99YIwtSUzlKikAcP26qQ3P8:4T/xiwdjYjFkMOXB9kvP2NQ3PFoEw
                                                                        MD5:87FF4265A46BC23CFC4D5080FFFFDD30
                                                                        SHA1:EDD714111384FB49BAE02393C74C7B1F3935E8A4
                                                                        SHA-256:94B5BD5FBB6ED427B8152DD1FD81654E07A3B5BDDF44D56B3C777AC871544733
                                                                        SHA-512:439E030B0381828859FE912BC64416A86D35B65F2A5D390E40C389974FA02CF3527943CC2DD2FD492FF6979E87FDFCAA1FEB64DF97B6A91158617F44AE8FECA5
                                                                        Malicious:false
                                                                        Preview:...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...].........4...........9......./..8......./......./...]...]...]...]...]...]...]...]...]...]...]...]...3...<...8...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...].../...8...)...8...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]......x...>...2...........8...6...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...m...j...]...]...]...]...]...]...]...]...]...]...]
                                                                        Process:C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):5740087
                                                                        Entropy (8bit):7.746216683209702
                                                                        Encrypted:false
                                                                        SSDEEP:98304:HnkHU0+KWpIm3UgMh/anD/xiwqKGutajFkMAQpGxI99YIwtSUzlKikAcP26qQ3P8:3T/xiwdjYjFkMOXB9kvP2NQ3PFoEw
                                                                        MD5:B3769C1E5DAE1CFB7C9929A987296BF0
                                                                        SHA1:0D25BABEE640500D58F1713A9022FC7B77E4683D
                                                                        SHA-256:EA9A0449D275C308FF6BC0657848384F4ADB64A35068F55E415034117999B2C4
                                                                        SHA-512:F58CF79971D02031818897393D5419A799C3F2E6C7BBABAFEF33BDD37D5B91CDD594A0C9F4A851D92933156DE3FF19751F2841FB272291AC667DF5D049F33D30
                                                                        Malicious:false
                                                                        Preview:...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...].........4...........9......./..8......./......./...]...]...]...]...]...]...]...]...]...]...]...]...3...<...8...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...].../...8...)...8...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]......x...>...2...........8...6...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...m...j...]...]...]...]...]...]...]...]...]...]...]
                                                                        Process:C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):5740087
                                                                        Entropy (8bit):7.746216835198383
                                                                        Encrypted:false
                                                                        SSDEEP:98304:lnkHU0+KWpIm3UgMh/anD/xiwqKGutajFkMAQpGxI99YIwtSUzlKikAcP26qQ3P8:BT/xiwdjYjFkMOXB9kvP2NQ3PFoEw
                                                                        MD5:C4C7D539B318793F2BC3381A6BE20BFC
                                                                        SHA1:8F2B898B77D2BF801B3A600290CCFEF134D87241
                                                                        SHA-256:450107E421173687214B07C068AF0D018BDAD49A60625986EFD5328CFF7054C3
                                                                        SHA-512:04875A850ACC4A263A449925C680EA990919B635A91D5711C482180274A58C7EC9D4B6263CC962239A210B7C69AB9509AC409741B3D180A808DB494E8CE06FFC
                                                                        Malicious:false
                                                                        Preview:...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...].........4...........9......./..8......./......./...]...]...]...]...]...]...]...]...]...]...]...]...3...<...8...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...].../...8...)...8...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]......x...>...2...........8...6...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...]...m...j...]...]...]...]...]...]...]...]...]...]...]
                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Jan 9 12:51:50 2025, mtime=Thu Jan 9 12:51:50 2025, atime=Thu Jan 9 12:51:48 2025, length=145264, window=hide
                                                                        Category:dropped
                                                                        Size (bytes):941
                                                                        Entropy (8bit):5.0291786030268275
                                                                        Encrypted:false
                                                                        SSDEEP:12:8MYRfy4I+xHSWCyqdY//ncRSLm/SG2KTLEMrIg9IjAL2mrH5zVJ1aCPBmV:8v9VjW+URsmj2UL5raAn7rBPBm
                                                                        MD5:0695ECFB28C6D302402C84FE90E2A6CC
                                                                        SHA1:28B3F99007C0EE886FD028E4F36E682F648A6CE8
                                                                        SHA-256:AF8262BA151D9C20E2C9E49A15AEA035E9991677ACB4E819A786EBD33950C094
                                                                        SHA-512:2133BC05DCC1C908E7B3CAEDD3C4F51F46A6FF8C9927D332D4A252EB312DDB7EE0CA9A3EE74A66500EB28AF05E2259913191441CC003BFF0421370CEB4A8A9E3
                                                                        Malicious:false
                                                                        Preview:L..................F.... ........b....M..b..!...b..p7........................:..DG..Yr?.D..U..k0.&...&......vk.v....6tF..b.....b......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^)Zwn...........................%..A.p.p.D.a.t.a...B.V.1.....)Zzn..Roaming.@......CW.^)Zzn..........................'z..R.o.a.m.i.n.g.....n.1.....)Zzn..LOADUP~1..V......)Zzn)Zzn..........................~...L.o.a.d.u.p.d.a.t.e.X.i._.a.l.p.h.a.....h.2.p7..)Zyn .DASHBO~1.EXE..L......)Zzn)Zzn....%.........................D.a.s.h.b.o.a.r.d...e.x.e.......n...............-.......m............Q.......C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe........\.....\.R.o.a.m.i.n.g.\.L.o.a.d.u.p.d.a.t.e.X.i._.a.l.p.h.a.\.D.a.s.h.b.o.a.r.d...e.x.e.`.......X.......965543...........hT..CrF.f4... ...T..b...,.......hT..CrF.f4... ...T..b...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                        File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):2642944
                                                                        Entropy (8bit):6.7314423556583804
                                                                        Encrypted:false
                                                                        SSDEEP:49152:kkrsBvSl7gM/JK9mZizLmri8lZwREhKR3UX724jkmkz7r9lnxgFwS/LFi9TA8Bb/:BQBvqQL9cK+kRI5LErom
                                                                        MD5:618CCBDF42C7361FA8D657C44074C75A
                                                                        SHA1:3A38274662D7C947714A4C3A4A379A5004044DAC
                                                                        SHA-256:3C6B787B6B1852AF7D40E1407CE548E5B2657FD688BCED5069E3CBE93CF46B6F
                                                                        SHA-512:F0D6F0F3D0130D7CA448CD70A1FB8ECC5E503C096613F95E118E9EDE2DBC4EF47B5ABC31C6D0A08AD294126E4C27E348C5F3646A90CA436513F42933C5B4120D
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......[..................%..@(..f..W..........@.............................@/.......(...`... ......................................................./.8.....'..k........... /...............................'.(...................X................................text...8.%.......%.................`..`.data.........%.......%.............@....rdata........&.......&.............@..@.pdata...k....'..l...t'.............@..@.xdata...R....(..T....'.............@..@.bss....`e...p(..........................idata...............4(.............@....CRT....0............:(.............@....tls........../......<(.............@....rsrc...8...../......>(.............@..@.reloc....... /......@(.............@..Bhwafy........0/......D(.............@...................................................................................................................................
                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                        File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):2642944
                                                                        Entropy (8bit):6.7314423556583804
                                                                        Encrypted:false
                                                                        SSDEEP:49152:kkrsBvSl7gM/JK9mZizLmri8lZwREhKR3UX724jkmkz7r9lnxgFwS/LFi9TA8Bb/:BQBvqQL9cK+kRI5LErom
                                                                        MD5:618CCBDF42C7361FA8D657C44074C75A
                                                                        SHA1:3A38274662D7C947714A4C3A4A379A5004044DAC
                                                                        SHA-256:3C6B787B6B1852AF7D40E1407CE548E5B2657FD688BCED5069E3CBE93CF46B6F
                                                                        SHA-512:F0D6F0F3D0130D7CA448CD70A1FB8ECC5E503C096613F95E118E9EDE2DBC4EF47B5ABC31C6D0A08AD294126E4C27E348C5F3646A90CA436513F42933C5B4120D
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......[..................%..@(..f..W..........@.............................@/.......(...`... ......................................................./.8.....'..k........... /...............................'.(...................X................................text...8.%.......%.................`..`.data.........%.......%.............@....rdata........&.......&.............@..@.pdata...k....'..l...t'.............@..@.xdata...R....(..T....'.............@..@.bss....`e...p(..........................idata...............4(.............@....CRT....0............:(.............@....tls........../......<(.............@....rsrc...8...../......>(.............@..@.reloc....... /......@(.............@..Bhwafy........0/......D(.............@...................................................................................................................................
                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):182688
                                                                        Entropy (8bit):5.754161341636684
                                                                        Encrypted:false
                                                                        SSDEEP:3072:cIFNKUw8ALJ+C2T0FSmmiYQT4XF2E+JYHdeZ2bgA/qLTM6:wUn0mT8Sc/T4V1b9xg8N6
                                                                        MD5:40F3A092744E46F3531A40B917CCA81E
                                                                        SHA1:C73F62A44CB3A75933CECF1BE73A48D0D623039B
                                                                        SHA-256:561F14CDECE85B38617403E1C525FF0B1B752303797894607A4615D0BD66F97F
                                                                        SHA-512:1589B27DB29051C772E5BA56953D9F798EFBF74D75E0524FA8569DF092D28960972779811A7916198D0707D35B1093D3E0DD7669A8179C412CFA7DF7120733B2
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e.*.!.D.!.D.!.D../..D.D../..(.D../....D.... .D.!.E.[.D......D.....%.D..... .D.!.. .D..... .D.Rich!.D.........................PE..d...#.,a.........."......X...v.................@....................................fU....`..................................................J..........X.......$...................`t..8...............................p............p...............................text....W.......X.................. ..`.rdata.......p.......\..............@..@.data... B...`.......D..............@....pdata..$............`..............@..@.rsrc...X............v..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
                                                                        Category:dropped
                                                                        Size (bytes):436632
                                                                        Entropy (8bit):7.972710318865142
                                                                        Encrypted:false
                                                                        SSDEEP:6144:Ob9ySl0fcsmxCLCN7zRpT6bHJibmR6KSHg2Vb5eeRWTo22tcZ3u/Gszt2A2//Hr5:OlsmH7z/sDR6Dv9vWsIuusw/4+q90
                                                                        MD5:8AF02BF8E358E11CAEC4F2E7884B43CC
                                                                        SHA1:16BADC6C610EEB08DE121AB268093DD36B56BF27
                                                                        SHA-256:58A724D23C63387A2DDA27CCFDBC8CA87FD4DB671BEA8BB636247667F6A5A11E
                                                                        SHA-512:D0228A8CC93FF6647C2F4BA645FA224DC9D114E2ADB5B5D01670B6DAFC2258B5B1BE11629868748E77B346E291974325E8E8E1192042D7C04A35FC727AD4E3FD
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...........A.YA.YA.Yf.mYG.Y..nY].Y..XC.Y..mY@.Y..mY..Y..lY..Y...Y@.Y...YE.YA.Y..Y...YV.Y..lY..Y..iY@.Y..jY@.YA.4Y@.Y..oY@.YRichA.Y................PE..L.....,a...........!.....z...@...............................................@......................................h...................`....................0.........8...................................................4U..@....................text............P......PEC2MO...... ....rsrc....@.......4...T.............. ....reloc.......0......................@...........................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                        File Type:Generic INItialization configuration [f1]
                                                                        Category:dropped
                                                                        Size (bytes):173
                                                                        Entropy (8bit):5.337626728447826
                                                                        Encrypted:false
                                                                        SSDEEP:3:sYRvqLCAFmxKmzg/5iERcgdYyfwGzk4d1IBBQRuGzYot/Kt2wKXFMJA14uy:sWCVUxKmM/sE6YVfQQ1qQRzqtuMO+uy
                                                                        MD5:1FEEC064551310100E6ABEA6C0D5D0F5
                                                                        SHA1:FAD558106C0887B26EE6DD5FFD0481C579A805D9
                                                                        SHA-256:10C86001815C8A7F9DA2A53852D35FDAE0C101466DAE9D3FA49559E16037C41C
                                                                        SHA-512:84A08E68664AAEC306212B5459B8BE2B0DCE2B60F8B8F0A7B5DD19A99D40C896F32D65518009582562BE32D512B6C7CE0BD24AA4C3CAD34B81C3E3010DE590FF
                                                                        Malicious:false
                                                                        Preview:[SetupDefaults]..LangID=1033..ProductCode={D5CE2740-095B-41D8-8BD7-CD8C6AF97028}..TempPathGuid={914516C0-85F7-4B8C-8A20-48B90586565C}..[f1]..Function=GetSupportFilePathMSI..
                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                        File Type:Unicode text, UTF-16, little-endian text, with very long lines (332), with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):185882
                                                                        Entropy (8bit):3.651612955878899
                                                                        Encrypted:false
                                                                        SSDEEP:1536:jujZLJ6/K41VBrChTHx8Idy2hWA/z+wuUZU6rPsHnQvvOuyMJice1VOL27pt:jqLm1UTR8YW9Coew
                                                                        MD5:082584D94AD26EF710E9EDD4D6E35D65
                                                                        SHA1:E3FD6EC5CB5B01D7C6F9F2A7558EF3300E292EAE
                                                                        SHA-256:8261FD7A996B078497B1875CD875C4B7A8A551C788EE56F618B7C89B181141AF
                                                                        SHA-512:6F81DA8BA3455B426FE8555DA14C0D128BA1E63B19B0BDECC26DDFEC70AFE655290815A0839503A105EF0271DA9DD282E6226236F1A04539D20E4F89996D821B
                                                                        Malicious:false
                                                                        Preview:..C.O.M.P.A.N.Y._.N.A.M.E.=.Y.o.u.r. .C.o.m.p.a.n.y. .N.a.m.e.....D.N._.A.l.w.a.y.s.I.n.s.t.a.l.l.=.A.l.w.a.y.s. .I.n.s.t.a.l.l.....I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.A.C.R.O.B.A.T.5.F.O.L.D.E.R.=. . . .A.d.o.b.e. .A.c.r.o.b.a.t. .5. .n.e.e.d.s. .t.o. .b.e. .i.n.s.t.a.l.l.e.d. .f.o.r. .t.h.i.s. .i.n.s.t.a.l.l.a.t.i.o.n. .t.o. .c.o.n.t.i.n.u.e.......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.A.D.O.B.E.R.E.A.D.E.R.1.0.F.O.L.D.E.R.=.A.d.o.b.e. .R.e.a.d.e.r. .1.0. .n.e.e.d.s. .t.o. .b.e. .i.n.s.t.a.l.l.e.d. .f.o.r. .t.h.i.s. .i.n.s.t.a.l.l.a.t.i.o.n. .t.o. .c.o.n.t.i.n.u.e.......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.A.D.O.B.E.R.E.A.D.E.R.1.1.F.O.L.D.E.R.=.A.d.o.b.e. .R.e.a.d.e.r. .1.1. .n.e.e.d.s. .t.o. .b.e. .i.n.s.t.a.l.l.e.d. .f.o.r. .t.h.i.s. .i.n.s.t.a.l.l.a.t.i.o.n. .t.o. .c.o.n.t.i.n.u.e.......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.A.D.O.B.E.R.E.A.D.E.R.6.F.O.L.D.E.R.=.A.d.o.b.e. .R.
                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):1855595
                                                                        Entropy (8bit):5.675318942505195
                                                                        Encrypted:false
                                                                        SSDEEP:12288:ys4d9dfaOdWEINpJCPtjvntnSb8COevQonCLPub+74v8:chrWlNDCPtjvntnSb8COevQonCfo8
                                                                        MD5:7DE024BC275F9CDEAF66A865E6FD8E58
                                                                        SHA1:5086E4A26F9B80699EA8D9F2A33CEAD28A1819C0
                                                                        SHA-256:BD32468EE7E8885323F22EABBFF9763A0F6FFEF3CC151E0BD0481DF5888F4152
                                                                        SHA-512:191C57E22EA13D13806DD390C4039029D40C7532918618D185D8A627AABC3969C7AF2E532E3C933BDE8F652B4723D951BF712E9BA0CC0D172DDE693012F5EF1A
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^..(...{...{...{...{...{,..{J..{...{P..{..{...{,..{...{..{...{Rich...{........PE..L...i!-a...........!.........................................................p...............................................@..(....P..0....................@.......................................................A...............................text...@........................... ..`.rdata........... ..................@..@.data....f.......P..................@....idata.......@....... ..............@....rsrc...0....P.......0..............@..@.reloc...)...@...0... ..............@..B................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):262243
                                                                        Entropy (8bit):7.347063969035946
                                                                        Encrypted:false
                                                                        SSDEEP:3072:j6a1TglJLBkaKuO3VGCHF3dxiwEQNDCGpV5nrVEOWKPYXaaDqUrmluM4Ky7yfu6q:jqlnO3ogywHQBGumlulr6fvdFZtDRIl
                                                                        MD5:0B8AEE4D8418249299744D9A5A5D23F4
                                                                        SHA1:AD306E2BCCC45D792B18CF8901156EC515A61371
                                                                        SHA-256:1C66999D79428FAD90104B9F74486EDD10805219056BBEEB514257465D6C698F
                                                                        SHA-512:10EC628CC9FBB33990BFFF8CEC7618F9053DB63A0EB264C7724078620CD931D4D80BEFDB99CC675F977C71D595D2FD3A513D125978015D35C814D0ED36875819
                                                                        Malicious:false
                                                                        Preview:t.,....(... <$.M. .=..........l.............o.c...gWSl..SW..WS[//d.d l$.XX%.......................q.y}a.!mQ.Y]A..M1.9-!.)........................................}...m..q]}}aMm.U=].E-M.5.=.%.-.......................}.......W.....v.@....qeymee1m.......c.)!!.)g..?.....K.7.+.OH..... .D@..0....e..dXH......P..(..]UU-]......kS.kk.....C.WO7'.[.<X44....,..$.8... ...}..\......@.5km!U.gL.8..g....-....._..k#+G##.LP8.H.@......0...T.......Y..D.........1II.1.o.s..Cg..G.....O.Og.CL<L.P.......p.d$........Y..L......<.. ...III.1..k_.....o.oGO?.....H.,@.X.P. ......p..,...\......m..<.....]YMEE.M..w[..[..{os.....O.C_G.t$l.D8\..........,.......}..]..`.........)5M.5.o.W_...sO3.SGk....h$.`,...4.L.$.<..........@...d...e}}1e.D.....o...S)!!.)g.GsK?..0.....#.h$P(.\\...........x(..am.I...p....H.......=9.!S3.wgksK.......3[C ......(.......,...........q.ayyaa.YQQYYc9E%11%9._.......W{7;wSo.......`(h<......L.4..........ay.q...a}Qii]Q....5MM!5.wSl.-.....w'.+k3/..+d.....
                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):145264
                                                                        Entropy (8bit):6.331826441761858
                                                                        Encrypted:false
                                                                        SSDEEP:3072:fW6vjvEUEzozIGnKyvBhSVeoVdS5jO4yEWzJ1gKs4H+u1ERB:REJWC+SVeoVdSZOqWbgKs4HPQ
                                                                        MD5:704925ECFDB24EF81190B82DE0E5453C
                                                                        SHA1:1128B3063180419893615CA73AD4F9DD51EBEAC6
                                                                        SHA-256:8CC871EE8760A4658189528B4A5D8AFE9824F6A13FAAF1FE7EB56F2A3AD2D04E
                                                                        SHA-512:CA187015812DDFCAA6515F3A5B780183B4A772801AA14B3F785D6DEE9B9AA7DB6402A7B346623FD24CF4A28F9856683022B10C3D812F8F2888E25BB218CBF216
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........KC..*-..*-..*-.B.S..*-...P..*-...@..*-...V..*-..*,./*-...C..*-...Q..*-...U..*-.Rich.*-.................PE..L....mKF.....................................................................@......*............ ...........................v..........(...............p%..........P................................D..@............................................text............................... ..`.data...............................@....rsrc...(...........................@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):830464
                                                                        Entropy (8bit):6.581634247915213
                                                                        Encrypted:false
                                                                        SSDEEP:12288:PC0Y0yaWduIfHk898h2iKq6vPZTZpKNnSr71O7O7l6qe8/T:q0Y0yVumHRC2JnP1Bp6qe4
                                                                        MD5:7B9CE1DE240CA4B496133ABECAC85A4D
                                                                        SHA1:CBC2BAA4CB392A0230DDA06D9F14248DA62032E7
                                                                        SHA-256:3CCE14427382864A84A9B0E6951779214B90DF92598A146BDA77044528B5CE6C
                                                                        SHA-512:73AC9C2077FE73A2F49BDDBC9A8E3CFA5CD0D912FF57A0849DA51A3126689C666675992A630EF7919FE840EF79136AACF82B8F584B6F43A5F8FB9515E62CF7D4
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 9%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......._.0P..^...^...^.......^..._...^.<.%...^... ...^.<.3...^.<.#...^.......^...Q...^.<.$...^.<.0...^.<."...^.<.&...^.Rich..^.........PE..L...w.:F...........!................4........0....0p....................................................................$^...........@..X....................P......................................x...@...........................................text............................... ..`.data........0......................@....rsrc...X....@......................@..@.reloc..X....P......................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):4608873
                                                                        Entropy (8bit):7.960086942320774
                                                                        Encrypted:false
                                                                        SSDEEP:98304:3styJxNYMjroMCoKRxC5w1UEA4e2l3YJArwjLvBOVR3r2n:35NYMj8MjMqEw2Ns5B9n
                                                                        MD5:E6E1FFF4A1855FB662CF8B192D82D269
                                                                        SHA1:2DB24675D9CAAE53A4DABD989371FFF04FDE4628
                                                                        SHA-256:0C3E5965D44D0933511882C9176DACF4EE2A7D22A4A38560F4B95B26AD34D0C0
                                                                        SHA-512:243DAB5DA256C4C8622F5C6A0C1E2B900B4D05067B1C161B515674A112E1657AC4C0BC8D08F6706C24FC797ECACC7FC3863A1C5DE2378C822F53278D8BA15AB1
                                                                        Malicious:false
                                                                        Preview:kh.i..Q..Qcx..GL..l..`..F.l..I.P.ir].A....k.sE.^F..o.....H..]`.n.L.lA...o^...J...tikQ.P.ZICwA..j..WcW..v.qELV..].U]uMNM..I[.D]..L..HnNo.M.aB.s.Bn...JtSlHIV..._.\...R..`...LS`...X..j.\..fSEl.c]CXj.oSM..LWr.v.ghJiT.].._Nu..H.Q.h..V_.riG..V...uP...b....g^.F..p...c..\...._G..HBEd.j.......c.Ws.^c`.H..LBe...w..ms.h..q..F\..Uf_BIK_^....e.ib...a...R.M...xat.PJ..HK..G_.......pQw...F.qRY.i.UjuP..Pq..h...J.Jo.sZ..p.jJ....p..sh.]tk.JfLmT.v...IFl.pl_s.Fp.G..ZD.f.E...jpv..s...]Z.E.Tn.j.^.....T...mM.h.w..b.^[U.GdZL._.vh.w...^...F.t.WO.T.Nj.....dRQU..^NFCp......GEZ.N.Ax...EF...^uu.NR...\D......._.FY.g.D.yf.`jM.y.X.c.\.B.r.VE.EHkv.f^G.S.W..T........Mk..I.MkH.^Y...m....H.Li.G....a..O..b..Ne....U..E....bZipkrtL.n.MY].w.t.gmmP.Y..h_Qn[.S..PODN.jxR..........f.L........Z.mH.QWsxSGK.m..TbJ.rot.F..g.N...ZN]..^a.LOS......s....vk...JX.S.]..qXSJXRO`BY.Xb.lZpfV.H.i.N.p......Rh..JT`.TD..hj..KZyt.HMn.V....YT.I.GM..Redy.K.oJx.......fR..n.Qr.g.V.....e.c.tg..DC....Qsl.q.k..D.t...].KQG.D.T.a\kn.s.m.f.i...i`...^j.pd..vQ
                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):60694
                                                                        Entropy (8bit):4.563580701233227
                                                                        Encrypted:false
                                                                        SSDEEP:768:9S46jIRCQgaSaLwpWOVDVGv9PI1ksIKXOThuHY5cZhYd+b3VaQwXVJunCVW66e+J:Q16DjwprVxR2uHYEVaQwFPWfe+L+Ur
                                                                        MD5:36CD10B0A78053BC4825F49D06815852
                                                                        SHA1:20570C9FEB56E663892B05F38B45CC84A14B2295
                                                                        SHA-256:DF40ECA893BCDFE0D0ED21104C5ECB2191F44CBFA80F69073042593F90D82650
                                                                        SHA-512:9C20313A2930F351BA9B3F29B6FD4C9F3A71D2230019D42D164ADF931F8C60252564533BA40D980F6E47854BC5080392D91C94CC5C0FE7B98A2FB86DA61F2CA5
                                                                        Malicious:false
                                                                        Preview:tT.G..l...]....DZ.y..DI....eVC.d.g...K^..\y.jPks.p.jiI.g......wD.aL.pmvPOg...a....]M.Xpeiy^wC.Jh..x..[PB.gt.....rgeO.DWkZ..mVvN.T..m.g.pP.c..iMaCcEH..Q..g.wK.ay.....a^...IQY.e...^W.hK.....h..cKP..vsip.YqtE..`JN.k.Obt..scP....[Ok.g.HQ..t.N.NM.E..[.U...A.dg.n.vR....rx.so.E.Db..L...PkIpO...SN...n.d.Ugr.y..Qt.\....Os.......gI.ku...sT.h.....w.D.Ga.....k..Sq..hU[..QVesn..be_...CNQ..H...R.q..f...y.DA.d..x.S..i.]..RQy.sy..X.geNw._.MH..Q..MV..^d.Pc.R..Q.J..TUO.._Q..`.ieM.Zq...I........Hx.o..`^..I.Q.p..SP...EAns...u`....F....XT..M.F.VKp..X..UYA..t.BiRNv_..Mhlo....^uSS.w..dG..Y...ge..I..S.Dh.[r..V.....TTWQt]xY[j...eG......X._k[..Mon...Zc..u..oMkvR.....J.ne.Uq.[w...GW....ftn....w.VB]..C.Ov..\k.....OeM.W.vJrc.....vMa.hS.ot..c..F.f.g.IR.vVX..O..G..yVp..J.J.t............V.s..w.d.Xa.]Z.k..C...[..h.......Q....xV.l..QM...S..v...[..b...N.y..py..I..k.T.V...u.i[I.Ep.NN.yf..aS._...a...Q.._W_.....F..[V..jiZSZ...KIe...K....kkdwABV..SO.OMH^QS..OV^k..R..BLn.Y..G.y.E.H.JT.s...v[C..L...mGX.l.....MA..tHn.E...C.\..
                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):626688
                                                                        Entropy (8bit):6.840096566307411
                                                                        Encrypted:false
                                                                        SSDEEP:12288:mxzh9hH5RVKTp0G+vFhr46CI600yZmGyYG:mph9hHzVKOpt6MmGyY
                                                                        MD5:43143ABB001D4211FAB627C136124A44
                                                                        SHA1:EDB99760AE04BFE68AAACF34EB0287A3C10EC885
                                                                        SHA-256:CB8928FF2FAF2921B1EDDC267DCE1BB64E6FEE4D15B68CD32588E0F3BE116B03
                                                                        SHA-512:CED96CA5D1E2573DBF21875CF98A8FCB86B5BCDCA4C041680A9CB87374378E04835F02AB569D5243608C68FEB2E9B30FFE39FEB598F5081261A57D1CE97556A6
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........L.........@................!......;.............d.......................Rich...................PE..L...I^j[...........!.....0...p......+#.......@.....x......................................@..........................q...~..Pc..<....`.......................p..P3...B...............................F..@............@...............................text....'.......0.................. ..`.rdata......@.......@..............@..@.data...Li.......P..................@....rsrc........`.......@..............@..@.reloc...7...p...@...P..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):145264
                                                                        Entropy (8bit):6.331826441761858
                                                                        Encrypted:false
                                                                        SSDEEP:3072:fW6vjvEUEzozIGnKyvBhSVeoVdS5jO4yEWzJ1gKs4H+u1ERB:REJWC+SVeoVdSZOqWbgKs4HPQ
                                                                        MD5:704925ECFDB24EF81190B82DE0E5453C
                                                                        SHA1:1128B3063180419893615CA73AD4F9DD51EBEAC6
                                                                        SHA-256:8CC871EE8760A4658189528B4A5D8AFE9824F6A13FAAF1FE7EB56F2A3AD2D04E
                                                                        SHA-512:CA187015812DDFCAA6515F3A5B780183B4A772801AA14B3F785D6DEE9B9AA7DB6402A7B346623FD24CF4A28F9856683022B10C3D812F8F2888E25BB218CBF216
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........KC..*-..*-..*-.B.S..*-...P..*-...@..*-...V..*-..*,./*-...C..*-...Q..*-...U..*-.Rich.*-.................PE..L....mKF.....................................................................@......*............ ...........................v..........(...............p%..........P................................D..@............................................text............................... ..`.data...............................@....rsrc...(...........................@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exe
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):830464
                                                                        Entropy (8bit):6.581634247915213
                                                                        Encrypted:false
                                                                        SSDEEP:12288:PC0Y0yaWduIfHk898h2iKq6vPZTZpKNnSr71O7O7l6qe8/T:q0Y0yVumHRC2JnP1Bp6qe4
                                                                        MD5:7B9CE1DE240CA4B496133ABECAC85A4D
                                                                        SHA1:CBC2BAA4CB392A0230DDA06D9F14248DA62032E7
                                                                        SHA-256:3CCE14427382864A84A9B0E6951779214B90DF92598A146BDA77044528B5CE6C
                                                                        SHA-512:73AC9C2077FE73A2F49BDDBC9A8E3CFA5CD0D912FF57A0849DA51A3126689C666675992A630EF7919FE840EF79136AACF82B8F584B6F43A5F8FB9515E62CF7D4
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 9%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......._.0P..^...^...^.......^..._...^.<.%...^... ...^.<.3...^.<.#...^.......^...Q...^.<.$...^.<.0...^.<."...^.<.&...^.Rich..^.........PE..L...w.:F...........!................4........0....0p....................................................................$^...........@..X....................P......................................x...@...........................................text............................... ..`.data........0......................@....rsrc...X....@......................@..@.reloc..X....P......................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):4608873
                                                                        Entropy (8bit):7.960086942320774
                                                                        Encrypted:false
                                                                        SSDEEP:98304:3styJxNYMjroMCoKRxC5w1UEA4e2l3YJArwjLvBOVR3r2n:35NYMj8MjMqEw2Ns5B9n
                                                                        MD5:E6E1FFF4A1855FB662CF8B192D82D269
                                                                        SHA1:2DB24675D9CAAE53A4DABD989371FFF04FDE4628
                                                                        SHA-256:0C3E5965D44D0933511882C9176DACF4EE2A7D22A4A38560F4B95B26AD34D0C0
                                                                        SHA-512:243DAB5DA256C4C8622F5C6A0C1E2B900B4D05067B1C161B515674A112E1657AC4C0BC8D08F6706C24FC797ECACC7FC3863A1C5DE2378C822F53278D8BA15AB1
                                                                        Malicious:false
                                                                        Preview:kh.i..Q..Qcx..GL..l..`..F.l..I.P.ir].A....k.sE.^F..o.....H..]`.n.L.lA...o^...J...tikQ.P.ZICwA..j..WcW..v.qELV..].U]uMNM..I[.D]..L..HnNo.M.aB.s.Bn...JtSlHIV..._.\...R..`...LS`...X..j.\..fSEl.c]CXj.oSM..LWr.v.ghJiT.].._Nu..H.Q.h..V_.riG..V...uP...b....g^.F..p...c..\...._G..HBEd.j.......c.Ws.^c`.H..LBe...w..ms.h..q..F\..Uf_BIK_^....e.ib...a...R.M...xat.PJ..HK..G_.......pQw...F.qRY.i.UjuP..Pq..h...J.Jo.sZ..p.jJ....p..sh.]tk.JfLmT.v...IFl.pl_s.Fp.G..ZD.f.E...jpv..s...]Z.E.Tn.j.^.....T...mM.h.w..b.^[U.GdZL._.vh.w...^...F.t.WO.T.Nj.....dRQU..^NFCp......GEZ.N.Ax...EF...^uu.NR...\D......._.FY.g.D.yf.`jM.y.X.c.\.B.r.VE.EHkv.f^G.S.W..T........Mk..I.MkH.^Y...m....H.Li.G....a..O..b..Ne....U..E....bZipkrtL.n.MY].w.t.gmmP.Y..h_Qn[.S..PODN.jxR..........f.L........Z.mH.QWsxSGK.m..TbJ.rot.F..g.N...ZN]..^a.LOS......s....vk...JX.S.]..qXSJXRO`BY.Xb.lZpfV.H.i.N.p......Rh..JT`.TD..hj..KZyt.HMn.V....YT.I.GM..Redy.K.oJx.......fR..n.Qr.g.V.....e.c.tg..DC....Qsl.q.k..D.t...].KQG.D.T.a\kn.s.m.f.i...i`...^j.pd..vQ
                                                                        Process:C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):60694
                                                                        Entropy (8bit):4.563580701233227
                                                                        Encrypted:false
                                                                        SSDEEP:768:9S46jIRCQgaSaLwpWOVDVGv9PI1ksIKXOThuHY5cZhYd+b3VaQwXVJunCVW66e+J:Q16DjwprVxR2uHYEVaQwFPWfe+L+Ur
                                                                        MD5:36CD10B0A78053BC4825F49D06815852
                                                                        SHA1:20570C9FEB56E663892B05F38B45CC84A14B2295
                                                                        SHA-256:DF40ECA893BCDFE0D0ED21104C5ECB2191F44CBFA80F69073042593F90D82650
                                                                        SHA-512:9C20313A2930F351BA9B3F29B6FD4C9F3A71D2230019D42D164ADF931F8C60252564533BA40D980F6E47854BC5080392D91C94CC5C0FE7B98A2FB86DA61F2CA5
                                                                        Malicious:false
                                                                        Preview:tT.G..l...]....DZ.y..DI....eVC.d.g...K^..\y.jPks.p.jiI.g......wD.aL.pmvPOg...a....]M.Xpeiy^wC.Jh..x..[PB.gt.....rgeO.DWkZ..mVvN.T..m.g.pP.c..iMaCcEH..Q..g.wK.ay.....a^...IQY.e...^W.hK.....h..cKP..vsip.YqtE..`JN.k.Obt..scP....[Ok.g.HQ..t.N.NM.E..[.U...A.dg.n.vR....rx.so.E.Db..L...PkIpO...SN...n.d.Ugr.y..Qt.\....Os.......gI.ku...sT.h.....w.D.Ga.....k..Sq..hU[..QVesn..be_...CNQ..H...R.q..f...y.DA.d..x.S..i.]..RQy.sy..X.geNw._.MH..Q..MV..^d.Pc.R..Q.J..TUO.._Q..`.ieM.Zq...I........Hx.o..`^..I.Q.p..SP...EAns...u`....F....XT..M.F.VKp..X..UYA..t.BiRNv_..Mhlo....^uSS.w..dG..Y...ge..I..S.Dh.[r..V.....TTWQt]xY[j...eG......X._k[..Mon...Zc..u..oMkvR.....J.ne.Uq.[w...GW....ftn....w.VB]..C.Ov..\k.....OeM.W.vJrc.....vMa.hS.ot..c..F.f.g.IR.vVX..O..G..yVp..J.J.t............V.s..w.d.Xa.]Z.k..C...[..h.......Q....xV.l..QM...S..v...[..b...N.y..py..I..k.T.V...u.i[I.Ep.NN.yf..aS._...a...Q.._W_.....F..[V..jiZSZ...KIe...K....kkdwABV..SO.OMH^QS..OV^k..R..BLn.Y..G.y.E.H.JT.s...v[C..L...mGX.l.....MA..tHn.E...C.\..
                                                                        Process:C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exe
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):626688
                                                                        Entropy (8bit):6.840096566307411
                                                                        Encrypted:false
                                                                        SSDEEP:12288:mxzh9hH5RVKTp0G+vFhr46CI600yZmGyYG:mph9hHzVKOpt6MmGyY
                                                                        MD5:43143ABB001D4211FAB627C136124A44
                                                                        SHA1:EDB99760AE04BFE68AAACF34EB0287A3C10EC885
                                                                        SHA-256:CB8928FF2FAF2921B1EDDC267DCE1BB64E6FEE4D15B68CD32588E0F3BE116B03
                                                                        SHA-512:CED96CA5D1E2573DBF21875CF98A8FCB86B5BCDCA4C041680A9CB87374378E04835F02AB569D5243608C68FEB2E9B30FFE39FEB598F5081261A57D1CE97556A6
                                                                        Malicious:false
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........L.........@................!......;.............d.......................Rich...................PE..L...I^j[...........!.....0...p......+#.......@.....x......................................@..........................q...~..Pc..<....`.......................p..P3...B...............................F..@............@...............................text....'.......0.................. ..`.rdata......@.......@..............@..@.data...Li.......P..................@....rsrc........`.......@..............@..@.reloc...7...p...@...P..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                        File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: Installation Database, Comments: Contact: Your local administrator, Keywords: Installer,MSI,Database, Subject: Blank Project Template, Author: InstallShield, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2021 - Premier Edition with Virtualization Pack 27, Last Saved Time/Date: Thu Dec 19 15:10:32 2024, Create Time/Date: Thu Dec 19 15:10:32 2024, Last Printed: Thu Dec 19 15:10:32 2024, Revision Number: {38167EE4-6F51-464C-B53F-8224570D655F}, Code page: 1252, Template: Intel;1033
                                                                        Entropy (8bit):7.547692946114982
                                                                        TrID:
                                                                        • Windows SDK Setup Transform Script (63028/2) 47.91%
                                                                        • Microsoft Windows Installer (60509/1) 46.00%
                                                                        • Generic OLE2 / Multistream Compound File (8008/1) 6.09%
                                                                        File name:K3UtwU3CH9.msi
                                                                        File size:9'586'644 bytes
                                                                        MD5:81907fbd20c219c1890c775c91468215
                                                                        SHA1:37731a1a70b620d8a0694bfc15b78d31179742ad
                                                                        SHA256:468ff3b01cb98f3bb68e99b07d04c29869abc2e5c4ba3b8f075658e6121d0cd4
                                                                        SHA512:edd0cdd6bb76c971c7fbc78b956f1bf8e506e00998314d4d65f506e2dcf983d3cafd242739f92ce7d9cef832b78f6087dec2503b84e40fa0bf9d53cc0d1d7343
                                                                        SSDEEP:196608:RO4KevMPrBma/EF3JqOzg5AKuPH9SSkC6A4pLmeuP3wE7:rMPrBTMF3UOzg324e4mAE7
                                                                        TLSH:BCA6F111B7D5C032D1AE0271491DB36492BEFE714B3182C7B6983B8EAD716C1AB31B97
                                                                        File Content Preview:........................>...................................8........6..........................~..............................................................................................................................................................
                                                                        Icon Hash:2d2e3797b32b2b99
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Jan 9, 2025 14:52:35.100264072 CET5169753192.168.2.4162.159.36.2
                                                                        Jan 9, 2025 14:52:35.105231047 CET5351697162.159.36.2192.168.2.4
                                                                        Jan 9, 2025 14:52:35.105307102 CET5169753192.168.2.4162.159.36.2
                                                                        Jan 9, 2025 14:52:35.110383034 CET5351697162.159.36.2192.168.2.4
                                                                        Jan 9, 2025 14:52:35.608274937 CET5169753192.168.2.4162.159.36.2
                                                                        Jan 9, 2025 14:52:35.640629053 CET5169753192.168.2.4162.159.36.2
                                                                        Jan 9, 2025 14:52:35.645966053 CET5351697162.159.36.2192.168.2.4
                                                                        Jan 9, 2025 14:52:35.646084070 CET5169753192.168.2.4162.159.36.2
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Jan 9, 2025 14:52:32.711271048 CET6324553192.168.2.41.1.1.1
                                                                        Jan 9, 2025 14:52:32.720031977 CET53632451.1.1.1192.168.2.4
                                                                        Jan 9, 2025 14:52:35.099630117 CET5364775162.159.36.2192.168.2.4
                                                                        Jan 9, 2025 14:52:35.649959087 CET53560081.1.1.1192.168.2.4
                                                                        Jan 9, 2025 14:53:20.142921925 CET6180853192.168.2.41.1.1.1
                                                                        Jan 9, 2025 14:53:20.152059078 CET53618081.1.1.1192.168.2.4
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                        Jan 9, 2025 14:52:32.711271048 CET192.168.2.41.1.1.10x6fcdStandard query (0)plerukilo0.siteA (IP address)IN (0x0001)false
                                                                        Jan 9, 2025 14:53:20.142921925 CET192.168.2.41.1.1.10x3f9fStandard query (0)plerukilo0.siteA (IP address)IN (0x0001)false
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                        Jan 9, 2025 14:52:32.720031977 CET1.1.1.1192.168.2.40x6fcdName error (3)plerukilo0.sitenonenoneA (IP address)IN (0x0001)false
                                                                        Jan 9, 2025 14:53:20.152059078 CET1.1.1.1192.168.2.40x3f9fName error (3)plerukilo0.sitenonenoneA (IP address)IN (0x0001)false

                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Click to dive into process behavior distribution

                                                                        Click to jump to process

                                                                        Target ID:0
                                                                        Start time:08:51:47
                                                                        Start date:09/01/2025
                                                                        Path:C:\Windows\System32\msiexec.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\K3UtwU3CH9.msi"
                                                                        Imagebase:0x7ff7a52f0000
                                                                        File size:69'632 bytes
                                                                        MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:1
                                                                        Start time:08:51:48
                                                                        Start date:09/01/2025
                                                                        Path:C:\Windows\System32\msiexec.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\msiexec.exe /V
                                                                        Imagebase:0x7ff7a52f0000
                                                                        File size:69'632 bytes
                                                                        MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:false

                                                                        Target ID:2
                                                                        Start time:08:51:48
                                                                        Start date:09/01/2025
                                                                        Path:C:\Windows\SysWOW64\msiexec.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 67D8AB6401B6284E54A24D810952612F C
                                                                        Imagebase:0xa80000
                                                                        File size:59'904 bytes
                                                                        MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:3
                                                                        Start time:08:51:49
                                                                        Start date:09/01/2025
                                                                        Path:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{DACCFEC1-0F8E-4735-B9C7-A60DBEC446EA}
                                                                        Imagebase:0x7ff6dc600000
                                                                        File size:182'688 bytes
                                                                        MD5 hash:40F3A092744E46F3531A40B917CCA81E
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Antivirus matches:
                                                                        • Detection: 0%, ReversingLabs
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:4
                                                                        Start time:08:51:49
                                                                        Start date:09/01/2025
                                                                        Path:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8C031A3B-AD25-4CE4-AB49-01F87FDEE881}
                                                                        Imagebase:0x7ff6dc600000
                                                                        File size:182'688 bytes
                                                                        MD5 hash:40F3A092744E46F3531A40B917CCA81E
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:5
                                                                        Start time:08:51:49
                                                                        Start date:09/01/2025
                                                                        Path:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{56D245EC-76C4-4C26-9039-E4C34B0EC544}
                                                                        Imagebase:0x7ff6dc600000
                                                                        File size:182'688 bytes
                                                                        MD5 hash:40F3A092744E46F3531A40B917CCA81E
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:6
                                                                        Start time:08:51:49
                                                                        Start date:09/01/2025
                                                                        Path:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{D0C64754-86B5-489E-9A24-32FD984CC512}
                                                                        Imagebase:0x7ff6dc600000
                                                                        File size:182'688 bytes
                                                                        MD5 hash:40F3A092744E46F3531A40B917CCA81E
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:7
                                                                        Start time:08:51:49
                                                                        Start date:09/01/2025
                                                                        Path:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{49CF2577-EEA4-4712-85B8-C177FE73A996}
                                                                        Imagebase:0x7ff6dc600000
                                                                        File size:182'688 bytes
                                                                        MD5 hash:40F3A092744E46F3531A40B917CCA81E
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:8
                                                                        Start time:08:51:49
                                                                        Start date:09/01/2025
                                                                        Path:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{2288B9E7-ABB0-459A-A1F0-65CF795FB7C4}
                                                                        Imagebase:0x7ff6dc600000
                                                                        File size:182'688 bytes
                                                                        MD5 hash:40F3A092744E46F3531A40B917CCA81E
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:9
                                                                        Start time:08:51:49
                                                                        Start date:09/01/2025
                                                                        Path:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{06852D7C-4042-4D98-A431-F2C81FD3913D}
                                                                        Imagebase:0x7ff6dc600000
                                                                        File size:182'688 bytes
                                                                        MD5 hash:40F3A092744E46F3531A40B917CCA81E
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Has exited:true

                                                                        Target ID:10
                                                                        Start time:08:51:49
                                                                        Start date:09/01/2025
                                                                        Path:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{D0CC5960-99B5-429C-9C5D-234075E07B82}
                                                                        Imagebase:0x7ff6dc600000
                                                                        File size:182'688 bytes
                                                                        MD5 hash:40F3A092744E46F3531A40B917CCA81E
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Has exited:true

                                                                        Target ID:11
                                                                        Start time:08:51:49
                                                                        Start date:09/01/2025
                                                                        Path:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{19A60243-752F-4575-BE1B-A4589A300ACF}
                                                                        Imagebase:0x7ff6dc600000
                                                                        File size:182'688 bytes
                                                                        MD5 hash:40F3A092744E46F3531A40B917CCA81E
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Has exited:true

                                                                        Target ID:12
                                                                        Start time:08:51:49
                                                                        Start date:09/01/2025
                                                                        Path:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Users\user\AppData\Local\Temp\{1A6328FB-D974-49DB-B6B0-6954CDDE92BD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F15C916D-5F9E-4609-A30F-4848C97C342B}
                                                                        Imagebase:0x7ff6dc600000
                                                                        File size:182'688 bytes
                                                                        MD5 hash:40F3A092744E46F3531A40B917CCA81E
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Has exited:true

                                                                        Target ID:13
                                                                        Start time:08:51:50
                                                                        Start date:09/01/2025
                                                                        Path:C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Users\user\AppData\Local\Temp\{D5CE2740-095B-41D8-8BD7-CD8C6AF97028}\Dashboard.exe
                                                                        Imagebase:0x1000000
                                                                        File size:145'264 bytes
                                                                        MD5 hash:704925ECFDB24EF81190B82DE0E5453C
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000D.00000002.1722528788.00000000093D7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                        Antivirus matches:
                                                                        • Detection: 0%, ReversingLabs
                                                                        Has exited:true

                                                                        Target ID:14
                                                                        Start time:08:51:50
                                                                        Start date:09/01/2025
                                                                        Path:C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe
                                                                        Imagebase:0x1000000
                                                                        File size:145'264 bytes
                                                                        MD5 hash:704925ECFDB24EF81190B82DE0E5453C
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000E.00000002.1780617372.00000000093E9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                        Antivirus matches:
                                                                        • Detection: 0%, ReversingLabs
                                                                        Has exited:true

                                                                        Target ID:15
                                                                        Start time:08:51:52
                                                                        Start date:09/01/2025
                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\SysWOW64\cmd.exe
                                                                        Imagebase:0x240000
                                                                        File size:236'544 bytes
                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000F.00000002.2027624617.0000000005446000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        Has exited:true

                                                                        Target ID:16
                                                                        Start time:08:51:52
                                                                        Start date:09/01/2025
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff7699e0000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Has exited:true

                                                                        Target ID:21
                                                                        Start time:08:52:15
                                                                        Start date:09/01/2025
                                                                        Path:C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe
                                                                        Imagebase:0x140000000
                                                                        File size:2'364'728 bytes
                                                                        MD5 hash:967F4470627F823F4D7981E511C9824F
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000015.00000002.2132278802.0000000002609000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                        Antivirus matches:
                                                                        • Detection: 0%, ReversingLabs
                                                                        Has exited:true

                                                                        Target ID:22
                                                                        Start time:08:52:29
                                                                        Start date:09/01/2025
                                                                        Path:C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe"
                                                                        Imagebase:0x1000000
                                                                        File size:145'264 bytes
                                                                        MD5 hash:704925ECFDB24EF81190B82DE0E5453C
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000016.00000002.2159661824.00000000093C5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                        Has exited:true

                                                                        Target ID:23
                                                                        Start time:08:52:29
                                                                        Start date:09/01/2025
                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\SysWOW64\cmd.exe
                                                                        Imagebase:0x240000
                                                                        File size:236'544 bytes
                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000017.00000002.2213346540.0000000002C10000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000017.00000002.2213608056.0000000004B79000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        Has exited:true

                                                                        Target ID:24
                                                                        Start time:08:52:29
                                                                        Start date:09/01/2025
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff7699e0000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Has exited:true

                                                                        Target ID:28
                                                                        Start time:08:52:41
                                                                        Start date:09/01/2025
                                                                        Path:C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\AppData\Roaming\LoadupdateXi_alpha\Dashboard.exe"
                                                                        Imagebase:0x1000000
                                                                        File size:145'264 bytes
                                                                        MD5 hash:704925ECFDB24EF81190B82DE0E5453C
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001C.00000002.2272864695.00000000093CC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                        Has exited:true

                                                                        Target ID:29
                                                                        Start time:08:52:41
                                                                        Start date:09/01/2025
                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\SysWOW64\cmd.exe
                                                                        Imagebase:0x240000
                                                                        File size:236'544 bytes
                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001D.00000002.2504304283.0000000004D74000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        Has exited:true

                                                                        Target ID:30
                                                                        Start time:08:52:41
                                                                        Start date:09/01/2025
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff7699e0000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Has exited:true

                                                                        Target ID:31
                                                                        Start time:08:53:01
                                                                        Start date:09/01/2025
                                                                        Path:C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Users\user\AppData\Local\Temp\MLE_Config_beta.exe
                                                                        Imagebase:0x140000000
                                                                        File size:2'364'728 bytes
                                                                        MD5 hash:967F4470627F823F4D7981E511C9824F
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001F.00000002.2605314044.00000000025BE000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                        Has exited:true

                                                                        Reset < >

                                                                          Execution Graph

                                                                          Execution Coverage:4.9%
                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                          Signature Coverage:21.9%
                                                                          Total number of Nodes:540
                                                                          Total number of Limit Nodes:27
                                                                          execution_graph 9010 7ff6dc6017a0 9011 7ff6dc6017b0 WaitForSingleObject 9010->9011 9012 7ff6dc6017c0 WaitForSingleObject 9011->9012 9012->9012 9013 7ff6dc6017d4 9012->9013 9013->9011 9014 7ff6dc6017e0 CloseHandle PostThreadMessageW 9013->9014 10981 7ff6dc60eaac 10982 7ff6dc60eab5 10981->10982 11010 7ff6dc60ebd4 10981->11010 10983 7ff6dc60ead0 10982->10983 10984 7ff6dc60a4bc free 69 API calls 10982->10984 10985 7ff6dc60eade 10983->10985 10986 7ff6dc60a4bc free 69 API calls 10983->10986 10984->10983 10987 7ff6dc60eaec 10985->10987 10988 7ff6dc60a4bc free 69 API calls 10985->10988 10986->10985 10989 7ff6dc60eafa 10987->10989 10990 7ff6dc60a4bc free 69 API calls 10987->10990 10988->10987 10991 7ff6dc60eb08 10989->10991 10992 7ff6dc60a4bc free 69 API calls 10989->10992 10990->10989 10993 7ff6dc60eb16 10991->10993 10994 7ff6dc60a4bc free 69 API calls 10991->10994 10992->10991 10995 7ff6dc60eb27 10993->10995 10996 7ff6dc60a4bc free 69 API calls 10993->10996 10994->10993 10997 7ff6dc60eb3f 10995->10997 10998 7ff6dc60a4bc free 69 API calls 10995->10998 10996->10995 10999 7ff6dc612a30 _lock 69 API calls 10997->10999 10998->10997 11003 7ff6dc60eb4b 10999->11003 11000 7ff6dc60eb78 11013 7ff6dc612c18 LeaveCriticalSection 11000->11013 11003->11000 11005 7ff6dc60a4bc free 69 API calls 11003->11005 11005->11000 11068 7ff6dc60a480 11071 7ff6dc60c998 11068->11071 11072 7ff6dc612a30 _lock 69 API calls 11071->11072 11073 7ff6dc60c9ab 11072->11073 11076 7ff6dc60c9df 11073->11076 11078 7ff6dc60a4bc free 69 API calls 11073->11078 11079 7ff6dc60c9ef 11073->11079 11077 7ff6dc60a4bc free 69 API calls 11076->11077 11077->11079 11078->11076 11080 7ff6dc612c18 LeaveCriticalSection 11079->11080 8429 7ff6dc60b958 8470 7ff6dc60d8b0 GetStartupInfoW 8429->8470 8431 7ff6dc60b96c 8471 7ff6dc60cae4 GetProcessHeap 8431->8471 8433 7ff6dc60b9cc 8434 7ff6dc60b9f2 8433->8434 8435 7ff6dc60b9d9 8433->8435 8436 7ff6dc60b9de 8433->8436 8472 7ff6dc60ed4c 8434->8472 8595 7ff6dc60d294 8435->8595 8604 7ff6dc60d308 8436->8604 8441 7ff6dc60b9e8 8644 7ff6dc60cb48 8441->8644 8442 7ff6dc60ba1d _RTC_Initialize 8489 7ff6dc6109f4 8442->8489 8444 7ff6dc60ba09 8447 7ff6dc60d308 _NMSG_WRITE 69 API calls 8444->8447 8445 7ff6dc60ba04 8446 7ff6dc60d294 _FF_MSGBANNER 69 API calls 8445->8446 8446->8444 8449 7ff6dc60ba13 8447->8449 8451 7ff6dc60cb48 malloc 3 API calls 8449->8451 8450 7ff6dc60ba28 8452 7ff6dc60ba36 GetCommandLineW 8450->8452 8647 7ff6dc60bae4 8450->8647 8451->8442 8507 7ff6dc611244 GetEnvironmentStringsW 8452->8507 8458 7ff6dc60ba62 8520 7ff6dc610fa8 8458->8520 8462 7ff6dc60ba75 8534 7ff6dc60cba8 8462->8534 8463 7ff6dc60cb60 __updatetlocinfo 69 API calls 8463->8462 8465 7ff6dc60ba7f 8466 7ff6dc60ba8a _wwincmdln 8465->8466 8467 7ff6dc60cb60 __updatetlocinfo 69 API calls 8465->8467 8540 7ff6dc601ad0 GetCommandLineW CoInitializeEx 8466->8540 8467->8466 8469 7ff6dc60baa0 8470->8431 8471->8433 8660 7ff6dc60cc64 EncodePointer 8472->8660 8474 7ff6dc60ed57 8665 7ff6dc612bb8 8474->8665 8477 7ff6dc60edbe 8672 7ff6dc60edcc 8477->8672 8711 7ff6dc612a30 8489->8711 8491 7ff6dc610a23 8492 7ff6dc60cf18 _calloc_crt 69 API calls 8491->8492 8494 7ff6dc610a37 8492->8494 8493 7ff6dc610a47 _ioinit 8493->8450 8494->8493 8495 7ff6dc610ab2 GetStartupInfoW 8494->8495 8501 7ff6dc610c0c 8495->8501 8506 7ff6dc610acc 8495->8506 8496 7ff6dc610cf2 8497 7ff6dc612c18 doexit LeaveCriticalSection 8496->8497 8497->8493 8498 7ff6dc610c57 GetStdHandle 8500 7ff6dc610c82 GetFileType 8498->8500 8498->8501 8499 7ff6dc60cf18 _calloc_crt 69 API calls 8499->8506 8500->8501 8501->8496 8501->8498 8503 7ff6dc610cb2 InitializeCriticalSectionAndSpinCount 8501->8503 8502 7ff6dc610b28 8502->8501 8504 7ff6dc610bba InitializeCriticalSectionAndSpinCount 8502->8504 8505 7ff6dc610bb0 GetFileType 8502->8505 8503->8501 8504->8502 8505->8502 8505->8504 8506->8499 8506->8501 8506->8502 8508 7ff6dc60ba48 8507->8508 8509 7ff6dc61126a 8507->8509 8514 7ff6dc610d20 GetModuleFileNameW 8508->8514 8509->8509 8510 7ff6dc61127c 8509->8510 8511 7ff6dc60cf98 _malloc_crt 69 API calls 8510->8511 8512 7ff6dc61128c memcpy_s 8511->8512 8513 7ff6dc6112a5 FreeEnvironmentStringsW 8512->8513 8513->8508 8515 7ff6dc610d60 wparse_cmdline 8514->8515 8516 7ff6dc60ba54 8515->8516 8517 7ff6dc610dbb 8515->8517 8516->8458 8653 7ff6dc60cb60 8516->8653 8518 7ff6dc60cf98 _malloc_crt 69 API calls 8517->8518 8519 7ff6dc610dc0 wparse_cmdline 8518->8519 8519->8516 8521 7ff6dc610fdb _NMSG_WRITE 8520->8521 8522 7ff6dc60ba67 8520->8522 8761 7ff6dc60cf18 8521->8761 8522->8462 8522->8463 8524 7ff6dc611073 8525 7ff6dc60a4bc free 69 API calls 8524->8525 8525->8522 8526 7ff6dc60cf18 _calloc_crt 69 API calls 8530 7ff6dc61100b _NMSG_WRITE 8526->8530 8527 7ff6dc6110b3 8528 7ff6dc60a4bc free 69 API calls 8527->8528 8528->8522 8530->8522 8530->8524 8530->8526 8530->8527 8531 7ff6dc6110cb 8530->8531 8766 7ff6dc60bc4c 8530->8766 8775 7ff6dc60d21c IsProcessorFeaturePresent 8531->8775 8535 7ff6dc60cbbe _IsNonwritableInCurrentImage 8534->8535 8809 7ff6dc612c30 8535->8809 8537 7ff6dc60cbdb _initterm_e 8539 7ff6dc60cbfe _IsNonwritableInCurrentImage 8537->8539 8812 7ff6dc60a66c 8537->8812 8539->8465 8543 7ff6dc601b3c GetCurrentThreadId 8540->8543 8542 7ff6dc601bc3 8544 7ff6dc601be7 StringFromGUID2 SysAllocString 8542->8544 8543->8542 8545 7ff6dc602004 8544->8545 8546 7ff6dc601c14 SysStringLen 8544->8546 8860 7ff6dc605fe0 8545->8860 8547 7ff6dc601c21 SysStringLen CharUpperBuffW 8546->8547 8550 7ff6dc601c35 8546->8550 8547->8550 8549 7ff6dc60200e 8551 7ff6dc605fe0 3 API calls 8549->8551 8829 7ff6dc601880 8550->8829 8552 7ff6dc602019 8551->8552 8554 7ff6dc601faa 8841 7ff6dc602a40 8554->8841 8555 7ff6dc601d98 CreateEventW 8558 7ff6dc601db4 CreateThread 8555->8558 8559 7ff6dc601ddb 8555->8559 8556 7ff6dc601cdd CharNextW 8557 7ff6dc601c80 8556->8557 8563 7ff6dc601cee 8556->8563 8557->8556 8561 7ff6dc601cf3 CharNextW 8557->8561 8562 7ff6dc601ccf CharNextW 8557->8562 8557->8563 8558->8559 8564 7ff6dc601de3 StringFromGUID2 SysAllocString 8559->8564 8565 7ff6dc601e1d SysStringLen 8559->8565 8561->8563 8567 7ff6dc601d08 8561->8567 8562->8556 8562->8557 8563->8554 8563->8555 8564->8549 8568 7ff6dc601e0d SysFreeString SysFreeString 8564->8568 8569 7ff6dc601e32 SysStringLen CharUpperBuffW 8565->8569 8570 7ff6dc601e46 8565->8570 8573 7ff6dc601d10 lstrcmpiW 8567->8573 8568->8565 8569->8570 8592 7ff6dc601e5d 8570->8592 8856 7ff6dc6028a0 8570->8856 8571 7ff6dc601fcd 8847 7ff6dc60a330 8571->8847 8573->8554 8575 7ff6dc601d28 lstrcmpiW 8573->8575 8575->8554 8591 7ff6dc601d40 8575->8591 8577 7ff6dc601f32 8580 7ff6dc601f81 SleepEx 8577->8580 8581 7ff6dc601f38 GetMessageW 8577->8581 8578 7ff6dc601e80 CreateItemMoniker 8579 7ff6dc601ea0 Sleep 8578->8579 8578->8592 8582 7ff6dc601eb5 8579->8582 8579->8592 8586 7ff6dc601fa1 SysFreeString 8580->8586 8587 7ff6dc601f9b 8580->8587 8583 7ff6dc601f72 8581->8583 8584 7ff6dc601f4f 8581->8584 8582->8592 8583->8580 8588 7ff6dc601f50 DispatchMessageW GetMessageW 8584->8588 8585 7ff6dc601ed2 GetRunningObjectTable 8589 7ff6dc601f0f Sleep 8585->8589 8585->8592 8586->8554 8587->8586 8588->8583 8588->8588 8589->8592 8590 7ff6dc601d6b CharNextW 8590->8563 8590->8591 8591->8563 8591->8590 8593 7ff6dc601d7e CharNextW 8591->8593 8594 7ff6dc601d5d CharNextW 8591->8594 8592->8577 8592->8578 8592->8585 8592->8589 8593->8563 8593->8573 8594->8590 8594->8591 8939 7ff6dc6110e8 8595->8939 8598 7ff6dc60d2b1 8600 7ff6dc60d308 _NMSG_WRITE 69 API calls 8598->8600 8603 7ff6dc60d2d2 8598->8603 8599 7ff6dc6110e8 _set_error_mode 69 API calls 8599->8598 8601 7ff6dc60d2c8 8600->8601 8602 7ff6dc60d308 _NMSG_WRITE 69 API calls 8601->8602 8602->8603 8603->8436 8605 7ff6dc60d33c _NMSG_WRITE 8604->8605 8606 7ff6dc60d476 8605->8606 8608 7ff6dc6110e8 _set_error_mode 66 API calls 8605->8608 8607 7ff6dc60a330 __crtGetStringTypeA_stat 9 API calls 8606->8607 8609 7ff6dc60d4f3 8607->8609 8610 7ff6dc60d352 8608->8610 8609->8441 8611 7ff6dc60d478 GetStdHandle 8610->8611 8612 7ff6dc6110e8 _set_error_mode 66 API calls 8610->8612 8611->8606 8615 7ff6dc60d490 _woutput_s_l 8611->8615 8613 7ff6dc60d363 8612->8613 8613->8611 8614 7ff6dc60d374 8613->8614 8614->8606 8617 7ff6dc60bc4c _NMSG_WRITE 66 API calls 8614->8617 8616 7ff6dc60d4c8 WriteFile 8615->8616 8616->8606 8618 7ff6dc60d39f 8617->8618 8619 7ff6dc60d3a9 GetModuleFileNameW 8618->8619 8620 7ff6dc60d563 8618->8620 8622 7ff6dc60d3ce 8619->8622 8626 7ff6dc60d3e7 _NMSG_WRITE 8619->8626 8621 7ff6dc60d21c _invoke_watson 16 API calls 8620->8621 8630 7ff6dc60d576 8621->8630 8623 7ff6dc60bc4c _NMSG_WRITE 66 API calls 8622->8623 8624 7ff6dc60d3df 8623->8624 8625 7ff6dc60d510 8624->8625 8624->8626 8629 7ff6dc60d21c _invoke_watson 16 API calls 8625->8629 8627 7ff6dc60d431 8626->8627 8945 7ff6dc60a684 8626->8945 8954 7ff6dc612f64 8627->8954 8632 7ff6dc60d524 8629->8632 8630->8441 8637 7ff6dc60d21c _invoke_watson 16 API calls 8632->8637 8634 7ff6dc60d54e 8638 7ff6dc60d21c _invoke_watson 16 API calls 8634->8638 8636 7ff6dc612f64 _NMSG_WRITE 66 API calls 8639 7ff6dc60d459 8636->8639 8640 7ff6dc60d539 8637->8640 8638->8620 8639->8640 8641 7ff6dc60d461 8639->8641 8643 7ff6dc60d21c _invoke_watson 16 API calls 8640->8643 8963 7ff6dc613008 EncodePointer 8641->8963 8643->8634 8987 7ff6dc60cb04 GetModuleHandleExW 8644->8987 8648 7ff6dc60bafa 8647->8648 8649 7ff6dc60baf5 8647->8649 8650 7ff6dc60d308 _NMSG_WRITE 69 API calls 8648->8650 8651 7ff6dc60d294 _FF_MSGBANNER 69 API calls 8649->8651 8652 7ff6dc60bb01 8650->8652 8651->8648 8654 7ff6dc60d294 _FF_MSGBANNER 69 API calls 8653->8654 8655 7ff6dc60cb6d 8654->8655 8656 7ff6dc60d308 _NMSG_WRITE 69 API calls 8655->8656 8657 7ff6dc60cb74 8656->8657 8991 7ff6dc60cd38 8657->8991 8661 7ff6dc60cc7d _init_pointers 8660->8661 8681 7ff6dc60c8fc EncodePointer 8661->8681 8663 7ff6dc60cca5 30 API calls 8663->8474 8666 7ff6dc612bd3 8665->8666 8667 7ff6dc612bd9 InitializeCriticalSectionAndSpinCount 8666->8667 8668 7ff6dc60ed5c 8666->8668 8667->8666 8668->8477 8669 7ff6dc60d840 8668->8669 8670 7ff6dc60d850 8669->8670 8671 7ff6dc60d853 TlsAlloc 8669->8671 8670->8671 8673 7ff6dc60ede0 8672->8673 8674 7ff6dc60eddb 8672->8674 8676 7ff6dc612aa4 DeleteCriticalSection 8673->8676 8678 7ff6dc612ac2 8673->8678 8682 7ff6dc60d85c 8674->8682 8685 7ff6dc60a4bc 8676->8685 8679 7ff6dc60b9f7 8678->8679 8680 7ff6dc612ad7 DeleteCriticalSection 8678->8680 8679->8442 8679->8444 8679->8445 8680->8678 8681->8663 8683 7ff6dc60d86c 8682->8683 8684 7ff6dc60d86f TlsFree 8682->8684 8683->8684 8686 7ff6dc60a4c1 HeapFree 8685->8686 8690 7ff6dc60a4f1 _dosmaperr 8685->8690 8687 7ff6dc60a4dc 8686->8687 8686->8690 8691 7ff6dc60ca74 8687->8691 8690->8673 8694 7ff6dc60ec04 GetLastError 8691->8694 8708 7ff6dc60d878 8694->8708 8709 7ff6dc60d888 8708->8709 8710 7ff6dc60d88b TlsGetValue 8708->8710 8709->8710 8712 7ff6dc612a4e 8711->8712 8713 7ff6dc612a5f EnterCriticalSection 8711->8713 8717 7ff6dc612afc 8712->8717 8716 7ff6dc60cb60 __updatetlocinfo 68 API calls 8716->8713 8718 7ff6dc612b19 8717->8718 8719 7ff6dc612b32 8717->8719 8720 7ff6dc60d294 _FF_MSGBANNER 67 API calls 8718->8720 8731 7ff6dc612a53 8719->8731 8738 7ff6dc60cf98 8719->8738 8722 7ff6dc612b1e 8720->8722 8724 7ff6dc60d308 _NMSG_WRITE 67 API calls 8722->8724 8727 7ff6dc612b28 8724->8727 8725 7ff6dc612b6b 8729 7ff6dc612a30 _lock 67 API calls 8725->8729 8726 7ff6dc612b5c 8728 7ff6dc60ca74 _errno 67 API calls 8726->8728 8730 7ff6dc60cb48 malloc 3 API calls 8727->8730 8728->8731 8732 7ff6dc612b75 8729->8732 8730->8719 8731->8713 8731->8716 8733 7ff6dc612b80 InitializeCriticalSectionAndSpinCount 8732->8733 8734 7ff6dc612b91 8732->8734 8735 7ff6dc612b97 LeaveCriticalSection 8733->8735 8736 7ff6dc60a4bc free 67 API calls 8734->8736 8735->8731 8737 7ff6dc612b96 8736->8737 8737->8735 8739 7ff6dc60cfc0 8738->8739 8741 7ff6dc60cff5 8739->8741 8742 7ff6dc60cfd4 Sleep 8739->8742 8743 7ff6dc60a750 8739->8743 8741->8725 8741->8726 8742->8739 8742->8741 8744 7ff6dc60a7e4 8743->8744 8750 7ff6dc60a768 8743->8750 8745 7ff6dc60d258 _calloc_impl DecodePointer 8744->8745 8747 7ff6dc60a7e9 8745->8747 8746 7ff6dc60a7a0 HeapAlloc 8746->8750 8751 7ff6dc60a7d9 8746->8751 8749 7ff6dc60ca74 _errno 68 API calls 8747->8749 8748 7ff6dc60d294 _FF_MSGBANNER 68 API calls 8748->8750 8749->8751 8750->8746 8750->8748 8752 7ff6dc60a7c9 8750->8752 8754 7ff6dc60d308 _NMSG_WRITE 68 API calls 8750->8754 8756 7ff6dc60a7ce 8750->8756 8757 7ff6dc60cb48 malloc 3 API calls 8750->8757 8759 7ff6dc60d258 DecodePointer 8750->8759 8751->8739 8753 7ff6dc60ca74 _errno 68 API calls 8752->8753 8753->8756 8754->8750 8758 7ff6dc60ca74 _errno 68 API calls 8756->8758 8757->8750 8758->8751 8760 7ff6dc60d273 8759->8760 8760->8750 8762 7ff6dc60cf3d 8761->8762 8764 7ff6dc60cf7a 8762->8764 8765 7ff6dc60cf5b Sleep 8762->8765 8780 7ff6dc612ec8 8762->8780 8764->8530 8765->8762 8765->8764 8767 7ff6dc60bc64 8766->8767 8768 7ff6dc60bc5a 8766->8768 8769 7ff6dc60ca74 _errno 69 API calls 8767->8769 8768->8767 8771 7ff6dc60bc81 8768->8771 8770 7ff6dc60bc6d 8769->8770 8788 7ff6dc60d1fc 8770->8788 8773 7ff6dc60bc79 8771->8773 8774 7ff6dc60ca74 _errno 69 API calls 8771->8774 8773->8530 8774->8770 8776 7ff6dc60d22e 8775->8776 8797 7ff6dc60d098 8776->8797 8781 7ff6dc612edd 8780->8781 8786 7ff6dc612efa 8780->8786 8782 7ff6dc612eeb 8781->8782 8781->8786 8783 7ff6dc60ca74 _errno 68 API calls 8782->8783 8785 7ff6dc612ef0 8783->8785 8784 7ff6dc612f12 HeapAlloc 8784->8785 8784->8786 8785->8762 8786->8784 8786->8785 8787 7ff6dc60d258 _calloc_impl DecodePointer 8786->8787 8787->8786 8791 7ff6dc60d194 DecodePointer 8788->8791 8792 7ff6dc60d1d2 8791->8792 8793 7ff6dc60d21c _invoke_watson 16 API calls 8792->8793 8794 7ff6dc60d1f8 8793->8794 8795 7ff6dc60d194 _invalid_parameter_noinfo 16 API calls 8794->8795 8796 7ff6dc60d215 8795->8796 8796->8773 8798 7ff6dc60d0d3 __raise_securityfailure setSBCS 8797->8798 8805 7ff6dc60d75c RtlCaptureContext RtlLookupFunctionEntry 8798->8805 8806 7ff6dc60d78c RtlVirtualUnwind 8805->8806 8807 7ff6dc60d10b IsDebuggerPresent 8805->8807 8806->8807 8808 7ff6dc60dcd4 SetUnhandledExceptionFilter UnhandledExceptionFilter 8807->8808 8810 7ff6dc612c43 EncodePointer 8809->8810 8810->8810 8811 7ff6dc612c5e 8810->8811 8811->8537 8815 7ff6dc60a560 8812->8815 8828 7ff6dc60cd20 8815->8828 8830 7ff6dc6018bd 8829->8830 8838 7ff6dc601a6d 8830->8838 8863 7ff6dc602020 8830->8863 8832 7ff6dc60a330 __crtGetStringTypeA_stat 9 API calls 8833 7ff6dc601ab6 8832->8833 8833->8557 8834 7ff6dc6018e3 8836 7ff6dc602020 71 API calls 8834->8836 8840 7ff6dc601919 memcpy_s 8834->8840 8835 7ff6dc601a47 UuidFromStringW 8835->8838 8836->8840 8837 7ff6dc602020 71 API calls 8839 7ff6dc6019c1 memcpy_s 8837->8839 8838->8832 8839->8835 8840->8835 8840->8837 8843 7ff6dc602a64 8841->8843 8842 7ff6dc601fb6 CoUninitialize SysFreeString 8842->8571 8843->8842 8844 7ff6dc602aeb 8843->8844 8846 7ff6dc602ad6 RaiseException 8843->8846 8845 7ff6dc602b36 DeleteCriticalSection 8844->8845 8845->8842 8846->8844 8848 7ff6dc60a339 8847->8848 8849 7ff6dc601fe8 8848->8849 8850 7ff6dc60ab68 IsProcessorFeaturePresent 8848->8850 8849->8469 8851 7ff6dc60ab7f 8850->8851 8918 7ff6dc60d7cc RtlCaptureContext 8851->8918 8857 7ff6dc6028c9 8856->8857 8858 7ff6dc6028bf 8856->8858 8928 7ff6dc60a4fc 8857->8928 8858->8592 8861 7ff6dc60bf38 _CxxThrowException 2 API calls 8860->8861 8862 7ff6dc605ff9 SetLastError 8861->8862 8866 7ff6dc602c10 8863->8866 8865 7ff6dc602049 8865->8834 8867 7ff6dc602ce4 8866->8867 8868 7ff6dc602c3a 8866->8868 8890 7ff6dc60a284 8867->8890 8870 7ff6dc602cf0 8868->8870 8871 7ff6dc602c57 8868->8871 8875 7ff6dc602c7a memcpy_s 8868->8875 8872 7ff6dc60a284 71 API calls 8870->8872 8876 7ff6dc602b60 8871->8876 8873 7ff6dc602cfd 8872->8873 8875->8865 8877 7ff6dc602c00 8876->8877 8880 7ff6dc602b7d memcpy_s 8876->8880 8878 7ff6dc60a284 71 API calls 8877->8878 8879 7ff6dc602c0c 8878->8879 8881 7ff6dc602ce4 8879->8881 8882 7ff6dc602c3a 8879->8882 8880->8875 8883 7ff6dc60a284 71 API calls 8881->8883 8884 7ff6dc602cf0 8882->8884 8886 7ff6dc602c57 8882->8886 8889 7ff6dc602c7a memcpy_s 8882->8889 8883->8884 8885 7ff6dc60a284 71 API calls 8884->8885 8887 7ff6dc602cfd 8885->8887 8888 7ff6dc602b60 71 API calls 8886->8888 8888->8889 8889->8875 8895 7ff6dc60bd98 8890->8895 8894 7ff6dc60a2b9 8903 7ff6dc60bea0 8895->8903 8898 7ff6dc60bf38 8899 7ff6dc60bfb8 RtlPcToFileHeader 8898->8899 8900 7ff6dc60bfa8 8898->8900 8901 7ff6dc60bff8 RaiseException 8899->8901 8902 7ff6dc60bfdd 8899->8902 8900->8899 8901->8894 8902->8901 8904 7ff6dc60a29c 8903->8904 8905 7ff6dc60bea5 _woutput_s_l 8903->8905 8904->8898 8906 7ff6dc60a750 malloc 69 API calls 8905->8906 8907 7ff6dc60bece 8906->8907 8907->8904 8909 7ff6dc611320 8907->8909 8910 7ff6dc611335 8909->8910 8911 7ff6dc61132b 8909->8911 8912 7ff6dc60ca74 _errno 69 API calls 8910->8912 8911->8910 8914 7ff6dc611351 8911->8914 8913 7ff6dc61133d 8912->8913 8915 7ff6dc60d1fc _invalid_parameter_noinfo 17 API calls 8913->8915 8916 7ff6dc611349 8914->8916 8917 7ff6dc60ca74 _errno 69 API calls 8914->8917 8915->8916 8916->8904 8917->8913 8919 7ff6dc60d7e6 RtlLookupFunctionEntry 8918->8919 8920 7ff6dc60d7fc RtlVirtualUnwind 8919->8920 8921 7ff6dc60ab92 8919->8921 8920->8919 8920->8921 8922 7ff6dc60ab1c IsDebuggerPresent 8921->8922 8923 7ff6dc60ab3b __raise_securityfailure 8922->8923 8927 7ff6dc60dcd4 SetUnhandledExceptionFilter UnhandledExceptionFilter 8923->8927 8931 7ff6dc60acec 8928->8931 8936 7ff6dc60acf7 8931->8936 8932 7ff6dc60a750 malloc 69 API calls 8932->8936 8933 7ff6dc60a50e 8933->8858 8934 7ff6dc60d258 _calloc_impl DecodePointer 8934->8936 8935 7ff6dc60ad16 std::_Xbad_alloc 8937 7ff6dc60bf38 _CxxThrowException 2 API calls 8935->8937 8936->8932 8936->8933 8936->8934 8936->8935 8938 7ff6dc60ad54 8937->8938 8940 7ff6dc6110f0 8939->8940 8941 7ff6dc60ca74 _errno 69 API calls 8940->8941 8943 7ff6dc60d2a2 8940->8943 8942 7ff6dc611115 8941->8942 8944 7ff6dc60d1fc _invalid_parameter_noinfo 17 API calls 8942->8944 8943->8598 8943->8599 8944->8943 8949 7ff6dc60a691 8945->8949 8946 7ff6dc60a696 8947 7ff6dc60ca74 _errno 69 API calls 8946->8947 8948 7ff6dc60a69b 8946->8948 8950 7ff6dc60a6c0 8947->8950 8948->8627 8948->8632 8949->8946 8949->8948 8952 7ff6dc60a6d4 8949->8952 8951 7ff6dc60d1fc _invalid_parameter_noinfo 17 API calls 8950->8951 8951->8948 8952->8948 8953 7ff6dc60ca74 _errno 69 API calls 8952->8953 8953->8950 8955 7ff6dc612f75 8954->8955 8957 7ff6dc612f7f 8954->8957 8955->8957 8961 7ff6dc612fb6 8955->8961 8956 7ff6dc60ca74 _errno 69 API calls 8958 7ff6dc612f88 8956->8958 8957->8956 8959 7ff6dc60d1fc _invalid_parameter_noinfo 17 API calls 8958->8959 8960 7ff6dc60d443 8959->8960 8960->8634 8960->8636 8961->8960 8962 7ff6dc60ca74 _errno 69 API calls 8961->8962 8962->8958 8964 7ff6dc613041 __crtIsPackagedApp 8963->8964 8965 7ff6dc613051 LoadLibraryExW 8964->8965 8966 7ff6dc613144 IsDebuggerPresent 8964->8966 8967 7ff6dc613096 GetProcAddress 8965->8967 8968 7ff6dc61306e GetLastError 8965->8968 8969 7ff6dc61316b 8966->8969 8970 7ff6dc61314e 8966->8970 8971 7ff6dc613161 8967->8971 8973 7ff6dc6130af 7 API calls 8967->8973 8968->8971 8972 7ff6dc61307d LoadLibraryW 8968->8972 8974 7ff6dc61315c 8969->8974 8976 7ff6dc613170 DecodePointer 8969->8976 8970->8974 8975 7ff6dc613153 OutputDebugStringW 8970->8975 8979 7ff6dc60a330 __crtGetStringTypeA_stat 9 API calls 8971->8979 8972->8967 8972->8971 8973->8966 8977 7ff6dc613124 GetProcAddress EncodePointer 8973->8977 8974->8971 8978 7ff6dc61319c DecodePointer DecodePointer 8974->8978 8984 7ff6dc6131ba 8974->8984 8975->8974 8976->8971 8977->8966 8978->8984 8982 7ff6dc613267 8979->8982 8980 7ff6dc613236 DecodePointer 8980->8971 8981 7ff6dc613202 DecodePointer 8981->8980 8983 7ff6dc61320d 8981->8983 8982->8606 8983->8980 8985 7ff6dc613223 DecodePointer 8983->8985 8984->8980 8984->8981 8986 7ff6dc6131f0 8984->8986 8985->8980 8985->8986 8986->8980 8988 7ff6dc60cb3f ExitProcess 8987->8988 8989 7ff6dc60cb24 GetProcAddress 8987->8989 8989->8988 8990 7ff6dc60cb3b 8989->8990 8990->8988 8992 7ff6dc612a30 _lock 61 API calls 8991->8992 8993 7ff6dc60cd66 8992->8993 8994 7ff6dc60cd8d DecodePointer 8993->8994 8998 7ff6dc60ce54 doexit 8993->8998 8997 7ff6dc60cdab DecodePointer 8994->8997 8994->8998 8999 7ff6dc60cdd0 8997->8999 9000 7ff6dc60ce8a 8998->9000 9009 7ff6dc612c18 LeaveCriticalSection 8998->9009 8999->8998 9002 7ff6dc60cdde EncodePointer 8999->9002 9006 7ff6dc60cdf2 DecodePointer EncodePointer 8999->9006 9003 7ff6dc60cb85 9000->9003 9008 7ff6dc612c18 LeaveCriticalSection 9000->9008 9001 7ff6dc60cea3 9004 7ff6dc60cb04 __crtCorExitProcess GetModuleHandleExW GetProcAddress 9001->9004 9002->8999 9005 7ff6dc60ceab ExitProcess 9004->9005 9007 7ff6dc60ce0b DecodePointer DecodePointer 9006->9007 9007->8999 11170 7ff6dc614050 11177 7ff6dc61508c 11170->11177 11178 7ff6dc615098 11177->11178 11179 7ff6dc612a30 _lock 69 API calls 11178->11179 11184 7ff6dc6150c0 11179->11184 11180 7ff6dc615151 11201 7ff6dc612c18 LeaveCriticalSection 11180->11201 11184->11180 11185 7ff6dc614174 _fflush_nolock LeaveCriticalSection 11184->11185 11186 7ff6dc614fc4 92 API calls _fflush_nolock 11184->11186 11196 7ff6dc6140f0 11184->11196 11185->11184 11186->11184 11197 7ff6dc6140fe 11196->11197 11198 7ff6dc614111 EnterCriticalSection 11196->11198 11199 7ff6dc612a30 _lock 69 API calls 11197->11199 11200 7ff6dc614106 11199->11200 11200->11184 11355 7ff6dc615e42 11358 7ff6dc612c18 LeaveCriticalSection 11355->11358 9015 7ff6dc6020e0 9016 7ff6dc6020fd 9015->9016 9017 7ff6dc60210b 9016->9017 9019 7ff6dc6013d0 9016->9019 9020 7ff6dc601427 EnterCriticalSection 9019->9020 9021 7ff6dc601416 9019->9021 9027 7ff6dc6016aa 9020->9027 9029 7ff6dc60145c 9020->9029 9021->9020 9022 7ff6dc601420 9021->9022 9026 7ff6dc60a330 __crtGetStringTypeA_stat 9 API calls 9022->9026 9023 7ff6dc6014d7 GetModuleFileNameW 9025 7ff6dc6014ef LoadTypeLibEx 9023->9025 9024 7ff6dc601712 LeaveCriticalSection 9024->9022 9025->9027 9038 7ff6dc601509 9025->9038 9028 7ff6dc60172c 9026->9028 9027->9024 9039 7ff6dc601140 9027->9039 9028->9017 9029->9023 9031 7ff6dc6014a1 9029->9031 9031->9023 9033 7ff6dc6014aa GetModuleFileNameW 9031->9033 9033->9027 9034 7ff6dc6014ca 9033->9034 9034->9025 9034->9027 9035 7ff6dc60a4fc new 71 API calls 9036 7ff6dc60166d 9035->9036 9036->9027 9037 7ff6dc601675 EnterCriticalSection LeaveCriticalSection 9036->9037 9037->9027 9038->9027 9038->9035 9041 7ff6dc601170 9039->9041 9040 7ff6dc601228 9040->9024 9041->9040 9042 7ff6dc6012d1 SysStringLen 9041->9042 9043 7ff6dc6012c8 SysFreeString 9041->9043 9044 7ff6dc601300 SysFreeString 9041->9044 9042->9041 9043->9042 9044->9041 10964 7ff6dc615dba 10965 7ff6dc615dd6 10964->10965 10966 7ff6dc615dcc 10964->10966 10968 7ff6dc612c18 LeaveCriticalSection 10966->10968 11671 7ff6dc60eebc 11672 7ff6dc60eefd 11671->11672 11673 7ff6dc60eed2 11671->11673 11674 7ff6dc612a30 _lock 69 API calls 11673->11674 11675 7ff6dc60eedc 11674->11675 11676 7ff6dc60e0b0 _updatetlocinfoEx_nolock 69 API calls 11675->11676 11677 7ff6dc60eeec 11676->11677 11679 7ff6dc612c18 LeaveCriticalSection 11677->11679

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 0 7ff6dc601ad0-7ff6dc601b3a GetCommandLineW CoInitializeEx 1 7ff6dc601b60-7ff6dc601b71 0->1 2 7ff6dc601b3c-7ff6dc601b4b 0->2 3 7ff6dc601b73-7ff6dc601b79 1->3 4 7ff6dc601b90-7ff6dc601bc1 GetCurrentThreadId 1->4 2->1 5 7ff6dc601b4d 2->5 6 7ff6dc601b7b-7ff6dc601b80 3->6 7 7ff6dc601b87-7ff6dc601b8e 3->7 8 7ff6dc601bc3-7ff6dc601bc6 4->8 9 7ff6dc601bc8-7ff6dc601bcb 4->9 10 7ff6dc601b50-7ff6dc601b5e 5->10 6->7 7->3 7->4 11 7ff6dc601bda-7ff6dc601c0e call 7ff6dc602ea0 StringFromGUID2 SysAllocString 8->11 12 7ff6dc601bd0-7ff6dc601bd8 9->12 10->1 17 7ff6dc602004-7ff6dc60200e call 7ff6dc605fe0 11->17 18 7ff6dc601c14-7ff6dc601c1f SysStringLen 11->18 12->11 12->12 26 7ff6dc60200f-7ff6dc602019 call 7ff6dc605fe0 17->26 19 7ff6dc601c35-7ff6dc601c4c 18->19 20 7ff6dc601c21-7ff6dc601c2f SysStringLen CharUpperBuffW 18->20 22 7ff6dc601c53-7ff6dc601c5b 19->22 23 7ff6dc601c4e-7ff6dc601c51 19->23 20->19 22->22 25 7ff6dc601c5d-7ff6dc601c88 call 7ff6dc602ea0 call 7ff6dc601880 22->25 23->25 33 7ff6dc601c94-7ff6dc601c97 25->33 34 7ff6dc601c8a-7ff6dc601c8f call 7ff6dc60a30c 25->34 36 7ff6dc601ca0-7ff6dc601cb0 33->36 37 7ff6dc601c99-7ff6dc601c9c 33->37 34->33 38 7ff6dc601cb4-7ff6dc601cb8 36->38 37->36 39 7ff6dc601d8f-7ff6dc601d92 38->39 40 7ff6dc601cbe 38->40 42 7ff6dc601faa-7ff6dc601fcb call 7ff6dc602a40 CoUninitialize SysFreeString 39->42 43 7ff6dc601d98-7ff6dc601db2 CreateEventW 39->43 41 7ff6dc601cc2-7ff6dc601cc8 40->41 44 7ff6dc601cdd-7ff6dc601cec CharNextW 41->44 45 7ff6dc601cca-7ff6dc601ccd 41->45 59 7ff6dc601fcd-7ff6dc601fd2 call 7ff6dc60a30c 42->59 60 7ff6dc601fd7-7ff6dc602003 call 7ff6dc60a330 42->60 46 7ff6dc601db4-7ff6dc601dd5 CreateThread 43->46 47 7ff6dc601ddb-7ff6dc601de1 43->47 44->38 51 7ff6dc601cee 44->51 49 7ff6dc601cf3-7ff6dc601d02 CharNextW 45->49 50 7ff6dc601ccf-7ff6dc601cdb CharNextW 45->50 46->47 52 7ff6dc601de3-7ff6dc601e07 StringFromGUID2 SysAllocString 47->52 53 7ff6dc601e1d-7ff6dc601e30 SysStringLen 47->53 49->39 55 7ff6dc601d08 49->55 50->41 50->44 51->39 52->26 56 7ff6dc601e0d-7ff6dc601e17 SysFreeString * 2 52->56 57 7ff6dc601e32-7ff6dc601e40 SysStringLen CharUpperBuffW 53->57 58 7ff6dc601e46-7ff6dc601e51 53->58 63 7ff6dc601d10-7ff6dc601d22 lstrcmpiW 55->63 56->53 57->58 64 7ff6dc601e53-7ff6dc601e5d call 7ff6dc6028a0 58->64 65 7ff6dc601e62-7ff6dc601e6d 58->65 59->60 63->42 67 7ff6dc601d28-7ff6dc601d3a lstrcmpiW 63->67 64->65 69 7ff6dc601e72-7ff6dc601e7a 65->69 67->42 70 7ff6dc601d40-7ff6dc601d44 67->70 72 7ff6dc601f34-7ff6dc601f36 69->72 73 7ff6dc601e80-7ff6dc601e9e CreateItemMoniker 69->73 70->39 78 7ff6dc601d46-7ff6dc601d4a 70->78 76 7ff6dc601f81-7ff6dc601f99 SleepEx 72->76 77 7ff6dc601f38-7ff6dc601f4d GetMessageW 72->77 74 7ff6dc601ea0-7ff6dc601eb3 Sleep 73->74 75 7ff6dc601ebd-7ff6dc601ec5 73->75 79 7ff6dc601eb5-7ff6dc601ebb 74->79 80 7ff6dc601f2a-7ff6dc601f2c 74->80 83 7ff6dc601ed2-7ff6dc601ee3 GetRunningObjectTable 75->83 84 7ff6dc601ec7-7ff6dc601ecc 75->84 85 7ff6dc601fa1-7ff6dc601fa4 SysFreeString 76->85 86 7ff6dc601f9b 76->86 81 7ff6dc601f72-7ff6dc601f7b 77->81 82 7ff6dc601f4f 77->82 87 7ff6dc601d50-7ff6dc601d56 78->87 79->80 80->69 88 7ff6dc601f32 80->88 81->76 89 7ff6dc601f50-7ff6dc601f70 DispatchMessageW GetMessageW 82->89 90 7ff6dc601ee5-7ff6dc601ee8 83->90 91 7ff6dc601f0f-7ff6dc601f14 Sleep 83->91 84->83 85->42 86->85 92 7ff6dc601d6b-7ff6dc601d7a CharNextW 87->92 93 7ff6dc601d58-7ff6dc601d5b 87->93 88->77 89->81 89->89 95 7ff6dc601f1a-7ff6dc601f22 90->95 96 7ff6dc601eea-7ff6dc601f04 90->96 91->95 92->70 99 7ff6dc601d7c 92->99 97 7ff6dc601d7e-7ff6dc601d8d CharNextW 93->97 98 7ff6dc601d5d-7ff6dc601d69 CharNextW 93->98 95->80 100 7ff6dc601f24 95->100 101 7ff6dc601f09-7ff6dc601f0d 96->101 97->39 97->63 98->87 98->92 99->39 100->80 101->91 101->95
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: String$Char$Next$Free$CreateMessageSleep$AllocBuffFromThreadUpperlstrcmpi$CommandCurrentDispatchEventInitializeItemLineMonikerObjectRunningTableUninitialize
                                                                          • String ID: RegServer$UnregServer
                                                                          • API String ID: 1937296366-1360048911
                                                                          • Opcode ID: 5bc4c8443623e7e6876561bb591e32ba5ff234cd11f360b304cdb9faa03ff9cb
                                                                          • Instruction ID: 3b31a185aea82ee5bb1dc68876387f49448ca56354bc9a35e6ca511870835243
                                                                          • Opcode Fuzzy Hash: 5bc4c8443623e7e6876561bb591e32ba5ff234cd11f360b304cdb9faa03ff9cb
                                                                          • Instruction Fuzzy Hash: C2F16025A09BCB81EB169B26E45027D63A0FF94B95F444036DE0E937A8DF3CE466F740

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 102 7ff6dc6013d0-7ff6dc601414 103 7ff6dc601427-7ff6dc601456 EnterCriticalSection 102->103 104 7ff6dc601416-7ff6dc60141e 102->104 106 7ff6dc60145c-7ff6dc601470 103->106 107 7ff6dc6016fa 103->107 104->103 105 7ff6dc601420-7ff6dc601422 104->105 109 7ff6dc60171d-7ff6dc601748 call 7ff6dc60a330 105->109 110 7ff6dc601472-7ff6dc60147b 106->110 111 7ff6dc6014d7-7ff6dc6014e9 GetModuleFileNameW 106->111 108 7ff6dc6016fc-7ff6dc6016ff 107->108 112 7ff6dc601712-7ff6dc60171b LeaveCriticalSection 108->112 113 7ff6dc601701-7ff6dc601709 108->113 110->111 116 7ff6dc60147d-7ff6dc601486 110->116 114 7ff6dc6014ef-7ff6dc601503 LoadTypeLibEx 111->114 112->109 113->112 117 7ff6dc60170b call 7ff6dc601140 113->117 118 7ff6dc6016f1-7ff6dc6016f8 114->118 119 7ff6dc601509-7ff6dc60151b 114->119 116->111 121 7ff6dc601488-7ff6dc601491 116->121 125 7ff6dc601710 117->125 118->108 126 7ff6dc601525-7ff6dc601529 119->126 121->111 122 7ff6dc601493-7ff6dc60149f 121->122 122->111 124 7ff6dc6014a1-7ff6dc6014a8 122->124 124->111 127 7ff6dc6014aa-7ff6dc6014c4 GetModuleFileNameW 124->127 125->112 128 7ff6dc6016d5-7ff6dc6016e9 126->128 129 7ff6dc60152f-7ff6dc60153c 126->129 127->118 130 7ff6dc6014ca-7ff6dc6014cf 127->130 128->118 136 7ff6dc6016eb 128->136 131 7ff6dc60153e-7ff6dc601544 129->131 132 7ff6dc601549-7ff6dc601561 129->132 130->118 133 7ff6dc6014d5 130->133 131->132 138 7ff6dc601634-7ff6dc601639 132->138 139 7ff6dc601567-7ff6dc601574 132->139 133->114 136->118 142 7ff6dc60163e-7ff6dc601654 138->142 140 7ff6dc601580-7ff6dc601583 139->140 141 7ff6dc601576-7ff6dc601579 139->141 143 7ff6dc6015f2-7ff6dc6015f8 140->143 145 7ff6dc601585-7ff6dc6015c8 140->145 141->143 144 7ff6dc60157b 141->144 146 7ff6dc6016b4-7ff6dc6016b7 142->146 147 7ff6dc601656-7ff6dc60165a 142->147 148 7ff6dc60161e-7ff6dc601621 143->148 149 7ff6dc6015fa-7ff6dc601615 143->149 144->142 165 7ff6dc6015ca-7ff6dc6015d3 145->165 166 7ff6dc6015d8-7ff6dc6015db 145->166 150 7ff6dc6016b9-7ff6dc6016c2 146->150 151 7ff6dc6016c7-7ff6dc6016ca 146->151 147->146 152 7ff6dc60165c-7ff6dc601673 call 7ff6dc60a4fc 147->152 154 7ff6dc601626-7ff6dc601629 148->154 149->148 163 7ff6dc601617-7ff6dc60161c 149->163 150->151 151->128 155 7ff6dc6016cc-7ff6dc6016cf 151->155 161 7ff6dc601675-7ff6dc6016a4 EnterCriticalSection LeaveCriticalSection 152->161 162 7ff6dc6016aa-7ff6dc6016af 152->162 154->142 160 7ff6dc60162b-7ff6dc60162e 154->160 155->128 160->138 161->162 162->146 163->154 165->166 167 7ff6dc6015e3-7ff6dc6015e6 166->167 168 7ff6dc6015dd 166->168 167->138 169 7ff6dc6015e8-7ff6dc6015ed 167->169 168->167 169->143
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: CriticalSection$EnterFileLeaveModuleName$LoadType
                                                                          • String ID:
                                                                          • API String ID: 1214901732-0
                                                                          • Opcode ID: f4cbecc4a7ccbc3adac25dfa60ba73628258adb59bb4a2edbefa53881256ea69
                                                                          • Instruction ID: d6fbef439214a3bfe8174ba71b0a82853f5b4f4ecd627ae058feeacca02196b1
                                                                          • Opcode Fuzzy Hash: f4cbecc4a7ccbc3adac25dfa60ba73628258adb59bb4a2edbefa53881256ea69
                                                                          • Instruction Fuzzy Hash: B3B15236A08BCA82EB26CB16E45066D73A0FB84B94F584137DE4D93768DF3CD566E700

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ObjectSingleWait$CloseHandleMessagePostThread
                                                                          • String ID:
                                                                          • API String ID: 3386540786-0
                                                                          • Opcode ID: 79500c9f6d63bc6a94024569c830735f4b117551e5a17f7cb2fa18f5661a4629
                                                                          • Instruction ID: 7c30384120021afb686e030d9fb472960e817b1e19de57b08e10823636405c53
                                                                          • Opcode Fuzzy Hash: 79500c9f6d63bc6a94024569c830735f4b117551e5a17f7cb2fa18f5661a4629
                                                                          • Instruction Fuzzy Hash: 79F04F32A045C986E7119F3AD44472D37A2EB99F6AF485171CA0A86298CF3C9496EB40

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: String$Free
                                                                          • String ID:
                                                                          • API String ID: 1391021980-0
                                                                          • Opcode ID: 5ea933c3ecd19440366d680d9037e9c8aeb9464f04f2d5fe758aee05ef6e430a
                                                                          • Instruction ID: 687dc446b4568657e3d318cb443468182185530143cb987e140aa6bca67ad1a2
                                                                          • Opcode Fuzzy Hash: 5ea933c3ecd19440366d680d9037e9c8aeb9464f04f2d5fe758aee05ef6e430a
                                                                          • Instruction Fuzzy Hash: A2512B36608BCA82DB259F16E49076D73A4FB89B90F008136DEAD93758DF3CD466E700

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: CriticalDeleteExceptionRaiseSection
                                                                          • String ID:
                                                                          • API String ID: 966263044-0
                                                                          • Opcode ID: 97b1c73291426dda37b7fb37eee4591fd4a4fb0cb541bdf71657b9378348bea6
                                                                          • Instruction ID: 24d2467c83d7b590d4104fbd067b1b850a4591c4976837c22fff0fd1f2961d50
                                                                          • Opcode Fuzzy Hash: 97b1c73291426dda37b7fb37eee4591fd4a4fb0cb541bdf71657b9378348bea6
                                                                          • Instruction Fuzzy Hash: DB315E32605B8686EB268F12E45026D73A4FF44B89F494436DF4DA3B54CF3CD462A700
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: CharCloseNext$lstrcmpi$Open$Delete$AddressCreateHandleModuleProcValue
                                                                          • String ID: Advapi32.dll$Delete$ForceRemove$NoRemove$RegDeleteKeyExW$RegOpenKeyTransactedW$Val
                                                                          • API String ID: 431942798-84292820
                                                                          • Opcode ID: 14e5cbea3e26ee8f8519a2f96e99103b431c102be3cfa58ceec793359c2c87c8
                                                                          • Instruction ID: 5d4e6ddab5a72776efc01afbe396be6457e47eeb472585db4520b2725ba7a448
                                                                          • Opcode Fuzzy Hash: 14e5cbea3e26ee8f8519a2f96e99103b431c102be3cfa58ceec793359c2c87c8
                                                                          • Instruction Fuzzy Hash: 25325131A187CA86FB228B66E45037D63A5EF84794F100137DA4DD7B94EF6CE462BB04

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 628 7ff6dc6142fc-7ff6dc614344 call 7ff6dc615190 631 7ff6dc614346-7ff6dc614348 628->631 632 7ff6dc61434d-7ff6dc614350 628->632 633 7ff6dc614a0e-7ff6dc614a37 call 7ff6dc60a330 631->633 634 7ff6dc614371-7ff6dc6143a3 632->634 635 7ff6dc614352-7ff6dc61436c call 7ff6dc60ca04 call 7ff6dc60ca74 call 7ff6dc60d1fc 632->635 638 7ff6dc6143ae-7ff6dc6143b4 634->638 639 7ff6dc6143a5-7ff6dc6143ac 634->639 635->633 642 7ff6dc6143b6-7ff6dc6143be call 7ff6dc614b1c 638->642 643 7ff6dc6143c3-7ff6dc6143cc call 7ff6dc6141bc 638->643 639->635 639->638 642->643 649 7ff6dc61468e-7ff6dc61469f 643->649 650 7ff6dc6143d2-7ff6dc6143e3 643->650 652 7ff6dc614970-7ff6dc61498c WriteFile 649->652 653 7ff6dc6146a5-7ff6dc6146b1 649->653 650->649 654 7ff6dc6143e9-7ff6dc61441d call 7ff6dc60ebe0 GetConsoleMode 650->654 659 7ff6dc614996-7ff6dc61499c GetLastError 652->659 660 7ff6dc61498e-7ff6dc614994 652->660 656 7ff6dc6146b7-7ff6dc6146ba 653->656 657 7ff6dc61477f-7ff6dc614783 653->657 654->649 669 7ff6dc614423-7ff6dc614425 654->669 663 7ff6dc6149ce-7ff6dc6149e4 656->663 664 7ff6dc6146c0 656->664 661 7ff6dc614789-7ff6dc61478c 657->661 662 7ff6dc61485e-7ff6dc614861 657->662 666 7ff6dc61499e-7ff6dc6149a0 659->666 660->666 661->663 667 7ff6dc614792 661->667 662->663 670 7ff6dc614867 662->670 671 7ff6dc6149e6-7ff6dc6149ea 663->671 672 7ff6dc6149f0-7ff6dc614a00 call 7ff6dc60ca74 call 7ff6dc60ca04 663->672 668 7ff6dc6146c3-7ff6dc6146ce 664->668 673 7ff6dc614a08-7ff6dc614a0c 666->673 674 7ff6dc6149a2-7ff6dc6149a4 666->674 676 7ff6dc614797-7ff6dc6147a2 667->676 677 7ff6dc6146d0-7ff6dc6146d9 668->677 678 7ff6dc614427-7ff6dc61442a 669->678 679 7ff6dc614430-7ff6dc614444 GetConsoleCP 669->679 680 7ff6dc61486d-7ff6dc614872 670->680 671->631 671->672 672->673 673->633 674->663 675 7ff6dc6149a6-7ff6dc6149a9 674->675 682 7ff6dc6149ab-7ff6dc6149bb call 7ff6dc60ca74 call 7ff6dc60ca04 675->682 683 7ff6dc6149c2-7ff6dc6149c9 call 7ff6dc60ca24 675->683 684 7ff6dc6147a4-7ff6dc6147ad 676->684 685 7ff6dc6146db-7ff6dc6146e4 677->685 686 7ff6dc614701-7ff6dc614744 WriteFile 677->686 678->649 678->679 687 7ff6dc61444a-7ff6dc61444d 679->687 688 7ff6dc614685-7ff6dc614689 679->688 689 7ff6dc614874-7ff6dc61487d 680->689 682->683 683->663 693 7ff6dc6147af-7ff6dc6147bc 684->693 694 7ff6dc6147e0-7ff6dc614823 WriteFile 684->694 696 7ff6dc6146e6-7ff6dc6146ed 685->696 697 7ff6dc6146f0-7ff6dc6146ff 685->697 686->659 700 7ff6dc61474a-7ff6dc614760 686->700 698 7ff6dc6145d7-7ff6dc6145dc 687->698 699 7ff6dc614453-7ff6dc614472 687->699 688->674 701 7ff6dc6148ae-7ff6dc6148f7 WideCharToMultiByte 689->701 702 7ff6dc61487f-7ff6dc61488c 689->702 710 7ff6dc6147cc-7ff6dc6147de 693->710 711 7ff6dc6147be-7ff6dc6147c8 693->711 694->659 712 7ff6dc614829-7ff6dc61483f 694->712 696->697 697->677 697->686 706 7ff6dc6145fc 698->706 707 7ff6dc6145de-7ff6dc6145fa 698->707 714 7ff6dc614494-7ff6dc61449e call 7ff6dc60ef48 699->714 715 7ff6dc614474-7ff6dc614492 699->715 700->666 716 7ff6dc614766-7ff6dc614774 700->716 701->659 709 7ff6dc6148fd 701->709 703 7ff6dc61489a-7ff6dc6148ac 702->703 704 7ff6dc61488e-7ff6dc614896 702->704 703->689 703->701 704->703 717 7ff6dc614601-7ff6dc614606 706->717 707->717 722 7ff6dc6148ff-7ff6dc614939 WriteFile 709->722 710->684 710->694 711->710 712->666 719 7ff6dc614845-7ff6dc614853 712->719 734 7ff6dc6144a0-7ff6dc6144ad 714->734 735 7ff6dc6144d4-7ff6dc6144da 714->735 720 7ff6dc6144dd-7ff6dc6144ea call 7ff6dc614f48 715->720 716->668 723 7ff6dc61477a 716->723 724 7ff6dc614647 717->724 725 7ff6dc614608-7ff6dc614617 call 7ff6dc61546c 717->725 719->676 730 7ff6dc614859 719->730 743 7ff6dc61467c-7ff6dc614680 720->743 744 7ff6dc6144f0-7ff6dc61452d WideCharToMultiByte 720->744 727 7ff6dc614949-7ff6dc614951 GetLastError 722->727 728 7ff6dc61493b-7ff6dc614945 722->728 723->666 733 7ff6dc61464c-7ff6dc614654 724->733 725->659 746 7ff6dc61461d-7ff6dc614623 725->746 737 7ff6dc614955-7ff6dc614957 727->737 728->722 736 7ff6dc614947 728->736 730->666 733->743 745 7ff6dc614656 733->745 739 7ff6dc61465b-7ff6dc614673 734->739 740 7ff6dc6144b3-7ff6dc6144c9 call 7ff6dc614f48 734->740 735->720 736->737 737->666 742 7ff6dc614959-7ff6dc614968 737->742 739->743 740->743 754 7ff6dc6144cf-7ff6dc6144d2 740->754 742->680 748 7ff6dc61496e 742->748 743->666 744->743 749 7ff6dc614533-7ff6dc614562 WriteFile 744->749 745->687 746->724 751 7ff6dc614625-7ff6dc61463b call 7ff6dc61546c 746->751 748->666 749->659 752 7ff6dc614568-7ff6dc614576 749->752 751->659 758 7ff6dc614641-7ff6dc614643 751->758 752->743 755 7ff6dc61457c-7ff6dc614586 752->755 754->744 755->733 757 7ff6dc61458c-7ff6dc6145be WriteFile 755->757 757->659 759 7ff6dc6145c4-7ff6dc6145c9 757->759 758->724 759->743 760 7ff6dc6145cf-7ff6dc6145d5 759->760 760->733
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: __doserrno_errno_invalid_parameter_noinfo
                                                                          • String ID: U
                                                                          • API String ID: 3902385426-4171548499
                                                                          • Opcode ID: e19bac97072c5f6b12ccb88eb5d8fb4586a146a09138471d8271d9c422358717
                                                                          • Instruction ID: ba1d1e639a49ae7b1137c5ae71e315d6d3827dc85aef2225acc4fff412303042
                                                                          • Opcode Fuzzy Hash: e19bac97072c5f6b12ccb88eb5d8fb4586a146a09138471d8271d9c422358717
                                                                          • Instruction Fuzzy Hash: 1A12E832A186CA86EB228F29D44437E67A0FB85796F140537DA4DC369CDF3DE456DB00

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$HandleModule
                                                                          • String ID: AllocateAndInitializeSid$ConvertStringSidToSidW$CopySid$CreateWellKnownSid$FreeSid$GetNamedSecurityInfoW$IsValidSid$LookupAccountNameW$SetEntriesInAclW$SetNamedSecurityInfoW$advapi32.dll
                                                                          • API String ID: 667068680-2029814571
                                                                          • Opcode ID: 84e6760860ef51e4eb883a3ce056c1ce833777c9e96e671d10c9c34f4a73f4c6
                                                                          • Instruction ID: 2d749d001d239c06dd1644d068c3d4095ec4ac863470d5f6aac96b5bc1adc05e
                                                                          • Opcode Fuzzy Hash: 84e6760860ef51e4eb883a3ce056c1ce833777c9e96e671d10c9c34f4a73f4c6
                                                                          • Instruction Fuzzy Hash: 8421F974A09B8B96DE26CB15F86416C7360FB18786B445032C90D83B20EF3CE1BADB00
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: DecodePointerwrite_multi_char$_errnowrite_charwrite_string$__updatetlocinfo__updatetmbcinfo_getptd_getptd_noexit_invalid_parameter_noinfo_isleadbyte_l_malloc_crtfree
                                                                          • String ID:
                                                                          • API String ID: 448788376-0
                                                                          • Opcode ID: ee41d45d44193d7c82293bbaa842fa1f3ef303905dce10a7c63fdf5fc9b97dc5
                                                                          • Instruction ID: a7bda459c672bc17444b31dd4c5b89169c80e9fcaebdc53670f0f118889834f4
                                                                          • Opcode Fuzzy Hash: ee41d45d44193d7c82293bbaa842fa1f3ef303905dce10a7c63fdf5fc9b97dc5
                                                                          • Instruction Fuzzy Hash: D852D762A0C6CA86FB668B76941027D67A0FF44754F140037FE4DE7694DE3CE862BB42
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: CharNext$lstrcmpi
                                                                          • String ID:
                                                                          • API String ID: 3586774192-0
                                                                          • Opcode ID: 2140f4e05494fa98469b3810e3718b52fdc8c398a8337b0d38eb12e157c72e0d
                                                                          • Instruction ID: 66b95b56f057fceb8161c00547336d6656c5980daeea7415121a3c8555fb6ad2
                                                                          • Opcode Fuzzy Hash: 2140f4e05494fa98469b3810e3718b52fdc8c398a8337b0d38eb12e157c72e0d
                                                                          • Instruction Fuzzy Hash: 2AC19122A1C6C981EB728B16E4503BEA2A0FB84790F544136DB9DD3AD5EF3CD466B700
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: LibraryLoad$Resource$ErrorFindFreeLast
                                                                          • String ID:
                                                                          • API String ID: 328770362-0
                                                                          • Opcode ID: 83fff9b73e1520b67942c86f64d3f9012a5179035259967cec8d8829c2d5b1f2
                                                                          • Instruction ID: 36af477dbdf56fb36f7c1b38a0ff1b4718ced4f8be95520d68a96a7970bdaef5
                                                                          • Opcode Fuzzy Hash: 83fff9b73e1520b67942c86f64d3f9012a5179035259967cec8d8829c2d5b1f2
                                                                          • Instruction Fuzzy Hash: 0051AC21A1DBCA46EA119B1AA44037D63D1FF847A1F105136DA5D93794FF3CD417BB04
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: Library$AddressFreeLoadProc
                                                                          • String ID: DriverPackageInstallW
                                                                          • API String ID: 145871493-1557024896
                                                                          • Opcode ID: 46a9f5c091c78e9100da48e87d155cb43ed0e1788d4e547d9361f219d0cc8f2a
                                                                          • Instruction ID: e2156430616a8ef28499b22d31fda372dc4dd9c96a9a86fcfa81624ec25bafc2
                                                                          • Opcode Fuzzy Hash: 46a9f5c091c78e9100da48e87d155cb43ed0e1788d4e547d9361f219d0cc8f2a
                                                                          • Instruction Fuzzy Hash: 19218E71608B8A86DB51CF6AB45026E73E0FB48B94F544136EF8D87B28EF3CD4659B40
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterUnhandled
                                                                          • String ID: csm
                                                                          • API String ID: 3192549508-1018135373
                                                                          • Opcode ID: 26733181b269a767bcfd194c7aacfe61cba8f0c3e816cf136ba88d9c33d7f14f
                                                                          • Instruction ID: 0cd291b08cfbe26b9a840e1e160fef235b92af76a08f952764c648306d4a5b7d
                                                                          • Opcode Fuzzy Hash: 26733181b269a767bcfd194c7aacfe61cba8f0c3e816cf136ba88d9c33d7f14f
                                                                          • Instruction Fuzzy Hash: ACE06525F0D18AC5DF9A6A2A848507D26A4EB54705FD00433C20DC2290DE6CA9A3EB41
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: CreateInstance
                                                                          • String ID:
                                                                          • API String ID: 542301482-0
                                                                          • Opcode ID: 641e390d5549719adb4bf73536154c03a74954d90ac29266caf1bde7b342c0c8
                                                                          • Instruction ID: 6da94b4887bebff4f00d39a17e8ce2225174dbf7ff947ae6334d5afa6a56a63d
                                                                          • Opcode Fuzzy Hash: 641e390d5549719adb4bf73536154c03a74954d90ac29266caf1bde7b342c0c8
                                                                          • Instruction Fuzzy Hash: E1014476604E56C2E7128F1AF450169B3A1FB98B85B548032DB8C87724DF39D4A79700

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 951 7ff6dc608250-7ff6dc608307 call 7ff6dc608680 GetLastError SetLastError 954 7ff6dc608309-7ff6dc60830c 951->954 955 7ff6dc60830e 951->955 956 7ff6dc608311-7ff6dc60835d call 7ff6dc608650 call 7ff6dc6085f0 call 7ff6dc608a70 954->956 955->956 964 7ff6dc60838e 956->964 965 7ff6dc60835f-7ff6dc60838c 956->965 966 7ff6dc608391-7ff6dc60839d call 7ff6dc608910 964->966 965->966 970 7ff6dc60839f-7ff6dc6083bf call 7ff6dc608650 966->970 971 7ff6dc6083c4-7ff6dc6083cb 966->971 984 7ff6dc608501-7ff6dc608530 GetLastError call 7ff6dc60b254 SysFreeString 970->984 973 7ff6dc6084bd 971->973 974 7ff6dc6083d1-7ff6dc6083e9 971->974 976 7ff6dc6084c0-7ff6dc6084e8 call 7ff6dc608650 973->976 974->976 981 7ff6dc6083ef-7ff6dc6083f4 974->981 990 7ff6dc6084ea LocalFree 976->990 991 7ff6dc6084f0-7ff6dc6084f8 976->991 982 7ff6dc6083f6 981->982 983 7ff6dc6083f9-7ff6dc608442 call 7ff6dc608650 call 7ff6dc6085f0 call 7ff6dc608a70 981->983 982->983 1006 7ff6dc608469-7ff6dc608476 call 7ff6dc608910 983->1006 1007 7ff6dc608444-7ff6dc608466 983->1007 993 7ff6dc60853c-7ff6dc60858f SetLastError GetLastError call 7ff6dc60b254 SysFreeString 984->993 994 7ff6dc608532-7ff6dc608536 SysFreeString 984->994 990->991 991->984 992 7ff6dc6084fa-7ff6dc608500 LocalFree 991->992 992->984 1000 7ff6dc60859b-7ff6dc6085e6 SetLastError call 7ff6dc60a330 993->1000 1001 7ff6dc608591-7ff6dc608595 SysFreeString 993->1001 994->993 1001->1000 1011 7ff6dc608498-7ff6dc6084a0 1006->1011 1012 7ff6dc608478-7ff6dc608492 call 7ff6dc608650 1006->1012 1007->1006 1014 7ff6dc6084a8-7ff6dc6084b0 1011->1014 1015 7ff6dc6084a2 LocalFree 1011->1015 1012->1011 1017 7ff6dc6084b8-7ff6dc6084bb 1014->1017 1018 7ff6dc6084b2 LocalFree 1014->1018 1015->1014 1017->984 1018->1017
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorFreeLast$LocalString
                                                                          • String ID: Failed to obtain existing security descriptor, last error: 0x%08x$Failed to set explicit access for new ACL, last error: 0x%08x$Failed to set new security descriptor, last error: 0x%08x$Getting existing security descriptor for '%s'$Setting new security descriptor for '%s'
                                                                          • API String ID: 2531705008-1991965274
                                                                          • Opcode ID: bcdc3f80537c52efd8b1e5005f2f0d1ed8b14b7b2810b649c61ca880fb6e1029
                                                                          • Instruction ID: 2f2825032b0732be7a0013b1a08dc39044ff53ccec09dd1947c891e690cd9da3
                                                                          • Opcode Fuzzy Hash: bcdc3f80537c52efd8b1e5005f2f0d1ed8b14b7b2810b649c61ca880fb6e1029
                                                                          • Instruction Fuzzy Hash: 8EB16232B04B8685EB11DF65E8802AD7770FB88B98F054136DE4DA3B69DF38D556E700
                                                                          APIs
                                                                          Strings
                                                                          • Failed to lookup account name, SID is invalid, last error: 0x%08x, xrefs: 00007FF6DC60744E
                                                                          • ResolveSidForAccountName: looking up account name '%s', xrefs: 00007FF6DC607371
                                                                          • Failed to lookup account name, last error: 0x%08x, xrefs: 00007FF6DC60745D
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$Free$String$Local$Alloc
                                                                          • String ID: Failed to lookup account name, SID is invalid, last error: 0x%08x$Failed to lookup account name, last error: 0x%08x$ResolveSidForAccountName: looking up account name '%s'
                                                                          • API String ID: 1840678336-906081134
                                                                          • Opcode ID: 1be10ffe9af31c367430b31e67318ac0cae0955967b81c4d1fbb6dbcfb8e04ff
                                                                          • Instruction ID: 1bb11f4888c833ae876e3be4a28c784a7863684cc41648917b6fbef9054753ee
                                                                          • Opcode Fuzzy Hash: 1be10ffe9af31c367430b31e67318ac0cae0955967b81c4d1fbb6dbcfb8e04ff
                                                                          • Instruction Fuzzy Hash: 0C916F32A08B8586EB11CF65E8842AD77B0FB84B59F144136DE4D97B68CF3CD566EB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: CharNext$wcsstr
                                                                          • String ID: }}$HKCR$HKCU{Software{Classes$REGISTRY
                                                                          • API String ID: 1366738116-2791478717
                                                                          • Opcode ID: 074a6748b16ed0bfb4cf8bd51e8a3b64cad7256ce1b8570ead8c36fc8906cce4
                                                                          • Instruction ID: 84d68a6e9c02d70a25849d253381e9565a86507fca67b4c2e557acbab758bcbf
                                                                          • Opcode Fuzzy Hash: 074a6748b16ed0bfb4cf8bd51e8a3b64cad7256ce1b8570ead8c36fc8906cce4
                                                                          • Instruction Fuzzy Hash: 7BA19026A096CA81EA729B16E55027D23A0AF54F52F444233DE4ED63D1EF3CE873B700
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$FreeString$AllocLocal
                                                                          • String ID:
                                                                          • API String ID: 3608337604-0
                                                                          • Opcode ID: 60857f4634bed0177deaa94ad0c8b48c4106235a83ad3e29d2830e47be4e17e8
                                                                          • Instruction ID: eb89c6e658c21f830b32ffe9e30270603890b891ce048c94c9f241022093297b
                                                                          • Opcode Fuzzy Hash: 60857f4634bed0177deaa94ad0c8b48c4106235a83ad3e29d2830e47be4e17e8
                                                                          • Instruction Fuzzy Hash: A3A15F32B08B8589EB11CF65E8502AD73B1FB48759F444236DE5DA3BA4DF38D46AE700
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: free$Module_recalloc$FileHandleName__report_securityfailurememcpy_s
                                                                          • String ID: Module$Module_Raw$REGISTRY
                                                                          • API String ID: 4185311596-549000027
                                                                          • Opcode ID: fc6a002382f73909d30991a361c5752ec3cbe02e5570742768dd36661009f56e
                                                                          • Instruction ID: 2c0a4dbb8df006903f68a386f7c0bcd2808fa6568c3996f268c4bca4b137657f
                                                                          • Opcode Fuzzy Hash: fc6a002382f73909d30991a361c5752ec3cbe02e5570742768dd36661009f56e
                                                                          • Instruction Fuzzy Hash: 22A1C822A197CA81EB629B12D4902BD63A0FF44780F541537EA4EE7695EF3CE462F704
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: free$Module$FileHandleNamememcpy_s
                                                                          • String ID: Module$Module_Raw$REGISTRY
                                                                          • API String ID: 407555004-549000027
                                                                          • Opcode ID: ba9889bf9decb8d578d97dd4d759e3e39ad60c85b520a686f8b4db03afad92e4
                                                                          • Instruction ID: 289684489e51b96a71d9b194e973bf7a1a2568bde897b261288d54c0bacfc7eb
                                                                          • Opcode Fuzzy Hash: ba9889bf9decb8d578d97dd4d759e3e39ad60c85b520a686f8b4db03afad92e4
                                                                          • Instruction Fuzzy Hash: B8A1D822A1D6CA85EA629F12D4902BD63A0FF84B81F441537EA4ED7696DF3CD462F700
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: String$Free$Alloc$Library$AddressExceptionLoadProcThrow
                                                                          • String ID: DriverPackagePreinstallW
                                                                          • API String ID: 3942836785-4107050277
                                                                          • Opcode ID: b5f73ccbdd6ec436d716cc2720aee4fe7c3d36d0d683c2ee5eaff0d6718158f5
                                                                          • Instruction ID: f3ef913bd5f02282b30197f6a6b3631c3dd7e56f563735f69f3174e48a72f303
                                                                          • Opcode Fuzzy Hash: b5f73ccbdd6ec436d716cc2720aee4fe7c3d36d0d683c2ee5eaff0d6718158f5
                                                                          • Instruction Fuzzy Hash: BE51E825B0DBCA81EB169B56A14113C63A0EF58B80F144136EE4EA7B58DF7CD4A3B704
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: free$_lock$ErrorFreeHeapLast__freetlocinfo_errno
                                                                          • String ID:
                                                                          • API String ID: 439417960-0
                                                                          • Opcode ID: fa421d6db3a778660406ec41066898428794a47d2a567865574af7303690ffb6
                                                                          • Instruction ID: 80550bb3e3f0fa10e7178469f6066c50305617e170cd8c410cc4ac15964ef90d
                                                                          • Opcode Fuzzy Hash: fa421d6db3a778660406ec41066898428794a47d2a567865574af7303690ffb6
                                                                          • Instruction Fuzzy Hash: D2314B15B0E5CA44FE5BAA6681A127C2351AF84BC0F080637E94FA76D7CF1CE863B351
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$Free$String$Local
                                                                          • String ID: Failed to lookup wellknown account, last error: 0x%x
                                                                          • API String ID: 276242039-1017437273
                                                                          • Opcode ID: fd805d4eeaea8dd29ef65f8dacde4d9d53d41a7380c549beb590abe03af0f113
                                                                          • Instruction ID: ab25ac6c41bca75cdd99324df8d3a59e5cf05779d3e9da8c7cca37394004f506
                                                                          • Opcode Fuzzy Hash: fd805d4eeaea8dd29ef65f8dacde4d9d53d41a7380c549beb590abe03af0f113
                                                                          • Instruction Fuzzy Hash: D5416E32B08B858AEB11CF65E4846AC33B4FB44B49F044036DE4D97B98DF38D566E740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$Free$String$Local
                                                                          • String ID: Failed to lookup wellknown account, last error: 0x%x
                                                                          • API String ID: 276242039-1017437273
                                                                          • Opcode ID: cf3f2168058aecf24eb9c7b669e96b24dad73daa5592df62ebd42dacd0ce913c
                                                                          • Instruction ID: d0739554aeef83f6fd13d6459c06c41775cd4812cf19c7255cfce1f7693105db
                                                                          • Opcode Fuzzy Hash: cf3f2168058aecf24eb9c7b669e96b24dad73daa5592df62ebd42dacd0ce913c
                                                                          • Instruction Fuzzy Hash: CB415D32B08B858AEB11CF65E4946AC33B5FB44B89F044036DE4D97B98DF38D566E704
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$Free$String$Local
                                                                          • String ID: Failed to lookup wellknown account, last error: 0x%x
                                                                          • API String ID: 276242039-1017437273
                                                                          • Opcode ID: fd812567e9577e01c1738429a0f033160fb4034ebf0d87c8d086c1776cf8d419
                                                                          • Instruction ID: e5a8f0057fb2d781f4d6850ae0cb37a567f4dac2d583a61f4cb372dae79b7dbf
                                                                          • Opcode Fuzzy Hash: fd812567e9577e01c1738429a0f033160fb4034ebf0d87c8d086c1776cf8d419
                                                                          • Instruction Fuzzy Hash: 1A416C32B08B858AEB11CF65E4946AC33B5FB44B49F044036DE4D97B98DF38D566EB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$Free$String$Local
                                                                          • String ID: Failed to lookup wellknown account, last error: 0x%x
                                                                          • API String ID: 276242039-1017437273
                                                                          • Opcode ID: fed08b9580209316d893bee39cdd5bb29f8a1855689360e9f329db51b5da4fd4
                                                                          • Instruction ID: bd41c0a5188e8edc6444ea2f19fccecc29dc75ea55059b0b1b396a1f087b5a22
                                                                          • Opcode Fuzzy Hash: fed08b9580209316d893bee39cdd5bb29f8a1855689360e9f329db51b5da4fd4
                                                                          • Instruction Fuzzy Hash: 67415D32B08B858AEB11CF65E4946AC33B5FB44B89F044036DE4D97B98DF38D566E704
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$Free$String$Local
                                                                          • String ID: Failed to lookup wellknown account, last error: 0x%x
                                                                          • API String ID: 276242039-1017437273
                                                                          • Opcode ID: 246332e3d8c9c1a2cb36936495cf072ca57cc48215e311b5286cec6add37176a
                                                                          • Instruction ID: ae65cbffc218d6639559d9ecac570127de08a4d184370607174f7703f4dcd330
                                                                          • Opcode Fuzzy Hash: 246332e3d8c9c1a2cb36936495cf072ca57cc48215e311b5286cec6add37176a
                                                                          • Instruction Fuzzy Hash: 5E416D32B08B858AEB11CF65E4846AC33B4FB44B49F044036DE4D97B98DF38D566E740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$Free$String$Local
                                                                          • String ID: Failed to lookup wellknown account, last error: 0x%x
                                                                          • API String ID: 276242039-1017437273
                                                                          • Opcode ID: dcb6e8490fac3f7b4910042abcf1eeafe2ef40816db996d6deee2435cbfb7e2a
                                                                          • Instruction ID: fba84739f1569c2a3596646d95cf3e5f69f8e64cd7b3863ac9ce50ade881d787
                                                                          • Opcode Fuzzy Hash: dcb6e8490fac3f7b4910042abcf1eeafe2ef40816db996d6deee2435cbfb7e2a
                                                                          • Instruction Fuzzy Hash: A2415D32B08B858AEB11CF65E4946AC33B5FB44B89F044036DE4D97B98DF38D566E704
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$Free$String$Local
                                                                          • String ID: Failed to lookup wellknown account, last error: 0x%x
                                                                          • API String ID: 276242039-1017437273
                                                                          • Opcode ID: 30dc27eae12e39a0f4ea31bdaa6e3fe23c65545e337024bd26e94c460bc763d8
                                                                          • Instruction ID: 69eef704629648cd362c1d929be5184907f2c6cff280ea5b9e4a7e88743b9cca
                                                                          • Opcode Fuzzy Hash: 30dc27eae12e39a0f4ea31bdaa6e3fe23c65545e337024bd26e94c460bc763d8
                                                                          • Instruction Fuzzy Hash: 02415D32B08B858AEB11CF65E4946AC33B5FB44B89F044036DE4D97B98DF38D566E704
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$Free$String$Local
                                                                          • String ID: Failed to lookup wellknown account, last error: 0x%x
                                                                          • API String ID: 276242039-1017437273
                                                                          • Opcode ID: 693c4bd5f7b33fc096f213316133fba76ba750c722dbcfb29a60170a2f216654
                                                                          • Instruction ID: 0d2e7b8cd45f72671cea28e6c9071cc952b9f8a74e82c26b9af6c924f5d9c3a3
                                                                          • Opcode Fuzzy Hash: 693c4bd5f7b33fc096f213316133fba76ba750c722dbcfb29a60170a2f216654
                                                                          • Instruction Fuzzy Hash: 8C416E32B08B858AEB11CF65E4846AC33B4FB44B49F044036DE4D97B98DF38D566E740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$Free$String$Local
                                                                          • String ID: Failed to lookup wellknown account, last error: 0x%x
                                                                          • API String ID: 276242039-1017437273
                                                                          • Opcode ID: b9990e2c3c67bce92867840fd1c2f645be77ace9138a1ce10f8e994c3d004d8e
                                                                          • Instruction ID: 737afba95a9f3c00ac77d3d19d9605847139ff1e5681cfb9d738a5ea7a0e3dfe
                                                                          • Opcode Fuzzy Hash: b9990e2c3c67bce92867840fd1c2f645be77ace9138a1ce10f8e994c3d004d8e
                                                                          • Instruction Fuzzy Hash: 8F415D32B08B858AEB11CF65E4946AC33B5FB44B89F044036DE4D97B98DF38D566E704
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$Free$String$Local
                                                                          • String ID: Failed to lookup wellknown account, last error: 0x%x
                                                                          • API String ID: 276242039-1017437273
                                                                          • Opcode ID: 05bdd9d4dfa683bc198153fbb89f0b5f81791e1a92e0d1ca645bfbe30e7aff55
                                                                          • Instruction ID: 4844ce26589f1c3066e96db35125f07b934a2fa1461f0fa6e60121ed226349d5
                                                                          • Opcode Fuzzy Hash: 05bdd9d4dfa683bc198153fbb89f0b5f81791e1a92e0d1ca645bfbe30e7aff55
                                                                          • Instruction Fuzzy Hash: F9416D32B08B858AEB11CF65E4946AC33B4FB44B49F044036DE4D97B98DF38D566E740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$Free$String$Local
                                                                          • String ID: Failed to lookup wellknown account, last error: 0x%x
                                                                          • API String ID: 276242039-1017437273
                                                                          • Opcode ID: 1f0040e6e1357d21d9cdba0731e024847ab69b30e52a439d9e5b53f575b1197e
                                                                          • Instruction ID: 0bf350a3c36c0d998b6703608030d02d5987d852e6e576f0b33db921d84c9a80
                                                                          • Opcode Fuzzy Hash: 1f0040e6e1357d21d9cdba0731e024847ab69b30e52a439d9e5b53f575b1197e
                                                                          • Instruction Fuzzy Hash: 82416C32B08B858AEB11CF65E4946AC33B5FB44B49F044036DE4D97B98DF38D566EB40
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$Free$String$Local
                                                                          • String ID: Failed to lookup wellknown account, last error: 0x%x
                                                                          • API String ID: 276242039-1017437273
                                                                          • Opcode ID: 693b532586f308176d3bf9504c91d1c2ec513457d2841a69b1d8d377a0888b53
                                                                          • Instruction ID: 8ea8db6099d65a23a15d519793f7a05ae7f2d1b7c8a80a0c68619c16f7856421
                                                                          • Opcode Fuzzy Hash: 693b532586f308176d3bf9504c91d1c2ec513457d2841a69b1d8d377a0888b53
                                                                          • Instruction Fuzzy Hash: 1D416D32B08B858AEB11CF65E4846AC33B4FB44B49F044036DE4E97B98DF38D566E740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$Free$String$Local
                                                                          • String ID: Failed to lookup wellknown account, last error: 0x%x
                                                                          • API String ID: 276242039-1017437273
                                                                          • Opcode ID: ca456e6154c185883a7ab7d204b9b5dee28072816d1342879dafb4ca575ff487
                                                                          • Instruction ID: 22b6de8433753b5e1e225a12362ea91566d943d01ced608c96bc4e26e96dc24f
                                                                          • Opcode Fuzzy Hash: ca456e6154c185883a7ab7d204b9b5dee28072816d1342879dafb4ca575ff487
                                                                          • Instruction Fuzzy Hash: D2414C32B08B858AEB11CF65E4946AC33B5FB44B89F044036DE4D97B98DF38D56AE704
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                                                          • String ID:
                                                                          • API String ID: 2644381645-0
                                                                          • Opcode ID: 5643f2ad640c8eb69d91a1124a95a6ce3e52d5571ae8de93a49c8d10b53f987b
                                                                          • Instruction ID: 3a8356c29b5c06862e2c9a25e29fb482de2dbe3a7e756d42f4707a08961358be
                                                                          • Opcode Fuzzy Hash: 5643f2ad640c8eb69d91a1124a95a6ce3e52d5571ae8de93a49c8d10b53f987b
                                                                          • Instruction Fuzzy Hash: 3421F822A081CA55EA136F1A984137D6550AF40BF2F1A4336EA3D973DACE3CA463F715
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                                                          • String ID:
                                                                          • API String ID: 2464146582-0
                                                                          • Opcode ID: 7ddf8111dec1d2acb419462a403fd4b886fa9ef18d24a6e5ae1a262345caade3
                                                                          • Instruction ID: 350e6ff8e25f38538edfb971c7cc8a950e90bcec75d2093c32320a57c2b061ec
                                                                          • Opcode Fuzzy Hash: 7ddf8111dec1d2acb419462a403fd4b886fa9ef18d24a6e5ae1a262345caade3
                                                                          • Instruction Fuzzy Hash: 65213732E0C1CA55FA136F5A984137C6550AF817E2F150236EA1C873DACE7CE4A3B711
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: _errno$BuffersErrorFileFlushLast__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
                                                                          • String ID:
                                                                          • API String ID: 2927645455-0
                                                                          • Opcode ID: 5a95f67ae4511fd2b7f7b0cdcb097bcc4a2120927f3b95a3fec189a784014385
                                                                          • Instruction ID: 3f19d9739074720863c6e6f9fe935b8987ff063afa636ef6d13f4aa1181e7302
                                                                          • Opcode Fuzzy Hash: 5a95f67ae4511fd2b7f7b0cdcb097bcc4a2120927f3b95a3fec189a784014385
                                                                          • Instruction Fuzzy Hash: 51212C21E086DE49F6576F6D988127CA650AF80791F080236D50DC73D2EE7CA463B701
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                                                          • String ID:
                                                                          • API String ID: 2140805544-0
                                                                          • Opcode ID: e185883d29ff37fee1d728bcfbeb3caf632dd640ad265a1f8cd7f0636dbe035f
                                                                          • Instruction ID: 133b81f6ef04b3873c25eefbb25e0a983f9a05f629f840aba4ae9e92d8c91592
                                                                          • Opcode Fuzzy Hash: e185883d29ff37fee1d728bcfbeb3caf632dd640ad265a1f8cd7f0636dbe035f
                                                                          • Instruction Fuzzy Hash: 0B113A22E4C2CE45F617AF29989137CA690AF803A2F150236DA1D872D7DE7CA463B300
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: AddressHandleModuleProc
                                                                          • String ID: Advapi32.dll$RegDeleteKeyExW$RegDeleteKeyTransactedW
                                                                          • API String ID: 1646373207-1053001802
                                                                          • Opcode ID: eea277f1f71c6c2489efe69601a21584980abdb915dae3f5316235e355755337
                                                                          • Instruction ID: 325bf4cf2210e2904fc3e12fafb551c3e769ca23d11db9baed2c7d781c4b65c8
                                                                          • Opcode Fuzzy Hash: eea277f1f71c6c2489efe69601a21584980abdb915dae3f5316235e355755337
                                                                          • Instruction Fuzzy Hash: 32313075A0DAC981EB268B16F45077DA360EB88BC4F184036DE4D87768DF2DD5A6E700
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: Exception_getptd$DestructObject$Raise_getptd_noexit
                                                                          • String ID: csm
                                                                          • API String ID: 2851507484-1018135373
                                                                          • Opcode ID: b5695b636a9301137933f94334d950e4a84ce6f1cca4a2e6f0b5ad8dad319add
                                                                          • Instruction ID: 8086bff15f13800094b847b171372487d7d2796d45de2f3841818daea7b6eda2
                                                                          • Opcode Fuzzy Hash: b5695b636a9301137933f94334d950e4a84ce6f1cca4a2e6f0b5ad8dad319add
                                                                          • Instruction Fuzzy Hash: B421293660868A86D622DF16E04036E73A1FB84BA5F004236DF9D83B95DF3CE456EB40
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: Pointer$AddressCountCriticalDecodeEncodeHandleInitializeModuleProcSectionSpin
                                                                          • String ID: InitializeCriticalSectionEx$kernel32.dll
                                                                          • API String ID: 131412094-2762503851
                                                                          • Opcode ID: f228baa645d9034c08075660ba394ddcedfefc4a093bf15476359028fb448dad
                                                                          • Instruction ID: cfed2ce9c21e1e9fee733a5fd616da5534c3156425946e38e9d51e210eae5e95
                                                                          • Opcode Fuzzy Hash: f228baa645d9034c08075660ba394ddcedfefc4a093bf15476359028fb448dad
                                                                          • Instruction Fuzzy Hash: 8F016924B0D7CE85EA569B06B81013D63A0AF98FD1F584436ED4E83755DE3CE563A700
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$FreeString
                                                                          • String ID:
                                                                          • API String ID: 2425351278-0
                                                                          • Opcode ID: 4125032da62b5756a030140f559538396ea528ba8c92d6de4d55c944487ee5c0
                                                                          • Instruction ID: d76cda09b461e2f2e468c2de95fb5672dcb99ab93b3e935a0fc08dcf45a58b4e
                                                                          • Opcode Fuzzy Hash: 4125032da62b5756a030140f559538396ea528ba8c92d6de4d55c944487ee5c0
                                                                          • Instruction Fuzzy Hash: D2516C32B18B819AE711DF65E8906AC7370FB44769F004226DE5D67AA8CF38D52AE304
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$ByteCharFreeMultiStringWide
                                                                          • String ID:
                                                                          • API String ID: 2284902721-0
                                                                          • Opcode ID: 71c7a5411cd3f7243ce6a693d568e214949771d1b599ac70f8f2d65f723928cd
                                                                          • Instruction ID: 90763bbbe92b7e669c99313b9efcdb83973c81df76855bdfbd81752e42396995
                                                                          • Opcode Fuzzy Hash: 71c7a5411cd3f7243ce6a693d568e214949771d1b599ac70f8f2d65f723928cd
                                                                          • Instruction Fuzzy Hash: FE416A32B14B85CAE721CF65E850BAC7375FB44769F404126DEAE93AA4CF38E526D304
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: CharNext
                                                                          • String ID:
                                                                          • API String ID: 3213498283-0
                                                                          • Opcode ID: ef4bb7b09230f5b24fc89cf32076482d06b0a936b85f5278b4b737d4ff19c5ca
                                                                          • Instruction ID: 0c68254eb1dcdfcb8bd79ef6c6cda3979059de0fc2e1828515e3ae97d710695d
                                                                          • Opcode Fuzzy Hash: ef4bb7b09230f5b24fc89cf32076482d06b0a936b85f5278b4b737d4ff19c5ca
                                                                          • Instruction Fuzzy Hash: 52515222709A9681EB229F66E54013D73E1EB58F95B448432DB4D97794EF3CD8B2E700
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$FreeString
                                                                          • String ID:
                                                                          • API String ID: 2425351278-0
                                                                          • Opcode ID: 5b1844774a3730a4c401fcdd7eb98e2674964bcd42cd8f461641e1d433cd3978
                                                                          • Instruction ID: 73df3ba55b051944cbd99f241ecd6df3fc83f72dee52884719cabe9ba62d0975
                                                                          • Opcode Fuzzy Hash: 5b1844774a3730a4c401fcdd7eb98e2674964bcd42cd8f461641e1d433cd3978
                                                                          • Instruction Fuzzy Hash: FE419B32608B85C2DB11CF15E88472DB3A4FB84B95F464136DE9E83BA8CF38D466D740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: _getptd
                                                                          • String ID: MOC$RCC$csm
                                                                          • API String ID: 3186804695-2671469338
                                                                          • Opcode ID: 52a676c318d9f561739adc68f3d1ab0a26b7cd326f18b110937b7493f301e68e
                                                                          • Instruction ID: 72f4957f481810b2ee7936ffa0750b31a8ea47ce14007f3d4938d33be9cb3285
                                                                          • Opcode Fuzzy Hash: 52a676c318d9f561739adc68f3d1ab0a26b7cd326f18b110937b7493f301e68e
                                                                          • Instruction Fuzzy Hash: 7BF03735D0C18ECAE6277F5581053BC27A0FF58746F858573D248823C2DFBC64A2BA12
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$FreeString
                                                                          • String ID:
                                                                          • API String ID: 2425351278-0
                                                                          • Opcode ID: 4169383aa1a8b917174be489ab6bb9fdcfaa1ed987afccb29234c8c0d2333da4
                                                                          • Instruction ID: d4b5f7b26a07e1c8857eb9b80d37cff5c1bd89c3ef7a96d4d7c7554e1f9bc261
                                                                          • Opcode Fuzzy Hash: 4169383aa1a8b917174be489ab6bb9fdcfaa1ed987afccb29234c8c0d2333da4
                                                                          • Instruction Fuzzy Hash: 0F412C32608B8586DB25CF26E49026D7370FB88B91F144236DF9D93B65DF38E466E740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: Close$Enum$Open
                                                                          • String ID:
                                                                          • API String ID: 4245071059-0
                                                                          • Opcode ID: 1f91b833b11f9de3fa471eaad69c4379b7c5c87b41c04ef34b25923a1bd4efb5
                                                                          • Instruction ID: 5d61ec23a08445e1bc4c891d3864a8c80170c76e2d5fb59aa89e7e254924d82b
                                                                          • Opcode Fuzzy Hash: 1f91b833b11f9de3fa471eaad69c4379b7c5c87b41c04ef34b25923a1bd4efb5
                                                                          • Instruction Fuzzy Hash: 36411B72608B868AE721CB55F4906AEB7A4FB88784F100136EB8D93A58DF3CD5569B00
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: Library$Free$AddressByteCharErrorLastLoadMultiProcWide
                                                                          • String ID:
                                                                          • API String ID: 835772407-0
                                                                          • Opcode ID: 4ab0e06239e2a50f8aaadb0ff52f6e927b76035c8d3fb4fcef584dd5444a6b9a
                                                                          • Instruction ID: d36423a8c47798ff8152a15d68269d13bfa244c089832176eac5b6efc3e97306
                                                                          • Opcode Fuzzy Hash: 4ab0e06239e2a50f8aaadb0ff52f6e927b76035c8d3fb4fcef584dd5444a6b9a
                                                                          • Instruction Fuzzy Hash: 6D31A761A04BDA89E7518F66985116D63A0FF04BB4B584336EF6D87BD4DF3CD066E300
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$FreeString
                                                                          • String ID:
                                                                          • API String ID: 2425351278-0
                                                                          • Opcode ID: 9213b2f951795fd8961727634d81daab6bb791b9985ae766bdb774ed669523d7
                                                                          • Instruction ID: 4f8d77988688605e82d4d4ae7a90066eac010a3a3f97d01873fbab864a7244a3
                                                                          • Opcode Fuzzy Hash: 9213b2f951795fd8961727634d81daab6bb791b9985ae766bdb774ed669523d7
                                                                          • Instruction Fuzzy Hash: A3317322618BC9C2EB51DB25E45026DB760FB84BA1F405332EAAD937E4CF3CD456E700
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: AddressCreateHandleModuleProc
                                                                          • String ID: Advapi32.dll$RegCreateKeyTransactedW
                                                                          • API String ID: 1964897782-2994018265
                                                                          • Opcode ID: d8f9a0690667604f5e7e6616951a74f0432b9bedd44cc4415e60f933078260b4
                                                                          • Instruction ID: 0ee3e25cfd39d2e33cf06b2fafeaf312763b726c16e92864085131334e17eab6
                                                                          • Opcode Fuzzy Hash: d8f9a0690667604f5e7e6616951a74f0432b9bedd44cc4415e60f933078260b4
                                                                          • Instruction Fuzzy Hash: 0821EB72A18B9482E761CB16F45036EB7A1FBC8BD4F544125EB8D47B68DF3CC0929B00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: Library$AddressFreeLoadProc
                                                                          • String ID: DriverPackageUninstallW
                                                                          • API String ID: 145871493-4209722632
                                                                          • Opcode ID: c35b6b632d625778d604cef2a0bfc001af9ceecfd90e17d9dd12296e960a03a8
                                                                          • Instruction ID: 15c8552210464f21aadd2b388cda69443c39c656f94de808f9de73c8193a31e9
                                                                          • Opcode Fuzzy Hash: c35b6b632d625778d604cef2a0bfc001af9ceecfd90e17d9dd12296e960a03a8
                                                                          • Instruction Fuzzy Hash: CA218E31609B8A86DB51CF6AB45026E73E0FB48B94F544136EF8E83B14EF3CD4559B40
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: Library$AddressFreeLoadProc
                                                                          • String ID: DriverPackageGetPathW
                                                                          • API String ID: 145871493-341743864
                                                                          • Opcode ID: 8c31dcc0c099f1c29c279d6c039478cd4cf80fd7e32c813887a9d067727bb84c
                                                                          • Instruction ID: b11fc52cf9c3f66abe4b7461862fc989f76eb932f3395dc12ab2b76ce3217b7a
                                                                          • Opcode Fuzzy Hash: 8c31dcc0c099f1c29c279d6c039478cd4cf80fd7e32c813887a9d067727bb84c
                                                                          • Instruction Fuzzy Hash: 5A01C851B08BC582DB45C75BB05023D6390FB88FC1F485036EE4E87758DE2CD4A79700
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast
                                                                          • String ID:
                                                                          • API String ID: 1452528299-0
                                                                          • Opcode ID: d3c9cf2c124d86abc4f4bf1603bc844c388b4e375f4936e04eb0160b51d84189
                                                                          • Instruction ID: a7c372411cfba0b5b8d3d224f9970006c10cbb1ec023062983ef37bfda1a8d91
                                                                          • Opcode Fuzzy Hash: d3c9cf2c124d86abc4f4bf1603bc844c388b4e375f4936e04eb0160b51d84189
                                                                          • Instruction Fuzzy Hash: A2317072504B84CAD350CF24E88035C77A4F744F59F98813ADA8D57758CF39E4AAC758
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: _getptd_noexit$__doserrno_errno
                                                                          • String ID:
                                                                          • API String ID: 2964073243-0
                                                                          • Opcode ID: 4d4a87c527eaa8e6bcec8b312dd761cc2aa443e3d2d32b2ae408f33aa7fcd5b4
                                                                          • Instruction ID: 88473b212aee1d624ca15a8734308c5ac06754e8ab14a34a84de748cd14bffb1
                                                                          • Opcode Fuzzy Hash: 4d4a87c527eaa8e6bcec8b312dd761cc2aa443e3d2d32b2ae408f33aa7fcd5b4
                                                                          • Instruction Fuzzy Hash: AF01A261A186CE50EE07AB1A889137CA161AF517A3F514337D72E823E2DE7C7433B611
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: _getptd$_inconsistency$DecodePointer_getptd_noexit
                                                                          • String ID:
                                                                          • API String ID: 3566995948-0
                                                                          • Opcode ID: e34250745d6eefdc1ac350af60d0ba6f7176c573dac5c3d1f4a00cbf0f445cfc
                                                                          • Instruction ID: f5cf3d9d3c97134e5c835578faf5a23271f7460d5beb18b9a5df0646ec7cbbae
                                                                          • Opcode Fuzzy Hash: e34250745d6eefdc1ac350af60d0ba6f7176c573dac5c3d1f4a00cbf0f445cfc
                                                                          • Instruction Fuzzy Hash: C2F05422A0C5CAA0EE526B63D1411BC6250BF48BC4F1C4473E68DA73C7DE28E872B216
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: AddressHandleModuleProc
                                                                          • String ID: Advapi32.dll$RegOpenKeyTransactedW
                                                                          • API String ID: 1646373207-3913318428
                                                                          • Opcode ID: d8a62a8aef20563de6babe65901e6294006a460ff679ece6a4f445639764ce31
                                                                          • Instruction ID: 446b987b71702e4d9261fce63562b4663d2743a6f72d81f5b673ecadc9302040
                                                                          • Opcode Fuzzy Hash: d8a62a8aef20563de6babe65901e6294006a460ff679ece6a4f445639764ce31
                                                                          • Instruction Fuzzy Hash: 25114F72A18BC582EB118B16F45032EA3A0FB88BD4F484432EE4D53B68DF7CD4569B00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: _getptd$_inconsistency$DestructExceptionObject
                                                                          • String ID: csm
                                                                          • API String ID: 2821275340-1018135373
                                                                          • Opcode ID: 4ac1e4b1013697ec0e9eee3f9e9a02559197c655822a339b97b8ae9ef60c21a0
                                                                          • Instruction ID: db96d135c21d043f1b3d9cc13a5e9e8c65f2f9c767b15d01cfd2c93745a93364
                                                                          • Opcode Fuzzy Hash: 4ac1e4b1013697ec0e9eee3f9e9a02559197c655822a339b97b8ae9ef60c21a0
                                                                          • Instruction Fuzzy Hash: 3E018B329445C689DB21EF35C4453BC2354EF85799F041533EA4DCA785EF28D8A2F741
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: _errno_invalid_parameter_noinfo$_getptd_noexit
                                                                          • String ID:
                                                                          • API String ID: 1573762532-0
                                                                          • Opcode ID: 9f486efa1b8314dfa2aab75535de57ab10477b20cf78fdbde7df630c2b174037
                                                                          • Instruction ID: 2936213e56439c5f2cbd4ca55afa3f2fff737fd8cba73483e9909090259b3e4f
                                                                          • Opcode Fuzzy Hash: 9f486efa1b8314dfa2aab75535de57ab10477b20cf78fdbde7df630c2b174037
                                                                          • Instruction Fuzzy Hash: 3541C972E182DB81EF669F13954017D6290EF80795F848137DA9CB76C5DE3CE562B700
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b90ce4dfac01c2fc7f3f23f229081737ed7b3ce6534e3892517164148f36f33f
                                                                          • Instruction ID: acbfd700063d53655a7cb4989ddaf13dfbfaec8e83882610d99cb72673d91b6c
                                                                          • Opcode Fuzzy Hash: b90ce4dfac01c2fc7f3f23f229081737ed7b3ce6534e3892517164148f36f33f
                                                                          • Instruction Fuzzy Hash: 70419F22608ACA81EB12CB16D48027D63A1FB94B94F544232DA5D977E5DF3CE867F740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ByteCharMultiWide$_errno_isleadbyte_l
                                                                          • String ID:
                                                                          • API String ID: 693119720-0
                                                                          • Opcode ID: f9ef63f5f9393c33ad6ec1b55359d4d65aae5a494d22769d944872ef39a9e64e
                                                                          • Instruction ID: ace24605601bb12ad3141bd7b16e81a4b41290b517349341356d620a425c5ac8
                                                                          • Opcode Fuzzy Hash: f9ef63f5f9393c33ad6ec1b55359d4d65aae5a494d22769d944872ef39a9e64e
                                                                          • Instruction Fuzzy Hash: CC41B231A087C586EB62CF19914063DB7A1FB84B91F148136EB8D97B99DF3CE8639700
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionRaisefree
                                                                          • String ID:
                                                                          • API String ID: 501637548-0
                                                                          • Opcode ID: 6091e4866e5df5ec72efa5c9ea70e5436eb9a164a20f27cf849220055c386ae6
                                                                          • Instruction ID: 6768efec6db53beea96531797f11c0554bd826190e779ea93025c7c7ad30b5d5
                                                                          • Opcode Fuzzy Hash: 6091e4866e5df5ec72efa5c9ea70e5436eb9a164a20f27cf849220055c386ae6
                                                                          • Instruction Fuzzy Hash: B621B032A1868586EB22DF26E09173C7360FBC0F55F108536DA1A97755CF3CE463A740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: FreeString
                                                                          • String ID:
                                                                          • API String ID: 3341692771-0
                                                                          • Opcode ID: 9400c879f395e8e1041e99f399ca43ef3155b5eea99d28c3571ed665674c8d41
                                                                          • Instruction ID: a2149301442427196f51819d29028d565e91d06e22afb1ac98521ec471abff17
                                                                          • Opcode Fuzzy Hash: 9400c879f395e8e1041e99f399ca43ef3155b5eea99d28c3571ed665674c8d41
                                                                          • Instruction Fuzzy Hash: C6012131608A4582D7159B1AE55412CB370FB84BA5B144332DF6D83BB0CF7DD4A69700
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: FreeString
                                                                          • String ID:
                                                                          • API String ID: 3341692771-0
                                                                          • Opcode ID: 71332804fb799d93ff3c92b5373d027f535b9761171e135ce507182e18860e2f
                                                                          • Instruction ID: 387224f8610856f11314ec1e14d35b855bfca52450a3ada187fd020729d1fcf4
                                                                          • Opcode Fuzzy Hash: 71332804fb799d93ff3c92b5373d027f535b9761171e135ce507182e18860e2f
                                                                          • Instruction Fuzzy Hash: 2C01EC35608A8682D7119B1AE95416CB360FB84BA5B144232DF6D83BB5CF7DE4B69700
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.1692378098.00007FF6DC601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6DC600000, based on PE: true
                                                                          • Associated: 00000003.00000002.1692329535.00007FF6DC600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692433854.00007FF6DC617000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC626000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692478292.00007FF6DC62A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.1692593822.00007FF6DC62B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_7ff6dc600000_ISBEW64.jbxd
                                                                          Similarity
                                                                          • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                                                          • String ID: B
                                                                          • API String ID: 1812809483-1255198513
                                                                          • Opcode ID: bbb8f773bab51e8e522d642ffc497e4c7d030a58199116e91c1ffc0167e66120
                                                                          • Instruction ID: 11828243d9bb3b6de600b61d2fc7611a8d54d568dfb926f33eb7619974e19eea
                                                                          • Opcode Fuzzy Hash: bbb8f773bab51e8e522d642ffc497e4c7d030a58199116e91c1ffc0167e66120
                                                                          • Instruction Fuzzy Hash: 9B11C272A1468882EB119B13D4403ADB660FB98FD4F548331EB5C57B95CF3CD151EB00
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 010128A6
                                                                            • Part of subcall function 0100C9C9: TlsGetValue.KERNEL32(703B38B8,010128D2,00000224,0100C14A,00000001,Main,?,?,?,?,?,?,?,00000000), ref: 0100C9D0
                                                                          • ?StartDefer@Element@DirectUI@@SGXXZ.UXCORE(00000224,0100C14A,00000001,Main,?,?,?,?,?,?,?,00000000), ref: 010128D2
                                                                          • ??2@YAPAXI@Z.MSVCR80(00000030), ref: 01012905
                                                                          • ??0CRMDUIParser@@QAE@XZ.UXCORE ref: 0101291B
                                                                          • ?LoadAndCreateElement@CRMDUIParser@@QAEJIPB_WPAPAVElement@DirectUI@@PAV23@K0@Z.UXCORE(?,?,?,00000000,0000000F,00000000), ref: 01012951
                                                                          • GetForegroundWindow.USER32(6C744143,65637845,0000000D,01003450,00000000), ref: 0101298B
                                                                          • ?Initialize@NativeHWNDHost@DirectUI@@QAEJPB_W0PAUHWND__@@PAUHICON__@@HHHHHHHPAUHINSTANCE__@@I@Z.UXCORE(00000000,00000000,00000000,?,?,?,?,00000000,00000000), ref: 010129C3
                                                                          • ?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ.UXCORE(6C744143,65637845,0000000E,01003450,00000000), ref: 01012A02
                                                                          • ?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ.UXCORE(00000000), ref: 01012A19
                                                                          • GetSystemMenu.USER32(00000000), ref: 01012A20
                                                                          • RemoveMenu.USER32(00000000,0000F000,00000000), ref: 01012A31
                                                                          • ?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ.UXCORE(?,00000000,00000000,00000000,00000000,00000013), ref: 01012A49
                                                                          • SetWindowPos.USER32(00000000), ref: 01012A50
                                                                          • ?RMLoadIcon@@YGPAUHICON__@@PB_WK0@Z.UXCORE(?,0000000F,00000000), ref: 01012A68
                                                                          • ?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ.UXCORE(00000080,00000001,00000000), ref: 01012A78
                                                                          • SendMessageW.USER32(00000000), ref: 01012A7F
                                                                          • ?RMLoadString@@YGIIPA_WIKPB_W@Z.UXCORE(00000000,?,00000104,0000000F,00000000), ref: 01012AA0
                                                                          • ?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ.UXCORE(?), ref: 01012AAF
                                                                          • SetWindowTextW.USER32(00000000), ref: 01012AB6
                                                                          • ?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ.UXCORE(00000001,00000000,00000000,?), ref: 01012AC9
                                                                          • ?Create@HWNDElement@DirectUI@@SGJPAUHWND__@@_NI1PAPAVElement@2@@Z.UXCORE(00000000), ref: 01012AD0
                                                                            • Part of subcall function 010126C4: ?CreateInt@Value@DirectUI@@SGPAV12@H@Z.UXCORE(?,00000000,?,?,01012B77,00000009,Direct UI window,DUI Window Frame,00000001,?), ref: 010126D0
                                                                            • Part of subcall function 01012756: ?CreateUnknown@Value@DirectUI@@SGPAV12@PAUIUnknown@@@Z.UXCORE(?,00000000,?,?,01012BAD,?,?,01004488,?,00000009,Direct UI window,DUI Window Frame,00000001,?), ref: 01012762
                                                                            • Part of subcall function 0100C840: ?CreateBool@Value@DirectUI@@SGPAV12@_N@Z.UXCORE(?,00000000,?,?,01012BC4,00000001,?,?,01004488,?,00000009,Direct UI window,DUI Window Frame,00000001,?), ref: 0100C84C
                                                                          • ?Host@NativeHWNDHost@DirectUI@@QAEXPAVElement@2@@Z.UXCORE(?,00000001,?,?,01004488,?,00000009,Direct UI window,DUI Window Frame,00000001,?), ref: 01012BD7
                                                                          • ?AddListener@Element@DirectUI@@QAEJPAUIElementListener@2@@Z.UXCORE(?,?,01004488,?,00000009,Direct UI window,DUI Window Frame,00000001,?), ref: 01012BE7
                                                                          • ?Add@Element@DirectUI@@QAEJPAV12@@Z.UXCORE(?,?,01004488,?,00000009,Direct UI window,DUI Window Frame,00000001,?), ref: 01012BFF
                                                                          • ?Attach@CRMDUIParser@@QAEJPAVElement@DirectUI@@@Z.UXCORE(?,?,01004488,?,00000009,Direct UI window,DUI Window Frame,00000001,?), ref: 01012C1A
                                                                          • ?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ.UXCORE(?,01004488,?,00000009,Direct UI window,DUI Window Frame,00000001,?), ref: 01012C32
                                                                          • BuildDropTarget.UXCORE(00000001,00000000,?,01004488,?,00000009,Direct UI window,DUI Window Frame,00000001,?), ref: 01012C3A
                                                                          • ?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ.UXCORE(6C744143,65637845,00000010,01003450,80070057), ref: 01012C9C
                                                                          • ?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ.UXCORE(00000010,00000000,00000000), ref: 01012CAC
                                                                          • PostMessageW.USER32(00000000), ref: 01012CB3
                                                                          • ?EndDefer@Element@DirectUI@@SGXXZ.UXCORE(?), ref: 01012CC8
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Direct$Host@$Native$D__@@$Element@$Create$LoadParser@@Value@Window$Defer@Element@2@@MenuMessageN__@@V12@$??2@Add@Attach@Bool@BuildCreate@D__@@_DropE__@@ElementForegroundH_prolog3_I@@@Icon@@Initialize@Int@Listener@Listener@2@@PostRemoveSendStartString@@SystemTargetTextUnknown@Unknown@@@V12@@V12@_V23@Value
                                                                          • String ID: DUI Window Frame$Direct UI window
                                                                          • API String ID: 3618921266-1775726735
                                                                          • Opcode ID: 03c51ac8d8785a96ccd103557a71e794eee43199353ba1f3dd90f38f468ad6f3
                                                                          • Instruction ID: 64156be431880ffba6556d0ffe67c253a3f4e7088df3ab75dac641eaba58ca07
                                                                          • Opcode Fuzzy Hash: 03c51ac8d8785a96ccd103557a71e794eee43199353ba1f3dd90f38f468ad6f3
                                                                          • Instruction Fuzzy Hash: CEC1F671600109AFDB26AFA4D98CEAD7BE6BB48340F254498F2C6D7295CB3ADD41CF11
                                                                          APIs
                                                                          • GetProcessHeap.KERNEL32(00000001,00000000,00000000), ref: 010076B1
                                                                          • HeapSetInformation.KERNEL32(00000000), ref: 010076BA
                                                                          • GetProcessHeap.KERNEL32(00000000,?,00000004), ref: 010076CA
                                                                          • HeapSetInformation.KERNEL32(00000000), ref: 010076CD
                                                                            • Part of subcall function 0100653B: __EH_prolog3.LIBCMT ref: 01006542
                                                                            • Part of subcall function 010072FA: __EH_prolog3.LIBCMT ref: 01007301
                                                                            • Part of subcall function 010072FA: CreateMutexW.KERNEL32(00000000,00000000,?,?,?,00000004,010076E9,?), ref: 01007343
                                                                            • Part of subcall function 010072FA: GetLastError.KERNEL32 ref: 0100734F
                                                                            • Part of subcall function 010072FA: CloseHandle.KERNEL32(00000000), ref: 0100735D
                                                                          • GetLastError.KERNEL32(?), ref: 01007700
                                                                          • CoInitializeEx.OLE32(00000000,00000002,?,?), ref: 010077F9
                                                                          • ?RMInitialize@@YGXXZ.UXCORE ref: 01007807
                                                                          • ?RMUpdateResourceSet@@YG_NPB_WK00@Z.UXCORE(DashboardRes,00000008,00000000,00000000), ref: 0100781C
                                                                          • ?RMUpdateResourceSet@@YG_NPB_WK00@Z.UXCORE(DashboardLoc,00000004,1.0.0.1,00000000), ref: 0100784E
                                                                          • ?RMUpdateResourceSet@@YG_NPB_WK00@Z.UXCORE(01001AD0,00008002,00000000,00000000), ref: 01007880
                                                                          • UXCoreInitProcess.UXCORE(00000000), ref: 010078A7
                                                                          • UXCoreInitThread.UXCORE(00000000), ref: 010078B4
                                                                          • TranslateMessage.USER32(?), ref: 010078EF
                                                                          • DispatchMessageW.USER32(?), ref: 010078F9
                                                                            • Part of subcall function 010090EF: TraceMessage.ADVAPI32(?,?,0000002B,00000000,00000000,010017F8,00000004,00000000,?,0100795C,6C744143,65637845,00000011,010017F8,00000000,00000000), ref: 0100910A
                                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 01007906
                                                                          • UXCoreUnInitThread.UXCORE ref: 0100790C
                                                                          • UXCoreUnInitProcess.UXCORE(00000000), ref: 01007936
                                                                          • ?RMTerminate@@YGXXZ.UXCORE(00000000), ref: 01007960
                                                                          • CoUninitialize.OLE32 ref: 01007966
                                                                            • Part of subcall function 010049DE: TraceMessage.ADVAPI32(?,?,0000002B,?,?,00000000), ref: 010049F3
                                                                          • CloseHandle.KERNEL32(?), ref: 0100797F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Message$CoreHeapInitProcess$K00@ResourceSet@@Update$CloseErrorH_prolog3HandleInformationLastThreadTrace$CreateDispatchInitializeInitialize@@MutexTerminate@@TranslateUninitialize
                                                                          • String ID: 1.0.0.1$DashboardLoc$DashboardRes$WLXS\Dashboard
                                                                          • API String ID: 2320391741-3161801426
                                                                          • Opcode ID: b0b7640e0d6759bdf3b6e056b6aff3e48fdc5acccfe6a9e4f297daa83d35a3af
                                                                          • Instruction ID: 08b694855b39e6496e6f59cceddca6a9dea7f06b922978450260764b005a29ed
                                                                          • Opcode Fuzzy Hash: b0b7640e0d6759bdf3b6e056b6aff3e48fdc5acccfe6a9e4f297daa83d35a3af
                                                                          • Instruction Fuzzy Hash: 6091D470500249BBFB17AFA4CD44FAE7BA9EF44744F144499F6C1960D2C77ADA41CB60
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 01007386
                                                                          • GetVersionExW.KERNEL32(00000114), ref: 010073C6
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: H_prolog3_Version
                                                                          • String ID: Indefinite$New$Unsupported$Version: %s$Windows 2003$Windows Vista$Windows XP
                                                                          • API String ID: 3152847492-2193866653
                                                                          • Opcode ID: 2a15ceeba3357e99c7376be5592d206867398d81c9a1a4da5e0b88e1e5aa7b36
                                                                          • Instruction ID: 8d59f35c0632d355e65b9679e5f98fc215be8b449174d6887c6459e1db327f46
                                                                          • Opcode Fuzzy Hash: 2a15ceeba3357e99c7376be5592d206867398d81c9a1a4da5e0b88e1e5aa7b36
                                                                          • Instruction Fuzzy Hash: 642191309002299BFB77EB14CC017ECBAB4AB29711F0140D9E1C5661C0CF786BA5CFA1
                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 0100CC6A
                                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 0100CC71
                                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0100CC85
                                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0100CCA4
                                                                          • GetLastError.KERNEL32 ref: 0100CCAA
                                                                          • CloseHandle.KERNEL32(?), ref: 0100CCB8
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue
                                                                          • String ID: SeShutdownPrivilege
                                                                          • API String ID: 3398352648-3733053543
                                                                          • Opcode ID: ee0013f882b80b2b7a19fe59f5a101aa25fab3b9e718203e879d761d41fc8881
                                                                          • Instruction ID: 302b449996c1f7a5efa8ccff5f194c8d7dcba89ad3a7b713aaf80952cba0cb84
                                                                          • Opcode Fuzzy Hash: ee0013f882b80b2b7a19fe59f5a101aa25fab3b9e718203e879d761d41fc8881
                                                                          • Instruction Fuzzy Hash: 33F01971601168ABEB22EBA1DD0DEEF7E7CEF41750F100055F986E1145DBB9CA04DBA1
                                                                          APIs
                                                                          • IsDebuggerPresent.KERNEL32 ref: 01008D2E
                                                                          • _crt_debugger_hook.MSVCR80(00000001), ref: 01008D3B
                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 01008D43
                                                                          • UnhandledExceptionFilter.KERNEL32(01001CE4), ref: 01008D4E
                                                                          • _crt_debugger_hook.MSVCR80(00000001), ref: 01008D5F
                                                                          • GetCurrentProcess.KERNEL32(C0000409), ref: 01008D6A
                                                                          • TerminateProcess.KERNEL32(00000000), ref: 01008D71
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterProcessUnhandled_crt_debugger_hook$CurrentDebuggerPresentTerminate
                                                                          • String ID:
                                                                          • API String ID: 3369434319-0
                                                                          • Opcode ID: 7d6ce6bd35bee8a7f2e6959517e5b17b2968080e00cf88af5c1365b4dfdd6eff
                                                                          • Instruction ID: a0f8ed9874d63253848e0c0cdeecc4be2fe3a16b8920436d4c56b97c05f8a7d2
                                                                          • Opcode Fuzzy Hash: 7d6ce6bd35bee8a7f2e6959517e5b17b2968080e00cf88af5c1365b4dfdd6eff
                                                                          • Instruction Fuzzy Hash: B521CBB4A02284DFDB32DF28E9896943BB0FB18310F01551AE48A83249E3BE96858F15
                                                                          APIs
                                                                          • GetThreadLocale.KERNEL32 ref: 01008232
                                                                          • GetLocaleInfoA.KERNEL32(00000000,00001004,?,00000007), ref: 01008244
                                                                          • GetACP.KERNEL32 ref: 0100826D
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Locale$InfoThread
                                                                          • String ID:
                                                                          • API String ID: 4232894706-0
                                                                          • Opcode ID: 70f33ab9d729608102f05b2e7a97b5d5e3e1e5541cdeeb8c49c9180d0241caed
                                                                          • Instruction ID: 7c2561d37f4f8e37f3ba00928a2c0b310663c91fd433351266e3a9b238308abd
                                                                          • Opcode Fuzzy Hash: 70f33ab9d729608102f05b2e7a97b5d5e3e1e5541cdeeb8c49c9180d0241caed
                                                                          • Instruction Fuzzy Hash: 94F0FC31F0066C9FE723DBB995156EF77E4BB04B41F00819EEAC2E7280D675A90487D0
                                                                          APIs
                                                                            • Part of subcall function 0100CC59: GetCurrentProcess.KERNEL32(00000028,?), ref: 0100CC6A
                                                                            • Part of subcall function 0100CC59: OpenProcessToken.ADVAPI32(00000000), ref: 0100CC71
                                                                            • Part of subcall function 0100CC59: LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0100CC85
                                                                            • Part of subcall function 0100CC59: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0100CCA4
                                                                            • Part of subcall function 0100CC59: GetLastError.KERNEL32 ref: 0100CCAA
                                                                            • Part of subcall function 0100CC59: CloseHandle.KERNEL32(?), ref: 0100CCB8
                                                                          • ExitWindowsEx.USER32(?,?), ref: 0100CCDC
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: ProcessToken$AdjustCloseCurrentErrorExitHandleLastLookupOpenPrivilegePrivilegesValueWindows
                                                                          • String ID:
                                                                          • API String ID: 3672536310-0
                                                                          • Opcode ID: 2dc45d28cb94792324e4564fa534f6c9f771541fe6c1a1f6461dc5fb7b7ddf34
                                                                          • Instruction ID: ac00cf5b8632513a42fe9c9415866d1b4a1c37558d9d079e883b4ee4856cca59
                                                                          • Opcode Fuzzy Hash: 2dc45d28cb94792324e4564fa534f6c9f771541fe6c1a1f6461dc5fb7b7ddf34
                                                                          • Instruction Fuzzy Hash: A2C0803118410F6F7F522F75DD04D663F59BB61351F004251F949C50D0DE32D425D750
                                                                          APIs
                                                                          • GetProcAddress.KERNEL32(?,MsiSetInternalUI), ref: 01014493
                                                                          • GetProcAddress.KERNEL32(?,MsiCloseHandle), ref: 010144A3
                                                                          • GetProcAddress.KERNEL32(?,MsiGetActiveDatabase), ref: 010144B0
                                                                          • GetProcAddress.KERNEL32(?,MsiViewExecute), ref: 010144BD
                                                                          • GetProcAddress.KERNEL32(?,MsiViewFetch), ref: 010144CA
                                                                          • GetProcAddress.KERNEL32(?,MsiRecordGetInteger), ref: 010144D7
                                                                          • GetProcAddress.KERNEL32(?,MsiCreateRecord), ref: 010144E4
                                                                          • GetProcAddress.KERNEL32(?,MsiEnableLogW), ref: 010144F1
                                                                          • GetProcAddress.KERNEL32(?,MsiGetProductInfoW), ref: 010144FE
                                                                          • GetProcAddress.KERNEL32(?,MsiGetPropertyW), ref: 0101450B
                                                                          • GetProcAddress.KERNEL32(?,MsiSetPropertyW), ref: 01014518
                                                                          • GetProcAddress.KERNEL32(?,MsiOpenPackageW), ref: 01014525
                                                                          • GetProcAddress.KERNEL32(?,MsiSequenceW), ref: 01014535
                                                                          • GetProcAddress.KERNEL32(?,MsiDoActionW), ref: 01014545
                                                                          • GetProcAddress.KERNEL32(?,MsiSetFeatureStateW), ref: 01014552
                                                                          • GetProcAddress.KERNEL32(?,MsiReinstallFeatureW), ref: 0101455F
                                                                          • GetProcAddress.KERNEL32(?,MsiSetExternalUIW), ref: 0101456C
                                                                          • GetProcAddress.KERNEL32(?,MsiGetTargetPathW), ref: 0101457C
                                                                          • GetProcAddress.KERNEL32(?,MsiSetTargetPathW), ref: 01014589
                                                                          • GetProcAddress.KERNEL32(?,MsiDatabaseOpenViewW), ref: 01014596
                                                                          • GetProcAddress.KERNEL32(?,MsiRecordSetStringW), ref: 010145A3
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc
                                                                          • String ID: MsiApplyMultiplePatchesW$MsiApplyPatchW$MsiCloseHandle$MsiConfigureProductExW$MsiCreateRecord$MsiDatabaseOpenViewW$MsiDetermineApplicablePatchesW$MsiDeterminePatchSequenceW$MsiDoActionW$MsiEnableLogW$MsiEnumPatchesW$MsiEnumRelatedProductsW$MsiGetActiveDatabase$MsiGetComponentPathW$MsiGetFeatureStateW$MsiGetMode$MsiGetPatchInfoExW$MsiGetPatchInfoW$MsiGetProductInfoW$MsiGetProductPropertyW$MsiGetPropertyW$MsiGetTargetPathW$MsiInstallProductW$MsiOpenDatabaseW$MsiOpenPackageW$MsiOpenProductW$MsiProcessMessage$MsiQueryProductStateW$MsiRecordDataSize$MsiRecordGetInteger$MsiRecordGetStringW$MsiRecordIsNull$MsiRecordSetInteger$MsiRecordSetStringW$MsiReinstallFeatureW$MsiReinstallProductW$MsiSequenceW$MsiSetExternalUIRecordA$MsiSetExternalUIW$MsiSetFeatureStateW$MsiSetInternalUI$MsiSetPropertyW$MsiSetTargetPathW$MsiSourceListAddSourceW$MsiSourceListClearAllW$MsiViewExecute$MsiViewFetch
                                                                          • API String ID: 190572456-2058816641
                                                                          • Opcode ID: 17b98e4289bb8679fa32b56e0c200408f15fa7c9bde7554e3916c860dd33ed6a
                                                                          • Instruction ID: 0dfad8db0f510d5a1445c7f8a96d36d181f5a67ab7380ec8147bc3a8deb6e94f
                                                                          • Opcode Fuzzy Hash: 17b98e4289bb8679fa32b56e0c200408f15fa7c9bde7554e3916c860dd33ed6a
                                                                          • Instruction Fuzzy Hash: 8DB1BAB4940B85EFEB326F728845917BEF1FF84700B014E2EE5E69AAA0D775A054DF10
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 01011FC1
                                                                            • Part of subcall function 0100C81B: ?GetValue@Element@DirectUI@@QBEPAVValue@2@PBUPropertyInfo@2@H@Z.UXCORE(703B436C,00000002,?,0100CE37), ref: 0100C825
                                                                          • ?StrToID@DirectUI@@YGGPB_W@Z.UXCORE(FLWCloseBtn,?,?,00000000), ref: 0101201C
                                                                          • ?StrToID@DirectUI@@YGGPB_W@Z.UXCORE(idClose,?,?,00000000), ref: 0101203A
                                                                          • ?StrToID@DirectUI@@YGGPB_W@Z.UXCORE(FLWMinBtn,?,?,00000000), ref: 01012058
                                                                          • ?StrToID@DirectUI@@YGGPB_W@Z.UXCORE(idCompletionClose,?,?,00000000), ref: 01012083
                                                                          • ?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ.UXCORE(00000BD1,00000000,00000000,?,?,?,?,?,?,00000000), ref: 010122D4
                                                                          • PostMessageW.USER32(00000000), ref: 010122DB
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Direct$D__@@Element@H_prolog3Host@Info@2@MessageNativePostPropertyValue@Value@2@
                                                                          • String ID: FLWCloseBtn$FLWMinBtn$ProductNameTextInstalled$idCancel$idClose$idCompletionClose$idConfirmedCancel$idFIUListScrollviwer$idIgnore$idInstall$idProductName$idRestartClose$idResume$idRetry
                                                                          • API String ID: 406392691-3517868946
                                                                          • Opcode ID: 7aedde5c5fcc4f158d7e6129bc11e76acc27ab90c889b047db29f61baf3246d3
                                                                          • Instruction ID: 28a74e90999ffff3238f687737c5f8873f1b61b18ecda8d1f5d9e34d59475477
                                                                          • Opcode Fuzzy Hash: 7aedde5c5fcc4f158d7e6129bc11e76acc27ab90c889b047db29f61baf3246d3
                                                                          • Instruction Fuzzy Hash: 52B1A634740241ABFB67EB18C945FB93BA1BB14710FA48498F6C19F1EACB79D942CB14
                                                                          APIs
                                                                          • ?GetElement@NativeHWNDHost@DirectUI@@QAEPAVElement@2@XZ.UXCORE ref: 0100D5EB
                                                                          • ?StrToID@DirectUI@@YGGPB_W@Z.UXCORE(idInstallErrorHelpLink,00000000), ref: 0100D5FB
                                                                          • ?RMLoadString@@YGIIPA_WIKPB_W@Z.UXCORE(0000032C,?,00000104,0000000F,00000000), ref: 0100D65A
                                                                          • ?RMLoadString@@YGIIPA_WIKPB_W@Z.UXCORE(000000CA,?,00000104,0000000F,00000000,?), ref: 0100D695
                                                                          • ?RMLoadCompoundString@@YGIIPA_WIKPB_W@Z.UXCORE(000000CD,?,00000208,0000000F,00000000), ref: 0100D6B0
                                                                            • Part of subcall function 010049DE: TraceMessage.ADVAPI32(?,?,0000002B,?,?,00000000), ref: 010049F3
                                                                            • Part of subcall function 0100D225: _vsnwprintf.MSVCR80 ref: 0100D258
                                                                            • Part of subcall function 0100CA2F: ?CreateString@Value@DirectUI@@SGPAV12@PB_WPAUHINSTANCE__@@I@Z.UXCORE(?,00000000,00000000), ref: 0100CA3F
                                                                            • Part of subcall function 01006C01: TraceMessage.ADVAPI32(?,?,0000002B,?,?,NULL,0000000A,00000000), ref: 01006C5D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: DirectLoadString@@$MessageTrace$CompoundCreateE__@@Element@Element@2@Host@NativeString@V12@Value@_vsnwprintf
                                                                          • String ID: AllCancelled$AllFail$AllSucceeded$HasError$InstallComplete$MultipleFail$MultipleProductPartialSuccess$MultipleProductRebootNeeded$MultipleProductSuccess$NeedReboot$PartialCancel$SingleCancelled$SingleFail$SingleProductRebootNeeded$SingleProductSuccess$SomeCancelled$SomeSucceeded$idCompletionClose$idErrorMsgCont$idInstallErrorHelpLink$idRestartClose$idSummaryFooter
                                                                          • API String ID: 218840918-2671734306
                                                                          • Opcode ID: 78dd9e5f8ca60656dcae873aecfaa4802ba6b4925d1cd117f78a0f96731dd34f
                                                                          • Instruction ID: 2ad8084ce7e743547ef01bbabb4c4eaaf0d8d145b63ff253c7f9afca7e270cf1
                                                                          • Opcode Fuzzy Hash: 78dd9e5f8ca60656dcae873aecfaa4802ba6b4925d1cd117f78a0f96731dd34f
                                                                          • Instruction Fuzzy Hash: 34C1A1306002019BFB679FD8C858FAA7BA6FF44644F1440D9E9C99B2D1CE36D946CB20
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 01010E60
                                                                            • Part of subcall function 01010B31: __EH_prolog3.LIBCMT ref: 01010B38
                                                                            • Part of subcall function 0100C55B: RegCreateKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000,?), ref: 0100C584
                                                                            • Part of subcall function 0100C684: lstrlenW.KERNEL32(00000000), ref: 0100C69F
                                                                            • Part of subcall function 0100C684: RegSetValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0100C6B7
                                                                          • RegSetValueExW.ADVAPI32(?,Use Custom Search URL,00000000,00000004,?,00000004,0000000C), ref: 01010F02
                                                                          Strings
                                                                          • CustomizeSearch, xrefs: 01010F72
                                                                          • Search Page, xrefs: 01010EA9
                                                                          • Use Search Asst, xrefs: 01010EDB
                                                                          • Software\Microsoft\Internet Explorer\Search, xrefs: 01010F39
                                                                          • msn, xrefs: 01010FF2
                                                                          • Software\Microsoft\Internet Explorer\Main, xrefs: 01010E86
                                                                          • Use Custom Search URL, xrefs: 01010EF7
                                                                          • http://home.microsoft.com/access/autosearch.asp?p=%s, xrefs: 01010FDC
                                                                          • SearchAssistant, xrefs: 01010F8C
                                                                          • http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch, xrefs: 01010EA3, 01010EBE
                                                                          • http://ie.search.msn.com/{SUB_RFC1766}/srchasst/saautosearch.aspx, xrefs: 01010F53
                                                                          • Search Bar, xrefs: 01010EBF
                                                                          • Software\Microsoft\Internet Explorer\SearchUrl, xrefs: 01010FC2
                                                                          • http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchasst.htm, xrefs: 01010F87
                                                                          • AutoSearch, xrefs: 01010F58
                                                                          • http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchcust.htm, xrefs: 01010F6D
                                                                          • provider, xrefs: 01010FF7
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: H_prolog3Value$Createlstrlen
                                                                          • String ID: AutoSearch$CustomizeSearch$Search Bar$Search Page$SearchAssistant$Software\Microsoft\Internet Explorer\Main$Software\Microsoft\Internet Explorer\Search$Software\Microsoft\Internet Explorer\SearchUrl$Use Custom Search URL$Use Search Asst$http://home.microsoft.com/access/autosearch.asp?p=%s$http://ie.search.msn.com/{SUB_RFC1766}/srchasst/saautosearch.aspx$http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchasst.htm$http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchcust.htm$http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch$msn$provider
                                                                          • API String ID: 3811441507-428694650
                                                                          • Opcode ID: e011f4ff021c6364969040f60b8dcebc4f326af9618f8a9cecb097d1bd4b8a06
                                                                          • Instruction ID: c9a85841fcf569fcd5d360069d0963b317b4f99534134c70db371ef3bb4ee06f
                                                                          • Opcode Fuzzy Hash: e011f4ff021c6364969040f60b8dcebc4f326af9618f8a9cecb097d1bd4b8a06
                                                                          • Instruction Fuzzy Hash: AE410671D40266AAFB33E665CC99EFEB674EBA4B40F11066CF5E17B0C4D9B40E84C690
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 0100F3ED
                                                                          • lstrcmpiW.KERNEL32(?,Delete,0000042C,0100FE29,0000007B,?,00000000,00000000), ref: 0100F433
                                                                          • lstrcmpiW.KERNEL32(?,ForceRemove), ref: 0100F442
                                                                          • lstrlenW.KERNEL32(?), ref: 0100F8A5
                                                                            • Part of subcall function 0100C53D: RegCloseKey.ADVAPI32(?,?,0100C5A1), ref: 0100C54B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: lstrcmpi$CloseH_prolog3_lstrlen
                                                                          • String ID: Delete$ForceRemove$NoRemove$Val
                                                                          • API String ID: 989197751-1781481701
                                                                          • Opcode ID: 81c3cbd0e92d524083107f002ca19596d3515cdccc9f9eeb133e889b4df012fc
                                                                          • Instruction ID: da408757ef80bc5ba682544ae8d0336465783bffc6747967f88096f89b6b1a6e
                                                                          • Opcode Fuzzy Hash: 81c3cbd0e92d524083107f002ca19596d3515cdccc9f9eeb133e889b4df012fc
                                                                          • Instruction Fuzzy Hash: 2AD161B1E0022B9BFF339A64CD90BED77B8AF54214F4005E8EA85A71C1DB709E84DB55
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 01011696
                                                                            • Part of subcall function 0100D009: __EH_prolog3.LIBCMT ref: 0100D010
                                                                            • Part of subcall function 0100D009: ??2@YAPAXI@Z.MSVCR80(00000001,00000000,0100FA5D,?), ref: 0100D025
                                                                          • ?GetElement@NativeHWNDHost@DirectUI@@QAEPAVElement@2@XZ.UXCORE(?,0000000C,01011A57,?), ref: 010116E7
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: H_prolog3$??2@DirectElement@Element@2@Host@Native
                                                                          • String ID: CancelFromFeaturePage$MultipleProductsMode$SingleProductMode$Visible$idCompletePageButtonsCont$idErrorMsgCont$idFIUListScrollviwer$idHint$idInstallPage$idProdListScrollviedwer$idProgressCont$idProgressPageButtonsCont$idQuestion
                                                                          • API String ID: 765067690-502158243
                                                                          • Opcode ID: 2acba51a9d7b698485d869466626ae5ddcb7fc31ac8363fb91b90a790004e465
                                                                          • Instruction ID: 576265e94bab847d7a3159c867ff885aa05da33510b2501067602ba9f764034b
                                                                          • Opcode Fuzzy Hash: 2acba51a9d7b698485d869466626ae5ddcb7fc31ac8363fb91b90a790004e465
                                                                          • Instruction Fuzzy Hash: EA810630300702ABFB2B6A798954FAD6A63AB81A40F15495CFBD29F2C5DE7EC8018714
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 01011040
                                                                            • Part of subcall function 01010CBA: __EH_prolog3.LIBCMT ref: 01010CC1
                                                                            • Part of subcall function 0100C55B: RegCreateKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000,?), ref: 0100C584
                                                                          • _wcsicmp.MSVCR80 ref: 010110D1
                                                                          • _wcsicmp.MSVCR80 ref: 01011165
                                                                          • _wcsicmp.MSVCR80 ref: 01011203
                                                                            • Part of subcall function 0100653B: __EH_prolog3.LIBCMT ref: 01006542
                                                                            • Part of subcall function 010106BB: SHGetValueW.SHLWAPI(?,00000000,?,00000000,00000000,?), ref: 010106E0
                                                                            • Part of subcall function 010106BB: SHGetValueW.SHLWAPI(?,00000000,?,00000000,00000000,00000000,?,00000000,00000000,?), ref: 01010714
                                                                            • Part of subcall function 010106BB: ??_V@YAXPAX@Z.MSVCR80(?,?,00000000,00000000,?), ref: 01010730
                                                                          • _wcsicmp.MSVCR80 ref: 01011245
                                                                          Strings
                                                                          • Search Page, xrefs: 01011093
                                                                          • http://ie.search.msn.com/{SUB_RFC1766}/srchasst/saautosearch.aspx, xrefs: 0101115D
                                                                          • Software\Microsoft\Internet Explorer\Search, xrefs: 01011113
                                                                          • Software\Microsoft\Internet Explorer\SearchUrl, xrefs: 010111A7
                                                                          • msn, xrefs: 0101123D
                                                                          • Software\Microsoft\Internet Explorer\Main, xrefs: 01011077
                                                                          • AutoSearch, xrefs: 01011127
                                                                          • provider, xrefs: 0101120B
                                                                          • http://home.microsoft.com/access/autosearch.asp?p=%s, xrefs: 010111FB
                                                                          • http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch, xrefs: 010110C9
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: _wcsicmp$H_prolog3$Value$Create
                                                                          • String ID: AutoSearch$Search Page$Software\Microsoft\Internet Explorer\Main$Software\Microsoft\Internet Explorer\Search$Software\Microsoft\Internet Explorer\SearchUrl$http://home.microsoft.com/access/autosearch.asp?p=%s$http://ie.search.msn.com/{SUB_RFC1766}/srchasst/saautosearch.aspx$http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch$msn$provider
                                                                          • API String ID: 2892520615-2298700832
                                                                          • Opcode ID: f5152bee5913963a1c864a93d74e7dccb2edbd7c721527cac15ae48f85a027fd
                                                                          • Instruction ID: 4b909bb22a64957543d9d646e162473eaaebfac2c8fd8a26875476c2192a1921
                                                                          • Opcode Fuzzy Hash: f5152bee5913963a1c864a93d74e7dccb2edbd7c721527cac15ae48f85a027fd
                                                                          • Instruction Fuzzy Hash: 6E61D771D0025B9AEF27E7A8CC94AFFBAB4AF64711F100259E6E0B71C4D7B90A44C791
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 0101129C
                                                                          • ?StrToID@DirectUI@@YGGPB_W@Z.UXCORE(idChkBoxSetHomePage,00000000), ref: 01011306
                                                                          • ?StrToID@DirectUI@@YGGPB_W@Z.UXCORE(idChkBoxSearch,00000000), ref: 01011362
                                                                          • ?RMLoadString@@YGIIPA_WIKPB_W@Z.UXCORE(00000007,?,00000104,0000000F,00000000), ref: 01011390
                                                                            • Part of subcall function 010049DE: TraceMessage.ADVAPI32(?,?,0000002B,?,?,00000000), ref: 010049F3
                                                                            • Part of subcall function 0100CA0C: ?GetValue@Element@DirectUI@@QBEPAVValue@2@PBUPropertyInfo@2@H@Z.UXCORE(703B85A8,00000002), ref: 0100CA16
                                                                            • Part of subcall function 0100C81B: ?GetValue@Element@DirectUI@@QBEPAVValue@2@PBUPropertyInfo@2@H@Z.UXCORE(703B436C,00000002,?,0100CE37), ref: 0100C825
                                                                            • Part of subcall function 0100ACC8: EnterCriticalSection.KERNEL32(0101A968), ref: 0100ACDE
                                                                            • Part of subcall function 0100ACC8: LeaveCriticalSection.KERNEL32(0101A968), ref: 0100ACFB
                                                                            • Part of subcall function 01014271: FindAtomW.KERNEL32(0101A528,?,?,0101A004,?,0100ADCE,?), ref: 01014285
                                                                            • Part of subcall function 0100CE8D: ?GetElement@NativeHWNDHost@DirectUI@@QAEPAVElement@2@XZ.UXCORE(0100D2E1), ref: 0100CE90
                                                                            • Part of subcall function 0100CE8D: ?StrToID@DirectUI@@YGGPB_W@Z.UXCORE(00000000), ref: 0100CEA1
                                                                          • ?StrToID@DirectUI@@YGGPB_W@Z.UXCORE(idProductListCont,00000000,00000000,00000000), ref: 010114CA
                                                                            • Part of subcall function 0100C2F9: ?FindDescendent@Element@DirectUI@@QAEPAV12@G@Z.UXCORE(00000000,?,00000000,?,01012820,00000000,?,01012C67,00000000,?,01004488,?,00000009,Direct UI window,DUI Window Frame,00000001), ref: 0100C30C
                                                                          • ?StrToID@DirectUI@@YGGPB_W@Z.UXCORE(00000000,00000000,00000000), ref: 010114DE
                                                                          • ?Remove@Element@DirectUI@@QAEJPAV12@@Z.UXCORE(00000000,00000000), ref: 010114F1
                                                                            • Part of subcall function 01006C01: TraceMessage.ADVAPI32(?,?,0000002B,?,?,NULL,0000000A,00000000), ref: 01006C5D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Direct$Element@$CriticalFindInfo@2@MessagePropertySectionTraceValue@Value@2@$AtomDescendent@Element@2@EnterH_prolog3_Host@LeaveLoadNativeRemove@String@@V12@V12@@
                                                                          • String ID: Checkbox$idChkBoxSearch$idChkBoxSetHomePage$idFeaturesCont$idProductListCont
                                                                          • API String ID: 2501247302-3429854558
                                                                          • Opcode ID: 4153eefac52b9abbf676dfddcff4d95607ed15e68bd8e8ad2b4ce932740ad836
                                                                          • Instruction ID: 2f4eeeb802b7e7a37a14a191ad2175f0456b7f652372a30653f2b7035d170561
                                                                          • Opcode Fuzzy Hash: 4153eefac52b9abbf676dfddcff4d95607ed15e68bd8e8ad2b4ce932740ad836
                                                                          • Instruction Fuzzy Hash: 0161F830A00216ABFB6BBBB5DD48BAD7AE5AF14340F0541D4EAC5A72D9CB39CD408F50
                                                                          APIs
                                                                          • memset.MSVCR80 ref: 010141AE
                                                                          • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020019,?), ref: 010141D9
                                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000208), ref: 010141FD
                                                                          • RegCloseKey.ADVAPI32(?), ref: 0101420B
                                                                          • wcscat_s.MSVCR80 ref: 01014226
                                                                          • wcscpy_s.MSVCR80 ref: 0101423F
                                                                          • LoadLibraryW.KERNEL32(?), ref: 0101424F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: CloseLibraryLoadOpenQueryValuememsetwcscat_swcscpy_s
                                                                          • String ID: InstallerLocation$SOFTWARE\Microsoft\Windows\CurrentVersion\Installer$\msi.dll$msi.dll
                                                                          • API String ID: 3826571250-3337234016
                                                                          • Opcode ID: b93aa61194f85a5e295c5fa3633998d0ec36e6f821ce7e7ada797f183a71aa1c
                                                                          • Instruction ID: e7a402fca11ff6e97eafee537c45a6f05cf2e59af719fdfca726a2adcf9cfe46
                                                                          • Opcode Fuzzy Hash: b93aa61194f85a5e295c5fa3633998d0ec36e6f821ce7e7ada797f183a71aa1c
                                                                          • Instruction Fuzzy Hash: 19213B72A00228AFDB21CB55EC4DEDAB7BCFB45310F440095F98DE7085DBB59A84CBA0
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 0100DB77
                                                                          • ?GetElement@NativeHWNDHost@DirectUI@@QAEPAVElement@2@XZ.UXCORE(00000008,0100F9E6,?,00000000), ref: 0100DB96
                                                                          • SysFreeString.OLEAUT32(00000000), ref: 0100DCC6
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: DirectElement@Element@2@FreeH_prolog3Host@NativeString
                                                                          • String ID: ProductInstallErrorCross$ProductInstallGreenCheck$ProductNameText$ProductNameTextInstalled
                                                                          • API String ID: 3502837760-1082744444
                                                                          • Opcode ID: 747e6466150a54a847940e5313cbc9099f1150340b29d8cb6787f7d1bb1e2fb1
                                                                          • Instruction ID: 460444cceb9f4f8a0c9b4fa495b0e4b4100cd96c7c7bdc1a3f6420ccccc00133
                                                                          • Opcode Fuzzy Hash: 747e6466150a54a847940e5313cbc9099f1150340b29d8cb6787f7d1bb1e2fb1
                                                                          • Instruction Fuzzy Hash: 4131E63064024AEBFB6B6FD8CD48F6D7EA2AF50740F048498F7C45A1E1CBB6C9409B61
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 01007533
                                                                          • GetModuleHandleW.KERNEL32(00000000,?,00000104,0000026C,0100777B,?), ref: 01007563
                                                                          • GetModuleFileNameW.KERNEL32(00000000), ref: 0100756A
                                                                          • free.MSVCR80 ref: 01007676
                                                                          Strings
                                                                          • InternalName, xrefs: 010075D2
                                                                          • "Not defined!", xrefs: 010075EC, 01007632
                                                                          • Name: %s, Version: %s, Language: %s, xrefs: 01007639
                                                                          • Failed to load version information from the resource. (hr = 0x%08x), xrefs: 010075A9
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Module$FileH_prolog3_HandleNamefree
                                                                          • String ID: "Not defined!"$Failed to load version information from the resource. (hr = 0x%08x)$InternalName$Name: %s, Version: %s, Language: %s
                                                                          • API String ID: 3143548698-4059656801
                                                                          • Opcode ID: cbab3780e8a25f20b3a3e81b748c3c48a2f37708b0307ea1dec3a86b67e69744
                                                                          • Instruction ID: 800949e0de888b3b4b04df70d34c68c84461ff3b66be47b7a167e636bea11cd9
                                                                          • Opcode Fuzzy Hash: cbab3780e8a25f20b3a3e81b748c3c48a2f37708b0307ea1dec3a86b67e69744
                                                                          • Instruction Fuzzy Hash: 15317071D046699BEF27EBA4CC88AEDB778AF14700F1041D6B5C9A21C0EBB55B88CF54
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 01014BCC
                                                                          • VariantInit.OLEAUT32(?), ref: 01014BFE
                                                                          • VariantClear.OLEAUT32(?), ref: 01014C47
                                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000008), ref: 01014C56
                                                                          • SysStringLen.OLEAUT32(?), ref: 01014C6E
                                                                          • SysFreeString.OLEAUT32(?), ref: 01014C7F
                                                                          • VariantClear.OLEAUT32(?), ref: 01014C89
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Variant$ClearString$ChangeFreeH_prolog3InitType
                                                                          • String ID: LaunchComponentId
                                                                          • API String ID: 1400348697-3941572156
                                                                          • Opcode ID: a2c8681d91920bbe7f845c4d8dec0658d5b4f0c916ea5efa35c601ea41d7af8e
                                                                          • Instruction ID: ef7fa628cb9d3a552248a8ca0adeddc041cca4eb48b692761d585aca36340dc0
                                                                          • Opcode Fuzzy Hash: a2c8681d91920bbe7f845c4d8dec0658d5b4f0c916ea5efa35c601ea41d7af8e
                                                                          • Instruction Fuzzy Hash: 5A21A07090024AAFDB11DFB8C948BDE7BF8AF19301F108094E584EB295DB76DA04CB60
                                                                          APIs
                                                                            • Part of subcall function 0100E9AF: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,0100EA1A), ref: 0100E9CE
                                                                            • Part of subcall function 0100F025: __EH_prolog3.LIBCMT ref: 0100F02C
                                                                            • Part of subcall function 0100F025: EnterCriticalSection.KERNEL32(00000000,00000000,010102F8,?,Module,00000022), ref: 0100F044
                                                                            • Part of subcall function 0100F025: LeaveCriticalSection.KERNEL32(00000000,00000000,00000000), ref: 0100F069
                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 01010222
                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 01010273
                                                                            • Part of subcall function 0100DF17: lstrlenW.KERNEL32(?), ref: 0100DF1F
                                                                            • Part of subcall function 0100DF17: memcpy_s.MSVCR80 ref: 0100DF36
                                                                          • lstrlenW.KERNEL32(00000022), ref: 010102C6
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: CriticalSection$Modulelstrlen$DeleteEnterFileH_prolog3HandleLeaveNamememcpy_s
                                                                          • String ID: "$Module$Module_Raw$REGISTRY
                                                                          • API String ID: 332685461-3881418485
                                                                          • Opcode ID: c351b8aa09a13ca807f1a00a270b5964c2643aec74d88fdae1cdfc293cc3a101
                                                                          • Instruction ID: d46999cc658952edaea7454df8a5fe132568ef7091b98177f4d0ba10c9127f31
                                                                          • Opcode Fuzzy Hash: c351b8aa09a13ca807f1a00a270b5964c2643aec74d88fdae1cdfc293cc3a101
                                                                          • Instruction Fuzzy Hash: 27515271A0022A9BDB61EBA4CC84AED73B8AF59200F4405E5F5C5E7149EA3D9FC4CF52
                                                                          APIs
                                                                            • Part of subcall function 0100E9AF: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,0100EA1A), ref: 0100E9CE
                                                                            • Part of subcall function 0100F025: __EH_prolog3.LIBCMT ref: 0100F02C
                                                                            • Part of subcall function 0100F025: EnterCriticalSection.KERNEL32(00000000,00000000,010102F8,?,Module,00000022), ref: 0100F044
                                                                            • Part of subcall function 0100F025: LeaveCriticalSection.KERNEL32(00000000,00000000,00000000), ref: 0100F069
                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 01010417
                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 01010468
                                                                            • Part of subcall function 0100DF17: lstrlenW.KERNEL32(?), ref: 0100DF1F
                                                                            • Part of subcall function 0100DF17: memcpy_s.MSVCR80 ref: 0100DF36
                                                                          • lstrlenW.KERNEL32(00000022), ref: 010104BB
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: CriticalSection$Modulelstrlen$DeleteEnterFileH_prolog3HandleLeaveNamememcpy_s
                                                                          • String ID: "$Module$Module_Raw$REGISTRY
                                                                          • API String ID: 332685461-3881418485
                                                                          • Opcode ID: cfa358debf78099171d65b9fc63a9b4aa20d5087ae44e40a0c9ddf0a0767442a
                                                                          • Instruction ID: a6aad74a2c5b9154bc058d32289d94a35c7a930bb73b25fd90c9e60d46a93487
                                                                          • Opcode Fuzzy Hash: cfa358debf78099171d65b9fc63a9b4aa20d5087ae44e40a0c9ddf0a0767442a
                                                                          • Instruction Fuzzy Hash: AD519471A0032A9BDB21EBA4DD849EE73BCAF58300F4405A5F5C5E7149DB399F84CB52
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 01010CC1
                                                                            • Part of subcall function 0100C55B: RegCreateKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000,?), ref: 0100C584
                                                                            • Part of subcall function 0100653B: __EH_prolog3.LIBCMT ref: 01006542
                                                                            • Part of subcall function 010106BB: SHGetValueW.SHLWAPI(?,00000000,?,00000000,00000000,?), ref: 010106E0
                                                                            • Part of subcall function 010106BB: SHGetValueW.SHLWAPI(?,00000000,?,00000000,00000000,00000000,?,00000000,00000000,?), ref: 01010714
                                                                            • Part of subcall function 010106BB: ??_V@YAXPAX@Z.MSVCR80(?,?,00000000,00000000,?), ref: 01010730
                                                                          • _wcsicmp.MSVCR80 ref: 01010DFA
                                                                          Strings
                                                                          • search.live.com, xrefs: 01010D95
                                                                          • Software\Microsoft\Internet Explorer\SearchScopes, xrefs: 01010DAA
                                                                          • Software\Microsoft\Internet Explorer, xrefs: 01010D09
                                                                          • DefaultScope, xrefs: 01010DC2
                                                                          • Version, xrefs: 01010D37
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: H_prolog3Value$Create_wcsicmp
                                                                          • String ID: DefaultScope$Software\Microsoft\Internet Explorer$Software\Microsoft\Internet Explorer\SearchScopes$Version$search.live.com
                                                                          • API String ID: 2459908085-109992249
                                                                          • Opcode ID: 39d4ce0c0504623c10ed6bcf8ed57d580ccf4a711cdf64ef239f728181f1044f
                                                                          • Instruction ID: da91692fbf1bbc0728a7f2577692d3937b43c81839a1a500042604c73adfadcd
                                                                          • Opcode Fuzzy Hash: 39d4ce0c0504623c10ed6bcf8ed57d580ccf4a711cdf64ef239f728181f1044f
                                                                          • Instruction Fuzzy Hash: 7841B47190015AAAEF22EBE9CD54AEEBBB4AF29320F100159F2D1B32C5DB750A44C765
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 01010B38
                                                                            • Part of subcall function 0100C55B: RegCreateKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000,?), ref: 0100C584
                                                                            • Part of subcall function 0100653B: __EH_prolog3.LIBCMT ref: 01006542
                                                                            • Part of subcall function 010106BB: SHGetValueW.SHLWAPI(?,00000000,?,00000000,00000000,?), ref: 010106E0
                                                                            • Part of subcall function 010106BB: SHGetValueW.SHLWAPI(?,00000000,?,00000000,00000000,00000000,?,00000000,00000000,?), ref: 01010714
                                                                            • Part of subcall function 010106BB: ??_V@YAXPAX@Z.MSVCR80(?,?,00000000,00000000,?), ref: 01010730
                                                                          • RegSetValueExW.ADVAPI32(?,Version,00000000,00000004,?,00000004,search.live.com,?), ref: 01010C62
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Value$H_prolog3$Create
                                                                          • String ID: DefaultScope$Software\Microsoft\Internet Explorer$Software\Microsoft\Internet Explorer\SearchScopes$Version$search.live.com
                                                                          • API String ID: 120277328-109992249
                                                                          • Opcode ID: 95c97ba9765c4079a63bbdd3128ccb205dd6202ad9ffeadd15bc1b53c6cbd093
                                                                          • Instruction ID: 18264d3b9551ec9fb9b8377ce051fc4fd5f89498e1e5bf640c1f9694bde7e341
                                                                          • Opcode Fuzzy Hash: 95c97ba9765c4079a63bbdd3128ccb205dd6202ad9ffeadd15bc1b53c6cbd093
                                                                          • Instruction Fuzzy Hash: 8F419370D1125AAAEF22EBA8CD54AEEBBB4EF29710F100159F2D1B22C4D7750744CBA5
                                                                          APIs
                                                                          • ?GetElement@NativeHWNDHost@DirectUI@@QAEPAVElement@2@XZ.UXCORE ref: 0100D3F0
                                                                          • ?StrToID@DirectUI@@YGGPB_W@Z.UXCORE(idProductListCont,00000000), ref: 0100D400
                                                                            • Part of subcall function 0100C2F9: ?FindDescendent@Element@DirectUI@@QAEPAV12@G@Z.UXCORE(00000000,?,00000000,?,01012820,00000000,?,01012C67,00000000,?,01004488,?,00000009,Direct UI window,DUI Window Frame,00000001), ref: 0100C30C
                                                                          • ?Add@Element@DirectUI@@QAEJPAV12@@Z.UXCORE(?,?), ref: 0100D496
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Direct$Element@$Add@Descendent@Element@2@FindHost@NativeV12@V12@@
                                                                          • String ID: ProductLine$ProductNameText$UnlaunchableProductNameText$idProductListCont
                                                                          • API String ID: 2886039252-2033342440
                                                                          • Opcode ID: 381874d1a4e7aa9c4f63e340bc0acaab1d3c72144bc70de579f6a65152f097cc
                                                                          • Instruction ID: 48333047e8f2e7f5581505fc6d3df2c11f652f343825d3b2a55e7844625f4102
                                                                          • Opcode Fuzzy Hash: 381874d1a4e7aa9c4f63e340bc0acaab1d3c72144bc70de579f6a65152f097cc
                                                                          • Instruction Fuzzy Hash: CA219831240146ABBF23BFD9D8C88ED7BA5AB40250F15C47DFAC5861D0DE719A85C762
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 0101074C
                                                                            • Part of subcall function 0100C5B0: RegOpenKeyExW.ADVAPI32(?,?,00000000,?,00000000), ref: 0100C5CC
                                                                          Strings
                                                                          • Software\Microsoft\Internet Explorer\International, xrefs: 0101076E
                                                                          • AcceptLanguage, xrefs: 010107A6
                                                                          • Start Page, xrefs: 010107FD
                                                                          • Software\Microsoft\Internet Explorer\Main, xrefs: 010107E3
                                                                          • http://go.microsoft.com/fwlink/?linkid=677, xrefs: 010107C5
                                                                          • http://runonce.msn.com/?v=msgrv75, xrefs: 010107BE
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: H_prolog3Open
                                                                          • String ID: AcceptLanguage$Software\Microsoft\Internet Explorer\International$Software\Microsoft\Internet Explorer\Main$Start Page$http://go.microsoft.com/fwlink/?linkid=677$http://runonce.msn.com/?v=msgrv75
                                                                          • API String ID: 94179280-3469362327
                                                                          • Opcode ID: 5494531869df0e860775eec5cea18b9b608a1a2ca1933ceeb8e5fc5e7f4d8457
                                                                          • Instruction ID: b03cea58fb13dbe64b95bf04508e058527b1d262e75d1e3db3d68a84c6778d1e
                                                                          • Opcode Fuzzy Hash: 5494531869df0e860775eec5cea18b9b608a1a2ca1933ceeb8e5fc5e7f4d8457
                                                                          • Instruction Fuzzy Hash: 8721C870E5122B9AFB22EB98CD859FE7A74BF20B10F100569B1D0F61C8DA784784CBD1
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 0101485A
                                                                          • CompareStringW.KERNEL32(00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,?,0000001C), ref: 010148BC
                                                                          • CompareStringW.KERNEL32(00000000,00000001,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 010148D1
                                                                          • CompareStringW.KERNEL32(00000000,00000001,?), ref: 010148E6
                                                                          • SysFreeString.OLEAUT32(?), ref: 010148FE
                                                                          • SysFreeString.OLEAUT32(00000000), ref: 01014903
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: String$Compare$Free$H_prolog3
                                                                          • String ID: W
                                                                          • API String ID: 1418015357-655174618
                                                                          • Opcode ID: e39bde786cc5e509e910243a1f7bee8366021e46218f773fdf9285fc12366a50
                                                                          • Instruction ID: 47f769c8fea87ae1cb678e69320621dc2ceae8e0eda54b62641d1dfb7c34f609
                                                                          • Opcode Fuzzy Hash: e39bde786cc5e509e910243a1f7bee8366021e46218f773fdf9285fc12366a50
                                                                          • Instruction Fuzzy Hash: 68217C7190029AEBCF228F99CC84DAFBFB5FF49310F104429F694A71A4C7798A54CB60
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: swprintf_s$QueryValuefree
                                                                          • String ID: 040904B0$\StringFileInfo\%04X%04X\%s$\StringFileInfo\%s\%s
                                                                          • API String ID: 58640916-2735271439
                                                                          • Opcode ID: 10e1db9037010f63f168c616480a7b0505c72547c66df70d44e3b384dd55806d
                                                                          • Instruction ID: 9121654ffcc31185a179aebdb9a7bae6dd74d00202f9eb81be755d9591a0e984
                                                                          • Opcode Fuzzy Hash: 10e1db9037010f63f168c616480a7b0505c72547c66df70d44e3b384dd55806d
                                                                          • Instruction Fuzzy Hash: 93214175600218EBEB22DB15DC41FEA77B8EB49701F0441E6B6C9EA0C0DB75EA488F61
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 01007248
                                                                          • GetCurrentProcess.KERNEL32(00000008,?,00000010,01007323,?,?,00000004,010076E9,?), ref: 0100726C
                                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 01007273
                                                                          • GetTokenInformation.ADVAPI32(?,0000000A(TokenIntegrityLevel),00000000,00000000,?), ref: 01007292
                                                                          • GetTokenInformation.ADVAPI32(00000002,0000000A(TokenIntegrityLevel),00000000,?,?), ref: 010072B0
                                                                          • ??_V@YAXPAX@Z.MSVCR80(00000000,?,-%08x%08x,?,?), ref: 010072D3
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Token$InformationProcess$CurrentH_prolog3Open
                                                                          • String ID: -%08x%08x
                                                                          • API String ID: 3011079919-1460627869
                                                                          • Opcode ID: 094dca7fcef6272655e9c9468c71074463a0339e4279d3ced7844b622b4b0cbd
                                                                          • Instruction ID: 14013fa25340ebc3f15318e562f0247be2727f88028aed6a1f8695add1c8e3b5
                                                                          • Opcode Fuzzy Hash: 094dca7fcef6272655e9c9468c71074463a0339e4279d3ced7844b622b4b0cbd
                                                                          • Instruction Fuzzy Hash: 14111A71D0021AAFEB52EFA4CC84DEFBBB9FF54300F108429F685A7190D6359A41CBA0
                                                                          APIs
                                                                            • Part of subcall function 0100E200: lstrcmpiW.KERNEL32(?), ref: 0100E26E
                                                                          • lstrlenW.KERNEL32(?), ref: 0100F184
                                                                          • CharNextW.USER32(00000000), ref: 0100F1C6
                                                                          • CharNextW.USER32(00000000), ref: 0100F1DE
                                                                          • HRESULT_FROM_WIN32.COMSUPP ref: 0100F3A4
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: CharNext$lstrcmpilstrlen
                                                                          • String ID:
                                                                          • API String ID: 1051761657-0
                                                                          • Opcode ID: f007392dcc0b97368795c7c681e3556136bea518257d0dca415f9f8329e6f00c
                                                                          • Instruction ID: e78cf0f7e787b2a388ba4b1afe683e8f8685b0032c1eda716b136b0a6e7556b7
                                                                          • Opcode Fuzzy Hash: f007392dcc0b97368795c7c681e3556136bea518257d0dca415f9f8329e6f00c
                                                                          • Instruction Fuzzy Hash: 1491827190021ADBEB36DF64CC49AEDB7B4EB68310F0044EAE789A3180D7749E95DF91
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Initialize__p__commode__p__fmode__set_app_type__setdefaultprecision__setusermatherr_configthreadlocale_encode_pointer
                                                                          • String ID:
                                                                          • API String ID: 2053481123-0
                                                                          • Opcode ID: a64e5e51e68daed2df3a5083e8c40796ea4e3333eb65bcf129c351e50eebb4d4
                                                                          • Instruction ID: df229489038c4b23ceb219302f4a03fdef434e820d14513628d8968e227b3bf0
                                                                          • Opcode Fuzzy Hash: a64e5e51e68daed2df3a5083e8c40796ea4e3333eb65bcf129c351e50eebb4d4
                                                                          • Instruction Fuzzy Hash: 6C21DE74A05241CFEB6B9F68E44C6A837A0FB09362F15856AF1D5872D9DB7E8484CB01
                                                                          APIs
                                                                          • __EH_prolog3_GS.LIBCMT ref: 0100EA6F
                                                                          • lstrlenW.KERNEL32(?,00000058,0100FD43,?,?), ref: 0100EA93
                                                                          • CoTaskMemFree.OLE32(00000000), ref: 0100EAAF
                                                                          • CharNextW.USER32(00000000), ref: 0100EADC
                                                                          • CharNextW.USER32(?,00000000), ref: 0100EB3A
                                                                          • CharNextW.USER32(?,?,00000000), ref: 0100EB55
                                                                          • CoTaskMemFree.OLE32(?), ref: 0100EB73
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: CharNext$FreeTask$H_prolog3_lstrlen
                                                                          • String ID:
                                                                          • API String ID: 416358153-0
                                                                          • Opcode ID: 0b2cc8b0ca95ee9ccc828c56ca36c7ebe43c033411923d3d826cb913160ee5f3
                                                                          • Instruction ID: 77407f147547ef54938decaa461d41fac9caa3732f36381b43ef8ca3cf38b2ec
                                                                          • Opcode Fuzzy Hash: 0b2cc8b0ca95ee9ccc828c56ca36c7ebe43c033411923d3d826cb913160ee5f3
                                                                          • Instruction Fuzzy Hash: BD313E709046059BFB26AFA8CC44AAEBBF4FF54300F14485DE5C6BB2D5DB7499808B64
                                                                          APIs
                                                                          • ?GetElement@NativeHWNDHost@DirectUI@@QAEPAVElement@2@XZ.UXCORE ref: 0100DA52
                                                                          • ?StrToID@DirectUI@@YGGPB_W@Z.UXCORE(idProgress,00000000), ref: 0100DA62
                                                                            • Part of subcall function 0100C421: ?FindDescendent@Element@DirectUI@@QAEPAV12@G@Z.UXCORE(?), ref: 0100C434
                                                                          • ?RMLoadCompoundString@@YGIIPA_WIKPB_W@Z.UXCORE(00000219,?,00000104,0000000F,00000000), ref: 0100DAAE
                                                                          • ?RMLoadCompoundString@@YGIIPA_WIKPB_W@Z.UXCORE(000001FC,?,00000104,0000000F,00000000), ref: 0100DB14
                                                                            • Part of subcall function 0100D225: _vsnwprintf.MSVCR80 ref: 0100D258
                                                                            • Part of subcall function 0100CFBA: ?GetElement@NativeHWNDHost@DirectUI@@QAEPAVElement@2@XZ.UXCORE ref: 0100CFC2
                                                                            • Part of subcall function 0100CFBA: ?StrToID@DirectUI@@YGGPB_W@Z.UXCORE(?,00000000), ref: 0100CFCC
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Direct$Element@$CompoundElement@2@Host@LoadNativeString@@$Descendent@FindV12@_vsnwprintf
                                                                          • String ID: idProgress$idProgressText
                                                                          • API String ID: 1622879431-3864566807
                                                                          • Opcode ID: 5ca6dc815ab63f4628eb3ca0176669c1f24df00391b79aee8dd3d173367796a8
                                                                          • Instruction ID: 9248abb560470032c29b498042893fc5111e7cdd0c223232870edfb5f12c8365
                                                                          • Opcode Fuzzy Hash: 5ca6dc815ab63f4628eb3ca0176669c1f24df00391b79aee8dd3d173367796a8
                                                                          • Instruction Fuzzy Hash: B73192B560021EABFB229BD4DC44FFA77BDAB45310F1041B5AA49E7181EA34DE858B70
                                                                          APIs
                                                                          • __EH_prolog3_catch_GS.LIBCMT ref: 0100FE83
                                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000002), ref: 0100FECA
                                                                          • FindResourceW.KERNEL32(00000000,?,?), ref: 0100FEF5
                                                                          • FreeLibrary.KERNEL32(?), ref: 0100FFE4
                                                                            • Part of subcall function 0100CC3F: GetLastError.KERNEL32(01006B35,?,01001808,?,?), ref: 0100CC3F
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Library$ErrorFindFreeH_prolog3_catch_LastLoadResource
                                                                          • String ID:
                                                                          • API String ID: 724505223-0
                                                                          • Opcode ID: 2a255d419a8cd9764f616e2a3f2f23f461e79bb551b7f378d87156cb290651a7
                                                                          • Instruction ID: f8d4d4d37ea8e13076e32b856f19b572d4baa903ea9adfc10e0173d023539797
                                                                          • Opcode Fuzzy Hash: 2a255d419a8cd9764f616e2a3f2f23f461e79bb551b7f378d87156cb290651a7
                                                                          • Instruction Fuzzy Hash: 884144B090012DDBEB329F64CC44ADDBBB5AF49704F5044D9E289A3181DB754EC1DFA4
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 0100B625
                                                                            • Part of subcall function 010049DE: TraceMessage.ADVAPI32(?,?,0000002B,?,?,00000000), ref: 010049F3
                                                                          • SysFreeString.OLEAUT32(?), ref: 0100B888
                                                                            • Part of subcall function 0100ACC8: EnterCriticalSection.KERNEL32(0101A968), ref: 0100ACDE
                                                                            • Part of subcall function 0100ACC8: LeaveCriticalSection.KERNEL32(0101A968), ref: 0100ACFB
                                                                            • Part of subcall function 01014BC5: __EH_prolog3.LIBCMT ref: 01014BCC
                                                                            • Part of subcall function 01014BC5: VariantInit.OLEAUT32(?), ref: 01014BFE
                                                                            • Part of subcall function 01014BC5: VariantClear.OLEAUT32(?), ref: 01014C47
                                                                            • Part of subcall function 01014BC5: VariantChangeType.OLEAUT32(?,?,00000000,00000008), ref: 01014C56
                                                                            • Part of subcall function 01014BC5: SysStringLen.OLEAUT32(?), ref: 01014C6E
                                                                            • Part of subcall function 01014BC5: SysFreeString.OLEAUT32(?), ref: 01014C7F
                                                                            • Part of subcall function 01014BC5: VariantClear.OLEAUT32(?), ref: 01014C89
                                                                          • SysFreeString.OLEAUT32 ref: 0100B883
                                                                          • SysFreeString.OLEAUT32(?), ref: 0100B8C2
                                                                          • SysFreeString.OLEAUT32(00000000), ref: 0100B8DF
                                                                          • SysFreeString.OLEAUT32(?), ref: 0100B8E4
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: String$Free$Variant$ClearCriticalH_prolog3Section$ChangeEnterInitLeaveMessageTraceType
                                                                          • String ID:
                                                                          • API String ID: 2015058421-0
                                                                          • Opcode ID: 4d7cddfe775398383c88e6911047bbf7a5b6bb33b1ea23626f0e8af9ac970301
                                                                          • Instruction ID: baaabb00d1101bfc5f673f8e96fd8f20d2257b82d0e0d4b1ae0f655628e2b70b
                                                                          • Opcode Fuzzy Hash: 4d7cddfe775398383c88e6911047bbf7a5b6bb33b1ea23626f0e8af9ac970301
                                                                          • Instruction Fuzzy Hash: 31A12D74E0025AEFEF16DFA8C984AEDBBB5BF48300F144499E584F72A1C7799941CB60
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 0100665D
                                                                          • CommandLineToArgvW.SHELL32(?,?,00000014,01006813,00000000), ref: 0100669F
                                                                          • LocalFree.KERNEL32(00000000,?,?), ref: 010067B5
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: ArgvCommandFreeH_prolog3LineLocal
                                                                          • String ID: W
                                                                          • API String ID: 646583325-655174618
                                                                          • Opcode ID: c6e531c2e11936415607fb09a72066b7f559ed272eace614d8533ada9af4e8f0
                                                                          • Instruction ID: c2037d6ca735e8c2fcf5abfbf6f588a1479a6db5a6e75aec73436c4836c6c77c
                                                                          • Opcode Fuzzy Hash: c6e531c2e11936415607fb09a72066b7f559ed272eace614d8533ada9af4e8f0
                                                                          • Instruction Fuzzy Hash: DF41447090020BABEF06EFA4CC94AFE7BB6BF14350F144429F596A72C4DB359A54CB61
                                                                          APIs
                                                                          • ?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ.UXCORE ref: 0100ED96
                                                                          • GetWindowPlacement.USER32(?,?), ref: 0100EE09
                                                                          • OffsetRect.USER32(?,?,?), ref: 0100EE48
                                                                          • SetWindowPlacement.USER32(?,0000002C), ref: 0100EE71
                                                                            • Part of subcall function 010049DE: TraceMessage.ADVAPI32(?,?,0000002B,?,?,00000000), ref: 010049F3
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: PlacementWindow$D__@@DirectHost@MessageNativeOffsetRectTrace
                                                                          • String ID: ,
                                                                          • API String ID: 2422741864-3772416878
                                                                          • Opcode ID: d3990d08e9713a60291aa3fb01dcc106f6649d26d8794f03157c310cebab1159
                                                                          • Instruction ID: 151ea1f11fd12e3433d2786e5b73943f56fb14e63ea05fbf54b584d2d45c1a03
                                                                          • Opcode Fuzzy Hash: d3990d08e9713a60291aa3fb01dcc106f6649d26d8794f03157c310cebab1159
                                                                          • Instruction Fuzzy Hash: C1411671A00249AFEF56DFA8C984AAEBFB5FF08300F0044A9EA44F7295D735D904CB50
                                                                          APIs
                                                                            • Part of subcall function 0100CE8D: ?GetElement@NativeHWNDHost@DirectUI@@QAEPAVElement@2@XZ.UXCORE(0100D2E1), ref: 0100CE90
                                                                            • Part of subcall function 0100CE8D: ?StrToID@DirectUI@@YGGPB_W@Z.UXCORE(00000000), ref: 0100CEA1
                                                                          • ?StrToID@DirectUI@@YGGPB_W@Z.UXCORE(idAppToCloseList,00000000), ref: 0100D2E7
                                                                            • Part of subcall function 0100C2F9: ?FindDescendent@Element@DirectUI@@QAEPAV12@G@Z.UXCORE(00000000,?,00000000,?,01012820,00000000,?,01012C67,00000000,?,01004488,?,00000009,Direct UI window,DUI Window Frame,00000001), ref: 0100C30C
                                                                          • ?DestroyAll@Element@DirectUI@@QAEJXZ.UXCORE(?,00000000), ref: 0100D307
                                                                          • ?Add@Element@DirectUI@@QAEJPAV12@@Z.UXCORE(?,00000000), ref: 0100D35F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Direct$Element@$Add@All@Descendent@DestroyElement@2@FindHost@NativeV12@V12@@
                                                                          • String ID: FileInUseProcess$idAppToCloseList
                                                                          • API String ID: 3525022571-2046938704
                                                                          • Opcode ID: e9966d58a17102918ce4b63c731e4e87e7c69f47d073d851fb94f02b8b8963e1
                                                                          • Instruction ID: 7ac993181683e2e9e9251bc9cd7b45801f5b3eed484b9137fd60986efe64c7a8
                                                                          • Opcode Fuzzy Hash: e9966d58a17102918ce4b63c731e4e87e7c69f47d073d851fb94f02b8b8963e1
                                                                          • Instruction Fuzzy Hash: 0B31E835A00215EFE7179FE8C584E6DB7B5BF44314F0181A9FA81A72D1C7359D00DBA0
                                                                          APIs
                                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 01015612
                                                                          • MonitorFromRect.USER32(?,00000002), ref: 0101561B
                                                                          • memset.MSVCR80 ref: 0101562F
                                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 01015643
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: InfoMonitor$FromParametersRectSystemmemset
                                                                          • String ID: (
                                                                          • API String ID: 3123987128-3887548279
                                                                          • Opcode ID: d741c6c5a155b698c32bf338a5ede82430338b792feffbcae73892928b839b31
                                                                          • Instruction ID: e2bdba4887ad33cabea078026ad4d5b052aeca5d00e6cca63a21410aeef5ad0a
                                                                          • Opcode Fuzzy Hash: d741c6c5a155b698c32bf338a5ede82430338b792feffbcae73892928b839b31
                                                                          • Instruction Fuzzy Hash: 1311C872A01704A7E721DF999C45F9F77BDAF8A710F444015BE40AF184D7B6E9048790
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 0101083F
                                                                            • Part of subcall function 0101054D: __EH_prolog3.LIBCMT ref: 01010554
                                                                            • Part of subcall function 01004CF1: wcsstr.MSVCR80 ref: 01004D14
                                                                          • _wcsicmp.MSVCR80 ref: 010108C2
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: H_prolog3$_wcsicmpwcsstr
                                                                          • String ID: http://go.microsoft.com/fwlink/?linkid=677$live.com$msn
                                                                          • API String ID: 833426062-580272
                                                                          • Opcode ID: c04370721e553d7787d839864517dacf586274b057958e95ec4922c90dabcd1f
                                                                          • Instruction ID: 54811ff9200b1456d5c1b90e5079fdb4b0822ae782a457391fb1bf4a4d5d780a
                                                                          • Opcode Fuzzy Hash: c04370721e553d7787d839864517dacf586274b057958e95ec4922c90dabcd1f
                                                                          • Instruction Fuzzy Hash: 8011A03190010AAAEB16EBB5CD40FEE7364AF21330F144619FAE1A71C5DF7466848665
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 0100978A
                                                                            • Part of subcall function 010096D9: __EH_prolog3.LIBCMT ref: 010096E0
                                                                          • SysFreeString.OLEAUT32(?), ref: 0100988D
                                                                          • SysFreeString.OLEAUT32(?), ref: 01009892
                                                                          • SysFreeString.OLEAUT32(?), ref: 010098C4
                                                                          • SysFreeString.OLEAUT32(?), ref: 010098C9
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: FreeString$H_prolog3
                                                                          • String ID:
                                                                          • API String ID: 3629739108-0
                                                                          • Opcode ID: e02a6200ded8b7db9cc0e8026aa6b0f8f69c1fd2eb10aab8edaad185103c5dfa
                                                                          • Instruction ID: 48c2d3afbd75c128bde8091f1f95c1a2f5d87b1d543480c31fda6a5090f94283
                                                                          • Opcode Fuzzy Hash: e02a6200ded8b7db9cc0e8026aa6b0f8f69c1fd2eb10aab8edaad185103c5dfa
                                                                          • Instruction Fuzzy Hash: 9A510F71D0024ADFDF02DFD8C9849EEBBB5BF48304F2444A9E249EB291C7359A46DB61
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: CharNext
                                                                          • String ID:
                                                                          • API String ID: 3213498283-0
                                                                          • Opcode ID: b3424546fbc53943c34953f7ae7028372be4bc65b3d5d4b3abee321f92e1d46b
                                                                          • Instruction ID: 16616e433eb240b509ac8e50b31b0acdb8d5149847edf7b3a836d46a9280c1bd
                                                                          • Opcode Fuzzy Hash: b3424546fbc53943c34953f7ae7028372be4bc65b3d5d4b3abee321f92e1d46b
                                                                          • Instruction Fuzzy Hash: A631AD70600202DBFB279F28C884A6ABBE5EF55355F614C68E8C2E72D2EB70D891C750
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 010095AA
                                                                          • GetCommandLineW.KERNEL32 ref: 010095FC
                                                                          • CoCreateInstance.OLE32(01001DDC,00000000,00000017,01001E3C), ref: 0100962B
                                                                          • GetCurrentProcessId.KERNEL32(?,?), ref: 0100966F
                                                                          • SysFreeString.OLEAUT32(?), ref: 010096C5
                                                                            • Part of subcall function 010049DE: TraceMessage.ADVAPI32(?,?,0000002B,?,?,00000000), ref: 010049F3
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: CommandCreateCurrentFreeH_prolog3InstanceLineMessageProcessStringTrace
                                                                          • String ID:
                                                                          • API String ID: 631387903-0
                                                                          • Opcode ID: dd798d488336b5684a717e138d2c436395bdac2780f2e75ecb861d8dbafbc93f
                                                                          • Instruction ID: 44c6bbda73d8c30009d73df1ae5140f96420e134551cff5f5282a8c3a6a66a6a
                                                                          • Opcode Fuzzy Hash: dd798d488336b5684a717e138d2c436395bdac2780f2e75ecb861d8dbafbc93f
                                                                          • Instruction Fuzzy Hash: 99314770600245EFFB679B58DE44F6A7BA6BB08308F060484F784AB1E6C77AC910CB54
                                                                          APIs
                                                                          • __EH_prolog3_catch.LIBCMT ref: 0100EF01
                                                                          • lstrlenW.KERNEL32(00000000,00000024,0100F066,00000000,00000000), ref: 0100EF23
                                                                          • lstrlenW.KERNEL32(00000000), ref: 0100EF69
                                                                          • ??_V@YAXPAX@Z.MSVCR80(?), ref: 0100EFFD
                                                                          • ??_V@YAXPAX@Z.MSVCR80(?,?), ref: 0100F005
                                                                            • Part of subcall function 0100DF4D: memcpy_s.MSVCR80 ref: 0100DF5E
                                                                            • Part of subcall function 0100EBAB: _recalloc.MSVCR80(?,?,00000004), ref: 0100EBC3
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: lstrlen$H_prolog3_catch_recallocmemcpy_s
                                                                          • String ID:
                                                                          • API String ID: 866230722-0
                                                                          • Opcode ID: bde39072cdf66372d12632a768744ff009ee50771f33cca111ec82214d9dc2e7
                                                                          • Instruction ID: 4a05fd8a4a72c2b3ad31ae83afca6777715ace8a1ed717b12051f600431f0c05
                                                                          • Opcode Fuzzy Hash: bde39072cdf66372d12632a768744ff009ee50771f33cca111ec82214d9dc2e7
                                                                          • Instruction Fuzzy Hash: EC314872D0120AEFEF16DFA8D8018EEFBF4BF48300F14842AE685B6190DA358641DB65
                                                                          APIs
                                                                            • Part of subcall function 0100CE8D: ?GetElement@NativeHWNDHost@DirectUI@@QAEPAVElement@2@XZ.UXCORE(0100D2E1), ref: 0100CE90
                                                                            • Part of subcall function 0100CE8D: ?StrToID@DirectUI@@YGGPB_W@Z.UXCORE(00000000), ref: 0100CEA1
                                                                          • ?RMLoadInt@@YGHIHKPB_W@Z.UXCORE(00000065,00000000,0000000F,00000000), ref: 0100D53C
                                                                          • ?UpdateAndGetDesiredSize@Element@DirectUI@@QAE?AUtagSIZE@@HH@Z.UXCORE(?,00000000,00007FFF), ref: 0100D557
                                                                          • SetRect.USER32(?,00000000,00000000,?,?), ref: 0100D576
                                                                          • AdjustWindowRectEx.USER32(?,00000000,?,?), ref: 0100D584
                                                                          • SetRect.USER32(?,00000000,00000000,?,?), ref: 0100D59A
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: DirectRect$Element@$AdjustDesiredElement@2@Host@Int@@LoadNativeSize@UpdateUtagWindow
                                                                          • String ID:
                                                                          • API String ID: 1809558269-0
                                                                          • Opcode ID: d3e138a6f4332dea81d1944166ee624c3c0e8700dc19a9ac083cc37b1f3bb87a
                                                                          • Instruction ID: 71f5b1d7fa40daee496e1b61813e65f8cd9f9a99bc4942fbb0048a46c1a82405
                                                                          • Opcode Fuzzy Hash: d3e138a6f4332dea81d1944166ee624c3c0e8700dc19a9ac083cc37b1f3bb87a
                                                                          • Instruction Fuzzy Hash: 8E112BB2600119AFE721EFA8CD84CBEB7ADEF88354B154569F946D7280CA75AD008B60
                                                                          APIs
                                                                          • SHAppBarMessage.SHELL32(00000005,?), ref: 010156D4
                                                                          • GetSystemMetrics.USER32(00000002), ref: 010156EC
                                                                          • IsRectEmpty.USER32(?), ref: 01015780
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: EmptyMessageMetricsRectSystem
                                                                          • String ID: $
                                                                          • API String ID: 2292397665-3993045852
                                                                          • Opcode ID: ab05f3a0025eb87d50b3fc758c4437df7dcce06cabbe2307c1029eec0a697a13
                                                                          • Instruction ID: 4c4c7ab558addff8e75fb91731318ce0bdb061bc492359218a73d0da22669bd5
                                                                          • Opcode Fuzzy Hash: ab05f3a0025eb87d50b3fc758c4437df7dcce06cabbe2307c1029eec0a697a13
                                                                          • Instruction Fuzzy Hash: A3413C7190120AEFCF14CFA8E9C59AEBBF4FB89314F24852DE595EB284D734A544CB50
                                                                          APIs
                                                                          • lstrlenA.KERNEL32(?), ref: 01006F32
                                                                          • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,?,00000001), ref: 01006F5F
                                                                          • GetLastError.KERNEL32(?,00000001), ref: 01006F6A
                                                                          • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,?,00000001), ref: 01006F83
                                                                          • MultiByteToWideChar.KERNEL32(?,00000000,?,?,?,?,?,00000001), ref: 01006FA9
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: ByteCharMultiWide$ErrorLastlstrlen
                                                                          • String ID:
                                                                          • API String ID: 3322701435-0
                                                                          • Opcode ID: 7792bc38fc12b54c15b8ff1acd53d2e74ddac52a1f7456f07dac181e9d35e7df
                                                                          • Instruction ID: 4d3a4669911ef874adf8f587f61e9c25e1d8e1e6141688ddc47703c6cb7bf9f3
                                                                          • Opcode Fuzzy Hash: 7792bc38fc12b54c15b8ff1acd53d2e74ddac52a1f7456f07dac181e9d35e7df
                                                                          • Instruction Fuzzy Hash: 11117236400128BBDF236F95CC44DEFBE6EEF457A0F118155F9889A150C7728A60DBE0
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 01011E4D
                                                                          • ?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ.UXCORE(00000000), ref: 01011EBF
                                                                          • GetWindowPlacement.USER32(00000000), ref: 01011EC6
                                                                            • Part of subcall function 01012579: ?OnMessage@NativeHWNDHost@DirectUI@@UAEJIIJAAJ@Z.UXCORE(?,?,?,?), ref: 010125A2
                                                                          • ?RMUpdateResourceSet@@YG_NPB_WK00@Z.UXCORE(01001AD0,00008002,00000000,00000000,?,00000034), ref: 01011F68
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: DirectHost@Native$D__@@H_prolog3K00@Message@PlacementResourceSet@@UpdateWindow
                                                                          • String ID:
                                                                          • API String ID: 315737454-0
                                                                          • Opcode ID: 0717c8a198e9a8660e710eff7bc540df8b7ce624521564a8d82b9d1c2acfc164
                                                                          • Instruction ID: 9d7d88f9932502133a2307076172d7e1aac97a1b4a88e38512fd186e791fb1cb
                                                                          • Opcode Fuzzy Hash: 0717c8a198e9a8660e710eff7bc540df8b7ce624521564a8d82b9d1c2acfc164
                                                                          • Instruction Fuzzy Hash: 71418D30900249AFEB6ADBA8D944AAE7BF5BF14300F104899FAC1D71A9C77DD901CB10
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 01009991
                                                                          • CoQueryProxyBlanket.OLE32(?,000000FF,000000FF,000000FF,00000000,00000000,00000000,?), ref: 010099C1
                                                                          • CoCopyProxy.OLE32(?,?,?,?,?,?,?,?,?,?,?,00000018), ref: 010099DA
                                                                          • CoSetProxyBlanket.OLE32(?,000000FF,000000FF,000000FF,?,?,00000000,00000800), ref: 01009A1E
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Proxy$Blanket$CopyH_prolog3Query
                                                                          • String ID:
                                                                          • API String ID: 3551063796-0
                                                                          • Opcode ID: 4275012548692d04ac906b5d7a63ab59788de7de78710f4831b239a1407e0ced
                                                                          • Instruction ID: 41903b7d7c64a8f5f21781c730ef36273c4b5e64886212cb6696ab2502826088
                                                                          • Opcode Fuzzy Hash: 4275012548692d04ac906b5d7a63ab59788de7de78710f4831b239a1407e0ced
                                                                          • Instruction Fuzzy Hash: C1311C71D0025AAFDF11DFA4C8848EEBBB8BB09314F144668E6A5F7291C7359E41CB60
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 01009A6E
                                                                          • CoQueryProxyBlanket.OLE32(?,000000FF,000000FF,000000FF,00000000,00000000,00000000,?), ref: 01009A9E
                                                                          • CoCopyProxy.OLE32(?,?,?,?,?,?,?,?,?,?,?,00000018), ref: 01009AB7
                                                                          • CoSetProxyBlanket.OLE32(?,000000FF,000000FF,000000FF,?,?,00000000,00000800), ref: 01009AFB
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Proxy$Blanket$CopyH_prolog3Query
                                                                          • String ID:
                                                                          • API String ID: 3551063796-0
                                                                          • Opcode ID: 172314b953b9a7d1b148d2341d32dd89e29b9efacd5a817cc37285bc3b44fd09
                                                                          • Instruction ID: be921c3d7fc8882958cd527e8d6fef1735bd3a2ad65cb2cbc1e46acedd93088f
                                                                          • Opcode Fuzzy Hash: 172314b953b9a7d1b148d2341d32dd89e29b9efacd5a817cc37285bc3b44fd09
                                                                          • Instruction Fuzzy Hash: 5B312D7190015AAFDF11DFD4C8848EEBBB9BB08364F544668E6A5F72A1C7358E01CB60
                                                                          APIs
                                                                          • ?GetElement@NativeHWNDHost@DirectUI@@QAEPAVElement@2@XZ.UXCORE ref: 0100CED4
                                                                          • ?StrToID@DirectUI@@YGGPB_W@Z.UXCORE(?,00000000), ref: 0100CEDC
                                                                            • Part of subcall function 0100C2F9: ?FindDescendent@Element@DirectUI@@QAEPAV12@G@Z.UXCORE(00000000,?,00000000,?,01012820,00000000,?,01012C67,00000000,?,01004488,?,00000009,Direct UI window,DUI Window Frame,00000001), ref: 0100C30C
                                                                          • ?RMLoadCompoundString@@YGIIPA_WIKPB_W@Z.UXCORE(?,?,00000104,0000000F,00000000,00000000), ref: 0100CF07
                                                                          • ?RMLoadString@@YGIIPA_WIKPB_W@Z.UXCORE(?,?,00000104,0000000F,00000000,00000000), ref: 0100CF0F
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Direct$Element@LoadString@@$CompoundDescendent@Element@2@FindHost@NativeV12@
                                                                          • String ID:
                                                                          • API String ID: 235335248-0
                                                                          • Opcode ID: 8987c8f1a83f541c045d08b56a6c6f6a1a15be3daeecaf62f12a828ff5882efe
                                                                          • Instruction ID: ad5c8f6db539d2950be04b08ad1a36d971ce72e0ce9874226a0ba5bcd37f306a
                                                                          • Opcode Fuzzy Hash: 8987c8f1a83f541c045d08b56a6c6f6a1a15be3daeecaf62f12a828ff5882efe
                                                                          • Instruction Fuzzy Hash: FA018471600119ABFB22EBA89908DFE77E8AB08304F1482A9F995D7181DA74DA058791
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 01007301
                                                                            • Part of subcall function 01007241: __EH_prolog3.LIBCMT ref: 01007248
                                                                            • Part of subcall function 01007241: GetCurrentProcess.KERNEL32(00000008,?,00000010,01007323,?,?,00000004,010076E9,?), ref: 0100726C
                                                                            • Part of subcall function 01007241: OpenProcessToken.ADVAPI32(00000000), ref: 01007273
                                                                            • Part of subcall function 01007241: GetTokenInformation.ADVAPI32(?,0000000A(TokenIntegrityLevel),00000000,00000000,?), ref: 01007292
                                                                            • Part of subcall function 01007241: GetTokenInformation.ADVAPI32(00000002,0000000A(TokenIntegrityLevel),00000000,?,?), ref: 010072B0
                                                                            • Part of subcall function 01007241: ??_V@YAXPAX@Z.MSVCR80(00000000,?,-%08x%08x,?,?), ref: 010072D3
                                                                          • CreateMutexW.KERNEL32(00000000,00000000,?,?,?,00000004,010076E9,?), ref: 01007343
                                                                          • GetLastError.KERNEL32 ref: 0100734F
                                                                          • CloseHandle.KERNEL32(00000000), ref: 0100735D
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Token$H_prolog3InformationProcess$CloseCreateCurrentErrorHandleLastMutexOpen
                                                                          • String ID:
                                                                          • API String ID: 2019100737-0
                                                                          • Opcode ID: 303ce21a44c0d8aebc3015fff0c757b230a7f6c70e55e9dc2f267ba040c18f33
                                                                          • Instruction ID: ae0a6d27d146b8f236d6626967311901c3c4471adb663e9ba840633361ef39d5
                                                                          • Opcode Fuzzy Hash: 303ce21a44c0d8aebc3015fff0c757b230a7f6c70e55e9dc2f267ba040c18f33
                                                                          • Instruction Fuzzy Hash: 8801F431900216ABEB13EBA0CC44BED3724BF20310F008415FAC5AA2C5CFB89A44CBA5
                                                                          APIs
                                                                          • ?GetHWND@NativeHWNDHost@DirectUI@@QAEPAUHWND__@@XZ.UXCORE ref: 0100C21D
                                                                          • PostMessageW.USER32(00000000,00000010,00000000,00000000), ref: 0100C233
                                                                          • GetCurrentThreadId.KERNEL32 ref: 0100C23D
                                                                          • PostThreadMessageW.USER32(00000000), ref: 0100C244
                                                                            • Part of subcall function 010049DE: TraceMessage.ADVAPI32(?,?,0000002B,?,?,00000000), ref: 010049F3
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Message$PostThread$CurrentD__@@DirectHost@NativeTrace
                                                                          • String ID:
                                                                          • API String ID: 3715929741-0
                                                                          • Opcode ID: b6d016e896c8c75157042b5b4444f27d541605c29e8083bd4ef0f24638bfe6ae
                                                                          • Instruction ID: ff4ca57f39e8e4e014842c23cb95a106e4c376755d47081b3510764b2937bba8
                                                                          • Opcode Fuzzy Hash: b6d016e896c8c75157042b5b4444f27d541605c29e8083bd4ef0f24638bfe6ae
                                                                          • Instruction Fuzzy Hash: 6CF0B431280240ABF7375B5AAE4CE573EA9EBD5752F064198F6C5C74D5CA79C400D720
                                                                          APIs
                                                                          • SysFreeString.OLEAUT32(00000000), ref: 0100B41B
                                                                          • SysFreeString.OLEAUT32(00000000), ref: 0100B60C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: FreeString
                                                                          • String ID: W
                                                                          • API String ID: 3341692771-655174618
                                                                          • Opcode ID: ddcb0aa506ad8cf4e00f3d258a11899f11b4f21955fd123008d8c1f1386de31b
                                                                          • Instruction ID: cb7ce2653f35779e91b58cf3547deb4d51cc3be3ba1d7766bdc9cb81a9597e04
                                                                          • Opcode Fuzzy Hash: ddcb0aa506ad8cf4e00f3d258a11899f11b4f21955fd123008d8c1f1386de31b
                                                                          • Instruction Fuzzy Hash: DC918C34200246EFFF679F69C944FAA7BA6FF04305F154498FA959B1A2C736DA10CB10
                                                                          APIs
                                                                          Strings
                                                                          • Software\Microsoft\Internet Explorer\SearchScopes, xrefs: 010109FB
                                                                          • URL, xrefs: 01010A31
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: H_prolog3
                                                                          • String ID: Software\Microsoft\Internet Explorer\SearchScopes$URL
                                                                          • API String ID: 431132790-2486629086
                                                                          • Opcode ID: 54afd7f4df248b2ffc78b6515565fb262a51a8e53f91164fa96bc0a2f1f73840
                                                                          • Instruction ID: 9c38dd2e8fadd8a17dd919fd0e821342de46d882e91d47f3a67dee6a598af425
                                                                          • Opcode Fuzzy Hash: 54afd7f4df248b2ffc78b6515565fb262a51a8e53f91164fa96bc0a2f1f73840
                                                                          • Instruction Fuzzy Hash: C3419371C0015FEEEF12EBA8C9809FEBB74AF24218F5442A8E5D1731D9DA790E84C761
                                                                          APIs
                                                                          • TraceMessage.ADVAPI32(?,?,0000002B,?,?,?,00000004,NULL,0000000A,NULL,0000000A,?,00000004,00000000), ref: 010090A9
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: MessageTrace
                                                                          • String ID: <NULL>$NULL
                                                                          • API String ID: 471583391-888386124
                                                                          • Opcode ID: 7f61009d283e2e659d21aaae52fd51ddf810fde100197fec68c1275282cdf7b1
                                                                          • Instruction ID: 1bd824c114ff281ebb640d63e436bdaea86dad4de0134852e8fd86047675794b
                                                                          • Opcode Fuzzy Hash: 7f61009d283e2e659d21aaae52fd51ddf810fde100197fec68c1275282cdf7b1
                                                                          • Instruction Fuzzy Hash: DF218E7260020A9FFB139F08CC04BAB77A5EB84718F058155FACD9B1D2E775DA958780
                                                                          APIs
                                                                          • TraceMessage.ADVAPI32(?,?,0000002B,?,?,NULL,0000000A,NULL,0000000A,?,00000004,00000000), ref: 0100C026
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: MessageTrace
                                                                          • String ID: <NULL>$NULL
                                                                          • API String ID: 471583391-888386124
                                                                          • Opcode ID: 3dabb59c0c737ac5d86dc2b061ef387e5db1db08990746514a7a3027db5af855
                                                                          • Instruction ID: 0a2519baf87128b75f511cef19ec07de9d536b0d010832b69b33b673ce49ba5c
                                                                          • Opcode Fuzzy Hash: 3dabb59c0c737ac5d86dc2b061ef387e5db1db08990746514a7a3027db5af855
                                                                          • Instruction Fuzzy Hash: 3721B33A60020B9AFB275E09C804BB677A5EF84710F158159FAC58B2D1E776DA91CB81
                                                                          APIs
                                                                          • TraceMessage.ADVAPI32(?,?,0000002B,?,?,NULL,0000000A,NULL,0000000A,00000000), ref: 01008EF0
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: MessageTrace
                                                                          • String ID: <NULL>$NULL
                                                                          • API String ID: 471583391-888386124
                                                                          • Opcode ID: 25287cbf3099a98601eb92512e40b54c5f3fcf20a72fa3fe7f59891d74479017
                                                                          • Instruction ID: 3e1f6e3ed8e97a7e0e0a9d76ee1d62a807deb9a7654bc221b2dccbd9d3a13181
                                                                          • Opcode Fuzzy Hash: 25287cbf3099a98601eb92512e40b54c5f3fcf20a72fa3fe7f59891d74479017
                                                                          • Instruction Fuzzy Hash: A0219F32E0028ADAFB275E0CCC04AB777A5FB80B50F04C056EAC54B2D0E7B4DE968780
                                                                          APIs
                                                                            • Part of subcall function 0101415E: memset.MSVCR80 ref: 010141AE
                                                                            • Part of subcall function 0101415E: RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020019,?), ref: 010141D9
                                                                            • Part of subcall function 0101415E: RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000208), ref: 010141FD
                                                                            • Part of subcall function 0101415E: RegCloseKey.ADVAPI32(?), ref: 0101420B
                                                                            • Part of subcall function 0101415E: wcscat_s.MSVCR80 ref: 01014226
                                                                            • Part of subcall function 0101415E: LoadLibraryW.KERNEL32(?), ref: 0101424F
                                                                          • GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 010143B9
                                                                          • FreeLibrary.KERNEL32(00000000), ref: 01014428
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Library$AddressCloseFreeLoadOpenProcQueryValuememsetwcscat_s
                                                                          • String ID: DllGetVersion
                                                                          • API String ID: 991360154-2861820592
                                                                          • Opcode ID: 994e11662d2aff298b4e85e6812ab885a5ba3e27a891f6aad952cc63365b3d27
                                                                          • Instruction ID: cfc15bdceb1a3b2f5e26467cd0a77b0ade2261a63c7bec05a53b44278c5f5d4f
                                                                          • Opcode Fuzzy Hash: 994e11662d2aff298b4e85e6812ab885a5ba3e27a891f6aad952cc63365b3d27
                                                                          • Instruction Fuzzy Hash: 8011EB32F80516ABDB56CFACD8005EF73B6FB80311B158078E982E7128DB78DD018790
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 010108F1
                                                                            • Part of subcall function 0100C55B: RegCreateKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000,?), ref: 0100C584
                                                                            • Part of subcall function 0100653B: __EH_prolog3.LIBCMT ref: 01006542
                                                                            • Part of subcall function 010106BB: SHGetValueW.SHLWAPI(?,00000000,?,00000000,00000000,?), ref: 010106E0
                                                                            • Part of subcall function 010106BB: SHGetValueW.SHLWAPI(?,00000000,?,00000000,00000000,00000000,?,00000000,00000000,?), ref: 01010714
                                                                            • Part of subcall function 010106BB: ??_V@YAXPAX@Z.MSVCR80(?,?,00000000,00000000,?), ref: 01010730
                                                                            • Part of subcall function 01010838: __EH_prolog3.LIBCMT ref: 0101083F
                                                                            • Part of subcall function 01010838: _wcsicmp.MSVCR80 ref: 010108C2
                                                                          Strings
                                                                          • Start Page, xrefs: 01010932
                                                                          • Software\Microsoft\Internet Explorer\Main, xrefs: 01010916
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: H_prolog3$Value$Create_wcsicmp
                                                                          • String ID: Software\Microsoft\Internet Explorer\Main$Start Page
                                                                          • API String ID: 1836341997-3913947842
                                                                          • Opcode ID: 52d59ec6db337541523abd7ad1308f1d8aadfef1d2fecfd2317ea0fac11e4637
                                                                          • Instruction ID: b4d91674ef57e47e30f6b6b160d0088a8d8e7d83e4a2c73a80cf8c836d60de57
                                                                          • Opcode Fuzzy Hash: 52d59ec6db337541523abd7ad1308f1d8aadfef1d2fecfd2317ea0fac11e4637
                                                                          • Instruction Fuzzy Hash: A3113B31D0015A9AFB12E7E8CD94EFFB6B4AF65310F500269E6D0B32C5DA740B40C7A1
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 0100F999
                                                                          • SysFreeString.OLEAUT32(00000000), ref: 0100FA1B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: FreeH_prolog3String
                                                                          • String ID: Installing
                                                                          • API String ID: 3825424854-2923966484
                                                                          • Opcode ID: a1aff59e95e1722283882704d4d5f88d6e493d5c5d098211c6458711e85d0406
                                                                          • Instruction ID: c37afc953943eb2493726deb7c0a7b6d7a0f79b7df069bb5bd5c85a460289856
                                                                          • Opcode Fuzzy Hash: a1aff59e95e1722283882704d4d5f88d6e493d5c5d098211c6458711e85d0406
                                                                          • Instruction Fuzzy Hash: 3011A571900207DFEB23EF68D8805EDB761BF95200F15847EE5C5AB2C1CB798A86EB51
                                                                          APIs
                                                                          • TraceMessage.ADVAPI32(?,?,0000002B,?,?,NULL,0000000A,00000008,00000004,?,00000004,00000000,?,01013482,6C744143,65637845), ref: 01012D5E
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: MessageTrace
                                                                          • String ID: <NULL>$NULL
                                                                          • API String ID: 471583391-888386124
                                                                          • Opcode ID: 1980b0b96b6713913cded659485a73495f8bb9013d15c650f2be3d607f3d296b
                                                                          • Instruction ID: 47febf38fc3df86a124bde3ab8ce4f5bbda223d54ad5add3293d6fd8b0bea2b9
                                                                          • Opcode Fuzzy Hash: 1980b0b96b6713913cded659485a73495f8bb9013d15c650f2be3d607f3d296b
                                                                          • Instruction Fuzzy Hash: 7B01A27260020AEBFB16BE48CC05FB73765EB94700F64C055FA855B1E9E7B8EA9083C1
                                                                          APIs
                                                                          • TraceMessage.ADVAPI32(?,?,0000002B,?,?,NULL,0000000A,?,00000004,00000000), ref: 01008F66
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: MessageTrace
                                                                          • String ID: <NULL>$NULL
                                                                          • API String ID: 471583391-888386124
                                                                          • Opcode ID: 8939b155df5251d13cbd5006e5e94e9137ab6b9bcc9f1b520cb0581d12cf794a
                                                                          • Instruction ID: 80b859377621651450f1c79f4c8cd24ec91a27224500144c5756cc1ca6af00b1
                                                                          • Opcode Fuzzy Hash: 8939b155df5251d13cbd5006e5e94e9137ab6b9bcc9f1b520cb0581d12cf794a
                                                                          • Instruction Fuzzy Hash: 35016232A4020AAAFB175E18CC15FB7376BFB94750F04C05AFB855A1D5D7B0DA918781
                                                                          APIs
                                                                          • TraceMessage.ADVAPI32(?,?,0000002B,?,?,?,00000004,NULL,0000000A,00000000), ref: 01008FD9
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: MessageTrace
                                                                          • String ID: <NULL>$NULL
                                                                          • API String ID: 471583391-888386124
                                                                          • Opcode ID: c7d6071a655c78495c48a96bf2576d9743c2710dbb788e9cb8cd38e5e491f908
                                                                          • Instruction ID: cc904351b8ef249ffd39a5b3e5007a4b42529226bea6dfb454dc9441b02c85b6
                                                                          • Opcode Fuzzy Hash: c7d6071a655c78495c48a96bf2576d9743c2710dbb788e9cb8cd38e5e491f908
                                                                          • Instruction Fuzzy Hash: 08016D72A4020AAAFB175E18CC01FB7376BFB84710F14C45AFB859B5D1D7B1DAA18781
                                                                          APIs
                                                                          • TraceMessage.ADVAPI32(?,?,0000002B,?,?,NULL,0000000A,00000000), ref: 01006C5D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: MessageTrace
                                                                          • String ID: <NULL>$NULL
                                                                          • API String ID: 471583391-888386124
                                                                          • Opcode ID: f3164116c202b094245bbc3fcf89ef5ca1fb80c82b3ebc915f3e450abbff13c8
                                                                          • Instruction ID: a1a337fd346edefb4187ada91714bd135d0cfade865ca6000f32359662baf7d6
                                                                          • Opcode Fuzzy Hash: f3164116c202b094245bbc3fcf89ef5ca1fb80c82b3ebc915f3e450abbff13c8
                                                                          • Instruction Fuzzy Hash: 00F0A431A0020EAAFF175E088C11FB73767EB96700F04C051FAC65A1D1DB72DBA18780
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 010063F4
                                                                          • ??2@YAPAXI@Z.MSVCR80(00000010,00000004,010066DE,?,?), ref: 0100641E
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1711926676.0000000001001000.00000020.00000001.01000000.00000004.sdmp, Offset: 01000000, based on PE: true
                                                                          • Associated: 0000000D.00000002.1711893677.0000000001000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1711971113.000000000101A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                          • Associated: 0000000D.00000002.1712011572.000000000101B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_1000000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: ??2@H_prolog3
                                                                          • String ID: W
                                                                          • API String ID: 1489479240-655174618
                                                                          • Opcode ID: 82752f92a90d20f1163ca764032c228d2ba1203ee7b64816ff18d370978619e8
                                                                          • Instruction ID: c52d2d7e637f1112538b85616935d98d4c50e68216f8356b20c1082d18deca0a
                                                                          • Opcode Fuzzy Hash: 82752f92a90d20f1163ca764032c228d2ba1203ee7b64816ff18d370978619e8
                                                                          • Instruction Fuzzy Hash: A70192B190020AAFEB12DF59C4809ECBBA2BF04220F85C56ED1999F2C1CB358605CF51
                                                                          APIs
                                                                          • IsDebuggerPresent.KERNEL32 ref: 703903F4
                                                                          • _crt_debugger_hook.MSVCR80(00000001), ref: 70390401
                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 70390409
                                                                          • UnhandledExceptionFilter.KERNEL32(7030C15C), ref: 70390414
                                                                          • _crt_debugger_hook.MSVCR80(00000001), ref: 70390425
                                                                          • GetCurrentProcess.KERNEL32(C0000409), ref: 70390430
                                                                          • TerminateProcess.KERNEL32(00000000), ref: 70390437
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterProcessUnhandled_crt_debugger_hook$CurrentDebuggerPresentTerminate
                                                                          • String ID:
                                                                          • API String ID: 3369434319-0
                                                                          • Opcode ID: d76168e55cde50843097b74e69ac2243648ccb328c7da457f17ee0a7972f6fe6
                                                                          • Instruction ID: a04e281d324d5fb59acc84f85d0663863b9f1b86575d00931577e31cd7876d50
                                                                          • Opcode Fuzzy Hash: d76168e55cde50843097b74e69ac2243648ccb328c7da457f17ee0a7972f6fe6
                                                                          • Instruction Fuzzy Hash: 4A21BEB6811204DFC705DF6ACC88F883BBDFB28304F60591AE509D63A4E7B059849F55
                                                                          APIs
                                                                          • ?GetSheetDependencies@PropertySheetW@DirectUI@@QAEXPAVElement@2@PBUPropertyInfo@2@PAUDepRecs@2@PAVDeferCycle@2@PAJ@Z.UXCORE(?,?,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 7033C693
                                                                            • Part of subcall function 70344107: ?_AddDependency@Element@DirectUI@@SGXPAV12@PBUPropertyInfo@2@HPAUDepRecs@2@PAVDeferCycle@2@PAJ@Z.UXCORE(00000000,00000000,00000002,00000000,00000000,00000000,00000000,?,7033C698,?,?,00000000,00000000,00000000,00000000,00000000), ref: 70344155
                                                                          • ?_AddDependency@Element@DirectUI@@SGXPAV12@PBUPropertyInfo@2@HPAUDepRecs@2@PAVDeferCycle@2@PAJ@Z.UXCORE(?,00000003,00000000,00000000,00000000,00000000), ref: 7033C6F3
                                                                          • ?_AddDependency@Element@DirectUI@@SGXPAV12@PBUPropertyInfo@2@HPAUDepRecs@2@PAVDeferCycle@2@PAJ@Z.UXCORE(?,00000002,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 7033C753
                                                                          • ?_AddDependency@Element@DirectUI@@SGXPAV12@PBUPropertyInfo@2@HPAUDepRecs@2@PAVDeferCycle@2@PAJ@Z.UXCORE(?,00000002,00000000,00000000,00000000,?,00000002,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 7033C767
                                                                          • ?GetSheetScope@PropertySheetW@DirectUI@@QAEXPAVElement@2@PAUDepRecs@2@PAVDeferCycle@2@PAJ@Z.UXCORE(?,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 7033C7EF
                                                                          • ?GetSheetScope@PropertySheetW@DirectUI@@QAEXPAVElement@2@PAUDepRecs@2@PAVDeferCycle@2@PAJ@Z.UXCORE(?,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 7033C80C
                                                                          • ?_AddDependency@Element@DirectUI@@SGXPAV12@PBUPropertyInfo@2@HPAUDepRecs@2@PAVDeferCycle@2@PAJ@Z.UXCORE(?,00000000,00000002,00000000,00000000,00000000), ref: 7033C845
                                                                          • ?_AddDependency@Element@DirectUI@@SGXPAV12@PBUPropertyInfo@2@HPAUDepRecs@2@PAVDeferCycle@2@PAJ@Z.UXCORE(?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 7033C8A5
                                                                          • ?_AddDependency@Element@DirectUI@@SGXPAV12@PBUPropertyInfo@2@HPAUDepRecs@2@PAVDeferCycle@2@PAJ@Z.UXCORE(00000000,?,00000002,00000000,00000000,00000000), ref: 7033C927
                                                                          • ?_AddDependency@Element@DirectUI@@SGXPAV12@PBUPropertyInfo@2@HPAUDepRecs@2@PAVDeferCycle@2@PAJ@Z.UXCORE(?,?,00000002,00000000,?,00000000), ref: 7033CB17
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Property$Cycle@2@DeferDirectRecs@2@$Info@2@$Dependency@Element@V12@$Sheet$Element@2@$Scope@$Dependencies@
                                                                          • String ID:
                                                                          • API String ID: 2226873572-0
                                                                          • Opcode ID: ff38139056d674bc46f3819e4122404b5cf397f27a40d820aca519acd33abc65
                                                                          • Instruction ID: 758b748bfc4c92716fadbe156d8c121296e49ed885cd803503bcbdc1e91472bc
                                                                          • Opcode Fuzzy Hash: ff38139056d674bc46f3819e4122404b5cf397f27a40d820aca519acd33abc65
                                                                          • Instruction Fuzzy Hash: 7CF16735610209AFEB05CF54C9D5FAEB7B9EF49310F918159F90A8B291DB30EE51CBA0
                                                                          APIs
                                                                          • CoCreateInstance.OLE32(7030C174,00000000,00000001,70301D64,?,?,7030C194,?,00000000), ref: 70314C91
                                                                          • StringFromGUID2.OLE32(?,?,00000040,703C177C), ref: 70314CD6
                                                                          • wcscpy_s.MSVCR80 ref: 70314CFA
                                                                            • Part of subcall function 703145D1: wcscat_s.MSVCR80 ref: 703145DF
                                                                          • wcscat_s.MSVCR80 ref: 70314D2A
                                                                            • Part of subcall function 703146C1: RegOpenKeyExW.ADVAPI32(00020019,?,00000000,80000000,00000000,00000080,?,?,70314D68,80000000,?,00020019), ref: 703146DD
                                                                          • RegDeleteKeyW.ADVAPI32(80000000,?), ref: 70314DB2
                                                                          • RegQueryInfoKeyW.ADVAPI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,80000000,?,00020019,00000000), ref: 70314D83
                                                                            • Part of subcall function 703146A3: RegCloseKey.ADVAPI32(?,?,703146EE,?,70314D68,80000000,?,00020019), ref: 703146B1
                                                                          • wcscpy_s.MSVCR80 ref: 70314DC5
                                                                          • wcscat_s.MSVCR80 ref: 70314DF5
                                                                          • RegQueryInfoKeyW.ADVAPI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,80000000,?,00020019,00000000), ref: 70314E37
                                                                          • RegDeleteKeyW.ADVAPI32(80000000,?), ref: 70314E5E
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: wcscat_s$DeleteInfoQuerywcscpy_s$CloseCreateFromInstanceOpenString
                                                                          • String ID: CLSID\$\Implemented Categories$\Required Categories
                                                                          • API String ID: 309610489-4092563799
                                                                          • Opcode ID: 58533cfb9a2c5b3f5202baede36ab41b87519068f095dadfb58ee4ced8294cad
                                                                          • Instruction ID: d230ee11175a50dc64d03e412f322ef798091870be1011716a7502f8781a87ce
                                                                          • Opcode Fuzzy Hash: 58533cfb9a2c5b3f5202baede36ab41b87519068f095dadfb58ee4ced8294cad
                                                                          • Instruction Fuzzy Hash: ED812D71901619AFEB259F55CC94ADEB7BEAF0A304F1000E9F649AA110FB709EC5CF61
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: memset$memmove
                                                                          • String ID:
                                                                          • API String ID: 3527438329-0
                                                                          • Opcode ID: 0b32f18372dd949814b821afb4eb554ca51af11651182e482c237f23e2752b70
                                                                          • Instruction ID: fc0c03228d81b74f921203b67b97511bbbd69b7f8a6d5ebf9733e43b883077fe
                                                                          • Opcode Fuzzy Hash: 0b32f18372dd949814b821afb4eb554ca51af11651182e482c237f23e2752b70
                                                                          • Instruction Fuzzy Hash: E9E1D872E0025AAFCF05CFB8CC85ADEBBB6AF49600F158559F845E7345D630AD46CBA0
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: memset$memmove
                                                                          • String ID:
                                                                          • API String ID: 3527438329-0
                                                                          • Opcode ID: 88a1d63c468b20078c29103663dfc6fcef05e920f0a0958b339107b8aee4725b
                                                                          • Instruction ID: a7c67c73367580dd4e9f3711b988ddcb7d051f23037c6c2b9822a18c29fb53fc
                                                                          • Opcode Fuzzy Hash: 88a1d63c468b20078c29103663dfc6fcef05e920f0a0958b339107b8aee4725b
                                                                          • Instruction Fuzzy Hash: BEE1D572E0025B9FCF05CFB8CC95AEEBBB6AF48600F158559F844A7344D631AD46CBA1
                                                                          APIs
                                                                          • GetDeviceCaps.GDI32(?,0000000E), ref: 70317664
                                                                          • CreateCompatibleDC.GDI32(?), ref: 703176AF
                                                                          • SelectObject.GDI32(00000000), ref: 703176C8
                                                                          • SetDIBColorTable.GDI32(00000000,00000000,00000100,?), ref: 703176DF
                                                                          • SelectObject.GDI32(00000000,00000000), ref: 703176EB
                                                                          • DeleteDC.GDI32(00000000), ref: 703176EE
                                                                          • GetDeviceCaps.GDI32(?,0000000C), ref: 7031766B
                                                                            • Part of subcall function 70315ADF: CreateCompatibleBitmap.GDI32(?,00000001,00000001), ref: 70315B06
                                                                            • Part of subcall function 70315ADF: GetDIBits.GDI32(?,?,00000000,00000001,00000000,?,00000000), ref: 70315B40
                                                                            • Part of subcall function 70315ADF: GetDIBits.GDI32(?,?,00000000,00000001,00000000,?,00000000), ref: 70315B67
                                                                            • Part of subcall function 70315ADF: DeleteObject.GDI32(?), ref: 70315BB5
                                                                          • CreateDIBSection.GDI32(00000060,?,00000000,?,00000000,00000000), ref: 70317765
                                                                          • DeleteObject.GDI32(00000000), ref: 70317778
                                                                            • Part of subcall function 70336770: TlsGetValue.KERNEL32(FFFFFFFF,?,70317635), ref: 7033677E
                                                                            • Part of subcall function 70336770: TlsSetValue.KERNEL32(00000000,?,70317635), ref: 703367AC
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Object$CreateDelete$BitsCapsCompatibleDeviceSelectValue$BitmapColorSectionTable
                                                                          • String ID:
                                                                          • API String ID: 3921767866-0
                                                                          • Opcode ID: 594a39c16cc6da78f6cd78a231d5c87281ee917f2e04f3b84b4dccb4b2da1b06
                                                                          • Instruction ID: f618dc2cfcdd92e2532f0315b65c7f9cd0a423c6c9128e4eee7eda09de79d151
                                                                          • Opcode Fuzzy Hash: 594a39c16cc6da78f6cd78a231d5c87281ee917f2e04f3b84b4dccb4b2da1b06
                                                                          • Instruction Fuzzy Hash: 0251BF72600B46AFDB15CF2DCC84BAF7BB9AF49311F154059E9469B241E770EC85CBA0
                                                                          APIs
                                                                          • TlsGetValue.KERNEL32(FFFFFFFF), ref: 70349A0B
                                                                            • Part of subcall function 70336A33: HeapAlloc.KERNEL32(00000008,?,?,7034AB42,00000054,?,7034B007,?,?,?,70313B19,00000003,?), ref: 70336A43
                                                                          • TlsSetValue.KERNEL32(00000000,0000001C), ref: 70349A41
                                                                          • ?Create@SBAlloc@DirectUI@@SGJIIPAUISBLeak@2@PAPAV12@@Z.UXCORE(0000001C,00000030,00000000,00000008), ref: 70349A50
                                                                          • ?Create@FontCache@DirectUI@@SGJIPAPAV12@@Z.UXCORE(00000008,00000010,0000000C,0000001C,00000030,00000000,00000008), ref: 70349A70
                                                                          • InitGadgets.UXCORE(00000014,00000008,00000010,0000000C,0000001C,00000030,00000000,00000008), ref: 70349AB6
                                                                          • GetLastError.KERNEL32(00000014,00000008,00000010,0000000C,0000001C,00000030,00000000,00000008), ref: 70349AC5
                                                                          • ?Destroy@SBAlloc@DirectUI@@QAEXXZ.UXCORE(0000001C,00000030,00000000,00000008), ref: 70349AD8
                                                                          • DeleteHandle.UXCORE(?,0000001C,00000030,00000000,00000008), ref: 70349AF1
                                                                          • TlsSetValue.KERNEL32(00000000,00000000,0000001C,00000030,00000000,00000008), ref: 70349B03
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: DirectValue$Alloc@Create@V12@@$AllocCache@DeleteDestroy@ErrorFontGadgetsHandleHeapInitLastLeak@2@
                                                                          • String ID:
                                                                          • API String ID: 2277003108-0
                                                                          • Opcode ID: 1d7c33112523a93564db3c5a9e7d2274e0d92d74c7c4666bb903ea1782002648
                                                                          • Instruction ID: a0f888c5e66a44ec15f9a2557317d1d64578fa3c5d7c09c05a8ba186d4962939
                                                                          • Opcode Fuzzy Hash: 1d7c33112523a93564db3c5a9e7d2274e0d92d74c7c4666bb903ea1782002648
                                                                          • Instruction Fuzzy Hash: C431AF765002459FCB109FB9C8C4E6EB6FDEB44250B26593FF153EF240E634A9468761
                                                                          APIs
                                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 70314886
                                                                            • Part of subcall function 7031465C: GetLastError.KERNEL32(70314897), ref: 7031465C
                                                                          • CharNextW.USER32(?), ref: 703148E2
                                                                          • lstrlenW.KERNEL32(00000000), ref: 70314911
                                                                          • LoadTypeLib.OLEAUT32(?,?), ref: 70314963
                                                                          • LoadTypeLib.OLEAUT32(?,?), ref: 703149B9
                                                                          • SysAllocString.OLEAUT32(?), ref: 703149D2
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: LoadType$AllocCharErrorFileLastModuleNameNextStringlstrlen
                                                                          • String ID: .tlb
                                                                          • API String ID: 3420921355-1487266626
                                                                          • Opcode ID: ee7199d51cf3637877cea176e45eb16f035c503db88f4846a26bae2199b08b17
                                                                          • Instruction ID: 2d977e69b61f5da43d38c1decc2b0aca3f252277e526e6eb4f230194e284a599
                                                                          • Opcode Fuzzy Hash: ee7199d51cf3637877cea176e45eb16f035c503db88f4846a26bae2199b08b17
                                                                          • Instruction Fuzzy Hash: 9C51A872D0166B9BDB15DF65DC9469E77B9AF0C710F1101A9E80AA7210F7B49EC0CB90
                                                                          APIs
                                                                          • ?StartDefer@Element@DirectUI@@SGXXZ.UXCORE(00000000,?,?,?,7038C160,00000000,?,00000200,?,?,?,?,7031541A,?,?), ref: 7038B6AD
                                                                          • ?Included@ItemRange@@QBE_NJ@Z.UXCORE(00000200,?,?,?,?,?,7038C160,00000000,?,00000200,?,?,?,?,7031541A,?), ref: 7038B6FA
                                                                          • ?Clear@ItemRange@@QAEXXZ.UXCORE(?,?,?,?,?,7038C160,00000000,?,00000200,?,?,?,?,7031541A,?,?), ref: 7038B752
                                                                          • ?Clear@ItemRange@@QAEXXZ.UXCORE(?,?,?,?,?,7038C160,00000000,?,00000200,?,?,?,?,7031541A,?,?), ref: 7038B76B
                                                                          • ?Include@ItemRange@@QAEXJJ@Z.UXCORE(00000200,00000200,?,?,?,?,?,7038C160,00000000,?,00000200,?,?,?,?,7031541A), ref: 7038B77A
                                                                          • ?EndDefer@Element@DirectUI@@SGXXZ.UXCORE(?,?,?,7038C160,00000000,?,00000200,?,?,?,?,7031541A,?,?), ref: 7038B7C5
                                                                            • Part of subcall function 7037CF5E: memset.MSVCR80 ref: 7037CF70
                                                                            • Part of subcall function 7037CF5E: TraceEvent.ADVAPI32(00000100,?,00000038), ref: 7037CFA9
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: ItemRange@@$Clear@Defer@DirectElement@$EventInclude@Included@StartTracememset
                                                                          • String ID:
                                                                          • API String ID: 1596628032-3916222277
                                                                          • Opcode ID: 034c3debe145172b63e2b77b03006c090e031d614ed82c0dc30bae48b0151157
                                                                          • Instruction ID: 7ffbd2c86ca3c65147f46d245164040f005d51e2a908bc68016f10a6e1aa2e50
                                                                          • Opcode Fuzzy Hash: 034c3debe145172b63e2b77b03006c090e031d614ed82c0dc30bae48b0151157
                                                                          • Instruction Fuzzy Hash: 1D41B570600306AFEB15CF25C985BAE77AAAFC4304F51849DF84B9B2C2DB75AD068771
                                                                          APIs
                                                                          • memset.MSVCR80 ref: 70331131
                                                                          • malloc.MSVCR80 ref: 703312B6
                                                                          • malloc.MSVCR80 ref: 703312E9
                                                                          • malloc.MSVCR80 ref: 7033131C
                                                                          • malloc.MSVCR80 ref: 7033134F
                                                                            • Part of subcall function 70318CE0: memmove.MSVCR80(?,?,00000000), ref: 70318DCA
                                                                            • Part of subcall function 70318CE0: memset.MSVCR80 ref: 70318DD4
                                                                            • Part of subcall function 70318CE0: memset.MSVCR80 ref: 70318DFA
                                                                          • memset.MSVCR80 ref: 703314F7
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: mallocmemset$memmove
                                                                          • String ID: l
                                                                          • API String ID: 3492948549-2517025534
                                                                          • Opcode ID: 681485e980c602ae4a574baa75d277769d0b2a8956ebeab28e511ed2ee02ac60
                                                                          • Instruction ID: 9f4e82b07b99e9e7edaa48adfc201903490a71f8431e668471f3cf4909a03ede
                                                                          • Opcode Fuzzy Hash: 681485e980c602ae4a574baa75d277769d0b2a8956ebeab28e511ed2ee02ac60
                                                                          • Instruction Fuzzy Hash: 97024975E002599FDF14CFA8C881AEEBBB5FF48314F148269E915EB345D734A942CBA0
                                                                          APIs
                                                                          • memset.MSVCR80 ref: 70331681
                                                                          • malloc.MSVCR80 ref: 70331806
                                                                          • malloc.MSVCR80 ref: 70331839
                                                                          • malloc.MSVCR80 ref: 7033186C
                                                                          • malloc.MSVCR80 ref: 7033189F
                                                                            • Part of subcall function 70319120: memmove.MSVCR80(?,?,00000000), ref: 7031920A
                                                                            • Part of subcall function 70319120: memset.MSVCR80 ref: 70319214
                                                                            • Part of subcall function 70319120: memset.MSVCR80 ref: 7031923A
                                                                          • memset.MSVCR80 ref: 70331A47
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: mallocmemset$memmove
                                                                          • String ID: l
                                                                          • API String ID: 3492948549-2517025534
                                                                          • Opcode ID: 0b050b141a888601beba62693c38b5e6d31031bb4685167c8a97e122301dd076
                                                                          • Instruction ID: fe7dd419bc28fe704fb62aa4498de81bd4cd8ae0d5b5c9e283904134ca620d8f
                                                                          • Opcode Fuzzy Hash: 0b050b141a888601beba62693c38b5e6d31031bb4685167c8a97e122301dd076
                                                                          • Instruction Fuzzy Hash: 59024C71E002499FDF14CFA9C981AEEBBB5FF48314F148269E915EB345D734A942CBA0
                                                                          APIs
                                                                          • memset.MSVCR80 ref: 7031B37C
                                                                          • memset.MSVCR80 ref: 7031B5C4
                                                                            • Part of subcall function 70317050: ??_V@YAXPAX@Z.MSVCR80(?,?,7031B3B3), ref: 7031705D
                                                                            • Part of subcall function 70317050: ??_V@YAXPAX@Z.MSVCR80(?,?,7031B3B3), ref: 70317077
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: memset
                                                                          • String ID: l
                                                                          • API String ID: 2221118986-2517025534
                                                                          • Opcode ID: 2ba60852916c140167e39e9d209f6eff9e3b4448a897a7e5c1e7a1095f32f6d9
                                                                          • Instruction ID: 5f77202e6cc56332dab34c056f96d4b7f7a0fc07c8a63f1f0978db4272b8c09e
                                                                          • Opcode Fuzzy Hash: 2ba60852916c140167e39e9d209f6eff9e3b4448a897a7e5c1e7a1095f32f6d9
                                                                          • Instruction Fuzzy Hash: 7002D8B5A0061A9FCB04CF99D980ADEBBB9FF8C314F158259F915A7354D730AD41CBA0
                                                                          APIs
                                                                          • memset.MSVCR80 ref: 7031B83C
                                                                          • memset.MSVCR80 ref: 7031BA84
                                                                            • Part of subcall function 70317050: ??_V@YAXPAX@Z.MSVCR80(?,?,7031B3B3), ref: 7031705D
                                                                            • Part of subcall function 70317050: ??_V@YAXPAX@Z.MSVCR80(?,?,7031B3B3), ref: 70317077
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: memset
                                                                          • String ID: l
                                                                          • API String ID: 2221118986-2517025534
                                                                          • Opcode ID: a259903c7a70bb3afd632f4a3015574e761deb3fc93f1dce26126d20da91736b
                                                                          • Instruction ID: 92e85781679eb439c9668e2d0f331095cb0205c87eba404b3f8a195b101cb3fc
                                                                          • Opcode Fuzzy Hash: a259903c7a70bb3afd632f4a3015574e761deb3fc93f1dce26126d20da91736b
                                                                          • Instruction Fuzzy Hash: AE02D9B5A006199FCB04CF99D980ADEBBB9FF8C314F158259F915A7354D730AD42CBA0
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Value
                                                                          • String ID: W
                                                                          • API String ID: 3702945584-655174618
                                                                          • Opcode ID: 2487d05c7ff6d3b9e8edbce2f29aad4fce68a7844ad514e8a79db8bd97a8feff
                                                                          • Instruction ID: 66fa9d90e23f6305180c634f406463f51c13f1360e9a87f27ff7d5556f3288b6
                                                                          • Opcode Fuzzy Hash: 2487d05c7ff6d3b9e8edbce2f29aad4fce68a7844ad514e8a79db8bd97a8feff
                                                                          • Instruction Fuzzy Hash: D871A271900209DFCB02CF66C8C4BAD7BB9FB45323F21E16EE8469A254E7789A41DF51
                                                                          APIs
                                                                          • __EH_prolog3.LIBCMT ref: 7038B026
                                                                          • ??3@YAXPAX@Z.MSVCR80(?,?,?), ref: 7038B2C9
                                                                            • Part of subcall function 70315AAB: malloc.MSVCR80 ref: 70315ABF
                                                                          • ??3@YAXPAX@Z.MSVCR80(00000000,?), ref: 7038B29D
                                                                          • ?_SetChildren@Element@DirectUI@@IAEJIPAV?$DynamicArray@PAVElement@DirectUI@@@2@@Z.UXCORE(00000001,?,?,00000200,00000000,00000000,?), ref: 7038B421
                                                                          • ?Destroy@Element@DirectUI@@QAEJ_N@Z.UXCORE(00000001,?,?,00000200,00000000,00000000,?), ref: 7038B445
                                                                          • ?_UpdateDesiredSize@Element@DirectUI@@QAE?AUtagSIZE@@HHPAVSurface@2@@Z.UXCORE(000000FF,00000200,7FFFFFFF,00000001,00000000,?,00000000,?), ref: 7038B1E0
                                                                            • Part of subcall function 7037CF5E: memset.MSVCR80 ref: 7037CF70
                                                                            • Part of subcall function 7037CF5E: TraceEvent.ADVAPI32(00000100,?,00000038), ref: 7037CFA9
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: DirectElement@$??3@$Array@Children@DesiredDestroy@DynamicEventH_prolog3I@@@2@@Size@Surface@2@@TraceUpdateUtagmallocmemset
                                                                          • String ID:
                                                                          • API String ID: 2536493592-0
                                                                          • Opcode ID: e34db16b6e9a3a65eac791adec5c5844365be2d83ccdd68e46398bbf2d9bdd4f
                                                                          • Instruction ID: b57c7833d1ae38bf3752f6bdd56487f7584f86c25159247dd490275136588192
                                                                          • Opcode Fuzzy Hash: e34db16b6e9a3a65eac791adec5c5844365be2d83ccdd68e46398bbf2d9bdd4f
                                                                          • Instruction Fuzzy Hash: C6F16B70A00606DFCB09CF64C995AAEB7FABF48314F2149ADE8569B291D770FD41CB60
                                                                          APIs
                                                                          • memset.MSVCR80 ref: 7032FB42
                                                                          • malloc.MSVCR80 ref: 7032FC3E
                                                                          • malloc.MSVCR80 ref: 7032FC6E
                                                                          • malloc.MSVCR80 ref: 7032FC9E
                                                                          • malloc.MSVCR80 ref: 7032FCD9
                                                                            • Part of subcall function 70319120: memmove.MSVCR80(?,?,00000000), ref: 7031920A
                                                                            • Part of subcall function 70319120: memset.MSVCR80 ref: 70319214
                                                                            • Part of subcall function 70319120: memset.MSVCR80 ref: 7031923A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: malloc$memset$memmove
                                                                          • String ID: l
                                                                          • API String ID: 340050886-2517025534
                                                                          • Opcode ID: 8fdb87bea2ecf98771fccf7656349a88c6313b1a26a6578bd5e39897cddf276d
                                                                          • Instruction ID: f1f4e9462f3dddb5ced0811603fb805449c9d2985f1b736899d7b1dcad027fed
                                                                          • Opcode Fuzzy Hash: 8fdb87bea2ecf98771fccf7656349a88c6313b1a26a6578bd5e39897cddf276d
                                                                          • Instruction Fuzzy Hash: 4CE13275E002099FDB05CFA8D881AEEBBB6FF89310F158169E905AB355D734B941CFA0
                                                                          APIs
                                                                          • memset.MSVCR80 ref: 7032F6E2
                                                                          • malloc.MSVCR80 ref: 7032F7DE
                                                                          • malloc.MSVCR80 ref: 7032F80E
                                                                          • malloc.MSVCR80 ref: 7032F83E
                                                                          • malloc.MSVCR80 ref: 7032F879
                                                                            • Part of subcall function 70318CE0: memmove.MSVCR80(?,?,00000000), ref: 70318DCA
                                                                            • Part of subcall function 70318CE0: memset.MSVCR80 ref: 70318DD4
                                                                            • Part of subcall function 70318CE0: memset.MSVCR80 ref: 70318DFA
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: malloc$memset$memmove
                                                                          • String ID: l
                                                                          • API String ID: 340050886-2517025534
                                                                          • Opcode ID: 35ea781780fe4b55121948190cae4fa92f8beabd6ebbe7e761a5f53238c89c64
                                                                          • Instruction ID: 78b59b3e6d7cf1c3124d6ebc772476153c250332b500ea73d404b9148e2dbc6a
                                                                          • Opcode Fuzzy Hash: 35ea781780fe4b55121948190cae4fa92f8beabd6ebbe7e761a5f53238c89c64
                                                                          • Instruction Fuzzy Hash: 7BE12275E002099FDB04CF98D881EEEBBB6FF89310F158169E919AB345D734A941CFA1
                                                                          APIs
                                                                          • memset.MSVCR80 ref: 70330401
                                                                          • malloc.MSVCR80 ref: 70330509
                                                                          • malloc.MSVCR80 ref: 70330539
                                                                          • malloc.MSVCR80 ref: 70330569
                                                                          • malloc.MSVCR80 ref: 70330599
                                                                            • Part of subcall function 70319120: memmove.MSVCR80(?,?,00000000), ref: 7031920A
                                                                            • Part of subcall function 70319120: memset.MSVCR80 ref: 70319214
                                                                            • Part of subcall function 70319120: memset.MSVCR80 ref: 7031923A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: malloc$memset$memmove
                                                                          • String ID: l
                                                                          • API String ID: 340050886-2517025534
                                                                          • Opcode ID: 8c6cce7c3f4d32e2fe9df9ebdfdd2e1b99a4bebd82d9d90b8d60e6efeeff8f01
                                                                          • Instruction ID: bfd9430ab654ebacc8e608d6c8e89153f21c3a4230b8cc86ad69ca49f4f94899
                                                                          • Opcode Fuzzy Hash: 8c6cce7c3f4d32e2fe9df9ebdfdd2e1b99a4bebd82d9d90b8d60e6efeeff8f01
                                                                          • Instruction Fuzzy Hash: CAE12875E002099FDB04CFA8C991AEEFBB6FF48310F158169E919AB345D734A941CFA0
                                                                          APIs
                                                                          • memset.MSVCR80 ref: 70330CC1
                                                                          • malloc.MSVCR80 ref: 70330DC9
                                                                          • malloc.MSVCR80 ref: 70330DF9
                                                                          • malloc.MSVCR80 ref: 70330E29
                                                                          • malloc.MSVCR80 ref: 70330E59
                                                                            • Part of subcall function 70319120: memmove.MSVCR80(?,?,00000000), ref: 7031920A
                                                                            • Part of subcall function 70319120: memset.MSVCR80 ref: 70319214
                                                                            • Part of subcall function 70319120: memset.MSVCR80 ref: 7031923A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: malloc$memset$memmove
                                                                          • String ID: l
                                                                          • API String ID: 340050886-2517025534
                                                                          • Opcode ID: 4fa78f9b59b89942d6fb8d896054c59ca8781c67967d67381d445cbd34a6f16e
                                                                          • Instruction ID: 234c8a4827dda4976b0d2d8d3014c7d361e4db3e3eee968f6f3b089d21c80809
                                                                          • Opcode Fuzzy Hash: 4fa78f9b59b89942d6fb8d896054c59ca8781c67967d67381d445cbd34a6f16e
                                                                          • Instruction Fuzzy Hash: 50E13A71E006499FDB04CFA8C991ADEFBB6FF48300F158169F919AB345D734A941CBA0
                                                                          APIs
                                                                          • memset.MSVCR80 ref: 7032FFA1
                                                                          • malloc.MSVCR80 ref: 703300A9
                                                                          • malloc.MSVCR80 ref: 703300D9
                                                                          • malloc.MSVCR80 ref: 70330109
                                                                          • malloc.MSVCR80 ref: 70330139
                                                                            • Part of subcall function 70318CE0: memmove.MSVCR80(?,?,00000000), ref: 70318DCA
                                                                            • Part of subcall function 70318CE0: memset.MSVCR80 ref: 70318DD4
                                                                            • Part of subcall function 70318CE0: memset.MSVCR80 ref: 70318DFA
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: malloc$memset$memmove
                                                                          • String ID: l
                                                                          • API String ID: 340050886-2517025534
                                                                          • Opcode ID: cf6d4091effaa0aa2eabbc3abd0c58e57df8c77e1e5a54a03a9debe4b8705e85
                                                                          • Instruction ID: 016b3fcdeff07b1c596cc3479d2f9fc0e1c92157a0ba113dde81a51add144493
                                                                          • Opcode Fuzzy Hash: cf6d4091effaa0aa2eabbc3abd0c58e57df8c77e1e5a54a03a9debe4b8705e85
                                                                          • Instruction Fuzzy Hash: E1E14A75E00209AFDB04CFA9C991ADEFBB6FF48314F158169E919EB341D734A941CBA0
                                                                          APIs
                                                                          • memset.MSVCR80 ref: 70330861
                                                                          • malloc.MSVCR80 ref: 70330969
                                                                          • malloc.MSVCR80 ref: 70330999
                                                                          • malloc.MSVCR80 ref: 703309C9
                                                                          • malloc.MSVCR80 ref: 703309F9
                                                                            • Part of subcall function 70318CE0: memmove.MSVCR80(?,?,00000000), ref: 70318DCA
                                                                            • Part of subcall function 70318CE0: memset.MSVCR80 ref: 70318DD4
                                                                            • Part of subcall function 70318CE0: memset.MSVCR80 ref: 70318DFA
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: malloc$memset$memmove
                                                                          • String ID: l
                                                                          • API String ID: 340050886-2517025534
                                                                          • Opcode ID: 2970ce81a56e4301363a25018c445a367c83f3dade2e9c335766eaacb51c0068
                                                                          • Instruction ID: 35ce63885f645da92235ef62bfb0b1d4b0c0b0c68c31de40a324b55da5bb7729
                                                                          • Opcode Fuzzy Hash: 2970ce81a56e4301363a25018c445a367c83f3dade2e9c335766eaacb51c0068
                                                                          • Instruction Fuzzy Hash: 19E13871E00209AFDB04CFA8C891ADEFBB6FF48304F158169E919EB355D734A941CBA0
                                                                          APIs
                                                                            • Part of subcall function 70314820: GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 70314886
                                                                          • SysStringLen.OLEAUT32(?), ref: 70314B50
                                                                            • Part of subcall function 703145AA: wcsncpy_s.MSVCR80 ref: 703145BB
                                                                          • lstrlenW.KERNEL32(?), ref: 70314B86
                                                                          • lstrlenW.KERNEL32(00000000), ref: 70314B8B
                                                                          • CharNextW.USER32(?), ref: 70314BB9
                                                                          • RegisterTypeLib.OLEAUT32(?,?,?), ref: 70314BFC
                                                                          • SysFreeString.OLEAUT32(?), ref: 70314C1A
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Stringlstrlen$CharFileFreeModuleNameNextRegisterTypewcsncpy_s
                                                                          • String ID:
                                                                          • API String ID: 161417994-0
                                                                          • Opcode ID: 1ed86cf458dd15e7fb5a0280387974438773bacfba5810c81ebb18c302baf8de
                                                                          • Instruction ID: 75041ee4f817d56e869bfea837854960fcf8065b927f11ed8566354db36a315a
                                                                          • Opcode Fuzzy Hash: 1ed86cf458dd15e7fb5a0280387974438773bacfba5810c81ebb18c302baf8de
                                                                          • Instruction Fuzzy Hash: DC31947290011D9FDB24EB65CC88ADEB7B9FB58300F5185E9E91AD7250F6709D81CB90
                                                                          APIs
                                                                          • TlsGetValue.KERNEL32(FFFFFFFF,?,7031549D,00000002,00000001), ref: 70349B27
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Value
                                                                          • String ID:
                                                                          • API String ID: 3702945584-0
                                                                          • Opcode ID: 99bef39afda7e9f977a486098468e5585cfd937b94fe0e007489d2d8d01172b4
                                                                          • Instruction ID: a12da333bb19f7fe6a89b07bb9548b19001d1e35e1eb51d9bc5df56a369367e0
                                                                          • Opcode Fuzzy Hash: 99bef39afda7e9f977a486098468e5585cfd937b94fe0e007489d2d8d01172b4
                                                                          • Instruction Fuzzy Hash: 75F02835001A01DFD7219B34FC84B1EB6EAEF00324F128A1AF4578E5B0CB35BC85C640
                                                                          APIs
                                                                          • memset.MSVCR80 ref: 7031C8F8
                                                                          • memset.MSVCR80 ref: 7031CAC2
                                                                          • ??_V@YAXPAX@Z.MSVCR80(00000000), ref: 7031CB21
                                                                          • ??_V@YAXPAX@Z.MSVCR80(?), ref: 7031CB41
                                                                            • Part of subcall function 70317050: ??_V@YAXPAX@Z.MSVCR80(?,?,7031B3B3), ref: 7031705D
                                                                            • Part of subcall function 70317050: ??_V@YAXPAX@Z.MSVCR80(?,?,7031B3B3), ref: 70317077
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: memset
                                                                          • String ID: l
                                                                          • API String ID: 2221118986-2517025534
                                                                          • Opcode ID: 36c574c0ab8fe87dceba16d236693986684ffe57f87807fe530e7c263aed2207
                                                                          • Instruction ID: 30a5f3b68bb6d7965ab386919563795ecc0cc8e2c2b583df5712af72c5f50252
                                                                          • Opcode Fuzzy Hash: 36c574c0ab8fe87dceba16d236693986684ffe57f87807fe530e7c263aed2207
                                                                          • Instruction Fuzzy Hash: D2A1FBB5E006099FCB04CF99D981ADEB7B9FF8C314F148269E919A7344D735AD41CBA0
                                                                          APIs
                                                                          • memset.MSVCR80 ref: 7031CBC8
                                                                          • memset.MSVCR80 ref: 7031CD92
                                                                          • ??_V@YAXPAX@Z.MSVCR80(00000000), ref: 7031CDF1
                                                                          • ??_V@YAXPAX@Z.MSVCR80(?), ref: 7031CE11
                                                                            • Part of subcall function 70317050: ??_V@YAXPAX@Z.MSVCR80(?,?,7031B3B3), ref: 7031705D
                                                                            • Part of subcall function 70317050: ??_V@YAXPAX@Z.MSVCR80(?,?,7031B3B3), ref: 70317077
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: memset
                                                                          • String ID: l
                                                                          • API String ID: 2221118986-2517025534
                                                                          • Opcode ID: d9279f0070e27cae04400319772f1e9312bfc9a10fd0fe404ae6b1043dd73d83
                                                                          • Instruction ID: f51a3aa75659d8fd391ce934fb6b8901e4a22fec3dfe1554fa07e59f4df7f1f4
                                                                          • Opcode Fuzzy Hash: d9279f0070e27cae04400319772f1e9312bfc9a10fd0fe404ae6b1043dd73d83
                                                                          • Instruction Fuzzy Hash: 75A11CB6E006099FCB04CF99D980ADEB7B9FF8C314F148269E919A7340D735AD51CBA0
                                                                          APIs
                                                                          • ?CreateSize@Value@DirectUI@@SGPAV12@HH@Z.UXCORE(00007FFF,?,00000000,00000000,?,?,?,?,?,7033F852,?,00007FFF,00000000,703038D8), ref: 7033EAA7
                                                                          • ?_SetValue@Element@DirectUI@@IAEJPBUPropertyInfo@2@HPAVValue@2@_N2@Z.UXCORE(00000001,00000000,00000001,00000000,00007FFF,?,00000000,00000000,?,?,?,?,?,7033F852,?,00007FFF), ref: 7033EABE
                                                                          • ?CreateSize@Value@DirectUI@@SGPAV12@HH@Z.UXCORE(00000000,?,000000FF), ref: 7033EC5A
                                                                          • ?_SetValue@Element@DirectUI@@IAEJPBUPropertyInfo@2@HPAVValue@2@_N2@Z.UXCORE(00000001,00000000,00000001,00000000,00000000,?,000000FF), ref: 7033EC71
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: DirectValue@$CreateElement@Info@2@PropertySize@V12@Value@2@_
                                                                          • String ID: @R;p
                                                                          • API String ID: 4227704940-402780900
                                                                          • Opcode ID: 75824db1cd57d4c71333e74c33511d758d9ad4be8f2f530340f7cffb31c34bfd
                                                                          • Instruction ID: 9fc9b4053db3e01df5b2bfd5e93c992c061aa6b0aa6e4a3c951df455e689461a
                                                                          • Opcode Fuzzy Hash: 75824db1cd57d4c71333e74c33511d758d9ad4be8f2f530340f7cffb31c34bfd
                                                                          • Instruction Fuzzy Hash: C0A16E71A00209DFCB06CF64C8D1AADFBB6FF48318F55866DE556AB291D730B982CB50
                                                                          APIs
                                                                          • TlsGetValue.KERNEL32(00000000,?,?,70377542,?,?,00000000,00000008,00000001,?), ref: 70378707
                                                                          • DeleteObject.GDI32(?), ref: 703787CD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: DeleteObjectValue
                                                                          • String ID: W
                                                                          • API String ID: 2418927197-655174618
                                                                          • Opcode ID: 38239026a34f7542bf7302a95f8036a62cf2f88794b2648a931dfc2b47b258e4
                                                                          • Instruction ID: 25b72131acc4f2da7e955d0f5f3f9e658fc0d298f1852d95e3a8ed35fe58da1c
                                                                          • Opcode Fuzzy Hash: 38239026a34f7542bf7302a95f8036a62cf2f88794b2648a931dfc2b47b258e4
                                                                          • Instruction Fuzzy Hash: 85219A76641244EFC709CF25C8C8A8EBBBAEF85354731955DE807DB720E739AA02DB50
                                                                          APIs
                                                                          • OutputDebugStringA.KERNEL32(ERROR: Not all DirectUser Contexts were destroyed before EndProcess().,?,7036727E,7031544E), ref: 7037727D
                                                                          • TlsSetValue.KERNEL32(00000000,00000000,?,7036727E,7031544E), ref: 703772BB
                                                                          • CloseHandle.KERNEL32(00000000,?,7036727E,7031544E), ref: 703772CB
                                                                          • TlsFree.KERNEL32(?,7036727E,7031544E), ref: 703772F1
                                                                          Strings
                                                                          • ERROR: Not all DirectUser Contexts were destroyed before EndProcess()., xrefs: 70377278
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: CloseDebugFreeHandleOutputStringValue
                                                                          • String ID: ERROR: Not all DirectUser Contexts were destroyed before EndProcess().
                                                                          • API String ID: 1275278855-3719588375
                                                                          • Opcode ID: cdf9d80c28edbb50ebc9f30d0698894fcc0a4e8e27dc61e4e6d7177d692d67fb
                                                                          • Instruction ID: ae267e8333895b8a7d43f3fad82ff5190e74bb6c329d8f10f711cbffea595fb4
                                                                          • Opcode Fuzzy Hash: cdf9d80c28edbb50ebc9f30d0698894fcc0a4e8e27dc61e4e6d7177d692d67fb
                                                                          • Instruction Fuzzy Hash: 96014B36902210DFC3169B67CC99F8D3B7EBB15B267317619F45296271CB354852CB90
                                                                          APIs
                                                                          • FindAtomW.KERNEL32(?,00000000,?,?), ref: 70375E88
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: AtomFind
                                                                          • String ID:
                                                                          • API String ID: 1223357303-0
                                                                          • Opcode ID: e3c148a89d594d3b4975204eed26f370c3f276078688958259bda4989f596213
                                                                          • Instruction ID: d68e3b806503a8340756d1ca8f2d996beca25a8bd09df98ed7b20702a4277b24
                                                                          • Opcode Fuzzy Hash: e3c148a89d594d3b4975204eed26f370c3f276078688958259bda4989f596213
                                                                          • Instruction Fuzzy Hash: DA813F71905229CFCB19CF14C9D8B9DB3B9FB58310F11959EE81AAB251C774AE81CF90
                                                                          APIs
                                                                            • Part of subcall function 70376DD6: TlsGetValue.KERNEL32(70379C0B,00000000,?,?,?,703416C1,?,00000000,?,?,7034A363,00000000,00000000,?,7034B01F,?), ref: 70376DDC
                                                                          • SetLastError.KERNEL32(80040014,00000000), ref: 70379E80
                                                                          • SetLastError.KERNEL32(80070057,00000001,00000000,00000000), ref: 70379EA7
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast$Value
                                                                          • String ID:
                                                                          • API String ID: 1883355122-0
                                                                          • Opcode ID: a8b8417f94f98819dd4f5a9d919ee271cd7d5adbe77f156f5312d6aab4e0ceaf
                                                                          • Instruction ID: 37722ffa0fd588adda619cada9a4169e01d159b482f732bcd5aa035d77cc8940
                                                                          • Opcode Fuzzy Hash: a8b8417f94f98819dd4f5a9d919ee271cd7d5adbe77f156f5312d6aab4e0ceaf
                                                                          • Instruction Fuzzy Hash: 72316D31500108EFCF05DF74C8C0DED37BDAA84242B26E65BF906EA558E739E951EB51
                                                                          APIs
                                                                          • ?StartDefer@Element@DirectUI@@SGXXZ.UXCORE(?,?,00000200), ref: 7038B4E9
                                                                          • ?GetRootHWND@HWNDElement@DirectUI@@SGPAUHWND__@@PAVElement@2@@Z.UXCORE(?,?,?,00000200), ref: 7038B4F5
                                                                          • GetDC.USER32(00000000), ref: 7038B4FF
                                                                          • ReleaseDC.USER32(00000001,?), ref: 7038B57E
                                                                          • ?EndDefer@Element@DirectUI@@SGXXZ.UXCORE(?,?,?,00000200), ref: 7038B589
                                                                            • Part of subcall function 7037CF5E: memset.MSVCR80 ref: 7037CF70
                                                                            • Part of subcall function 7037CF5E: TraceEvent.ADVAPI32(00000100,?,00000038), ref: 7037CFA9
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: DirectElement@$Defer@$D__@@Element@2@@EventReleaseRootStartTracememset
                                                                          • String ID:
                                                                          • API String ID: 2941676253-0
                                                                          • Opcode ID: 97bc9bc2a26673bcf0868569c0398f04928401ee683a632dd83bb7560c4b0c0d
                                                                          • Instruction ID: 9bd79a0e5547091192073133dd22e4b7d96d7ace2bf18c1f0ee9ba495481b304
                                                                          • Opcode Fuzzy Hash: 97bc9bc2a26673bcf0868569c0398f04928401ee683a632dd83bb7560c4b0c0d
                                                                          • Instruction Fuzzy Hash: 9731AD71A01205AFDB159B55CC8AF6EB7BEAB49300F104199F606AB2E1DBB0ED01CB60
                                                                          APIs
                                                                          • CreateGadget.UXCORE(00000000,00000003,?,00000000,00000000,?,?,7034A363,00000000,00000000,?,7034B01F,?), ref: 703416A0
                                                                            • Part of subcall function 70379E67: SetLastError.KERNEL32(80040014,00000000), ref: 70379E80
                                                                          • GetLastError.KERNEL32(00000000,00000003,?,00000000,00000000,?,?,7034A363,00000000,00000000,?,7034B01F,?), ref: 703416AC
                                                                          • DeleteHandle.UXCORE(?,00000000,?,?,7034A363,00000000,00000000,?,7034B01F,?,?,?,?,?,70313B19,00000003), ref: 703416BC
                                                                          • SetGadgetMessageFilter.UXCORE(00000000,00000000,00000011,0000007F,00000000,00000003,?,00000000,00000000,?,?,7034A363,00000000,00000000,?,7034B01F), ref: 703416CE
                                                                          • SetGadgetStyle.UXCORE(?,00000801,00000E63,00000000,00000000,00000011,0000007F,00000000,00000003,?,00000000,00000000,?,?,7034A363,00000000), ref: 703416E0
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Gadget$ErrorLast$CreateDeleteFilterHandleMessageStyle
                                                                          • String ID:
                                                                          • API String ID: 1859439242-0
                                                                          • Opcode ID: 0189b864825a5573cb4d9d6ca1d3db625eb989109e09c04f3133306dba1bc12e
                                                                          • Instruction ID: 6288522ef4e1aad9263053c50c274f613e586f1752055e581bae68f78aa819e8
                                                                          • Opcode Fuzzy Hash: 0189b864825a5573cb4d9d6ca1d3db625eb989109e09c04f3133306dba1bc12e
                                                                          • Instruction Fuzzy Hash: CB21A371500B405FC3218F7AC8D1A9BFBE9AF55720B249A1EF59ACBA91D775F402CB10
                                                                          APIs
                                                                          • SHCreateShellPalette.SHLWAPI(00000000), ref: 7033686F
                                                                          • GetPaletteEntries.GDI32(00000000,00000000,00000100,?), ref: 70336892
                                                                          • InterlockedExchange.KERNEL32(703C1818,00000000), ref: 7033691E
                                                                          • DeleteObject.GDI32(00000000), ref: 7033692D
                                                                          • SHGetInverseCMAP.SHLWAPI(703C181C,00000004), ref: 70336944
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Palette$CreateDeleteEntriesExchangeInterlockedInverseObjectShell
                                                                          • String ID:
                                                                          • API String ID: 215163796-0
                                                                          • Opcode ID: 199fe2e14f668de4bece8bf26995f7f2713f0e90272e9feaed7c05fd4109f79b
                                                                          • Instruction ID: 3b862fc7fd2e5b693e5022745d1db89a568c06b8bf6d8d37a7cbc06f2a09dc91
                                                                          • Opcode Fuzzy Hash: 199fe2e14f668de4bece8bf26995f7f2713f0e90272e9feaed7c05fd4109f79b
                                                                          • Instruction Fuzzy Hash: A621FC275482C51FC7034B6888147EE7F7BAB87244F7A80B8DDD29E382D7229C039764
                                                                          APIs
                                                                          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,00000008,?,?,?,?,?,70377472,00000000), ref: 703777C4
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: CreateEvent
                                                                          • String ID:
                                                                          • API String ID: 2692171526-0
                                                                          • Opcode ID: cdd0929627ed84c6a24e99d46aecf1d1bc6e45edb5eb054e4089a99b8bce2590
                                                                          • Instruction ID: 065419a3d44dcb5dd0ef1caf9c38795f02f9f6972d21c74266b3237c6580a7a5
                                                                          • Opcode Fuzzy Hash: cdd0929627ed84c6a24e99d46aecf1d1bc6e45edb5eb054e4089a99b8bce2590
                                                                          • Instruction Fuzzy Hash: E3119372D02124BBD715DBA6CC89FAE3B7DFB00751F22A11AF902E6254E3744910CBE1
                                                                          APIs
                                                                          • ResetEvent.KERNEL32(?,?,00000000,00000044,00000044,?,7038E80F,703D2DB0,?,7038E842,00000001), ref: 7038DA19
                                                                          • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000008,?,?,?,?,00000000,00000044,00000044,?,7038E80F,703D2DB0,?,7038E842), ref: 7038DA40
                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,00000000,00000044,00000044,?,7038E80F,703D2DB0,?,7038E842,00000001), ref: 7038DA4F
                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00000044,00000044,?,7038E80F,703D2DB0,?,7038E842,00000001), ref: 7038DA58
                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00000044,00000044,?,7038E80F,703D2DB0,?,7038E842,00000001), ref: 7038DA61
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: CloseHandle$CompletionEventObjectPostQueuedResetSingleStatusWait
                                                                          • String ID:
                                                                          • API String ID: 1080586081-0
                                                                          • Opcode ID: cca79c6c00c1eaa0527a71fb228612dfbb7215c66eb6c948050b6c80bea2963d
                                                                          • Instruction ID: c8fa53479b3964c7190138c7cd56f499cad313fbb22dd14ea402a4e2791b7d78
                                                                          • Opcode Fuzzy Hash: cca79c6c00c1eaa0527a71fb228612dfbb7215c66eb6c948050b6c80bea2963d
                                                                          • Instruction Fuzzy Hash: E7012872605210AFDB289B56CD09B5EBBBDEF40B10F21459DE957A32E0DBB4ED40CB60
                                                                          APIs
                                                                            • Part of subcall function 70370658: RegisterGadgetProperty.UXCORE(7030AB6C,70372152,70372505,7036725D,?,?,70315903,?,?), ref: 7037065D
                                                                          • DUserRegisterGuts.UXCORE(703D2360,?,70372505,7036725D,?,?,70315903,?,?), ref: 703721C2
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Register$GadgetGutsPropertyUser
                                                                          • String ID: AlphaFlow$Flow$`#=p
                                                                          • API String ID: 1627608279-3325882180
                                                                          • Opcode ID: 5a394308cd973dd5527febcfd2f1ce67d878575f8b7dc09af96d02be9b463015
                                                                          • Instruction ID: 9817036b4eb097127182ef6f74d3c2faca6c77139cd092b488c8a23ab4ca3ca1
                                                                          • Opcode Fuzzy Hash: 5a394308cd973dd5527febcfd2f1ce67d878575f8b7dc09af96d02be9b463015
                                                                          • Instruction Fuzzy Hash: 98F03ABA215A019EE7408F3BD855F0937E9B3A2706F70955CE110CA364DBBE5006CB14
                                                                          APIs
                                                                          • DUserRegisterGuts.UXCORE(703D2450,?,7037253B,7036725D,?,?,70315903,?,?), ref: 703723D3
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: GutsRegisterUser
                                                                          • String ID: Interpolation$LinearInterpolation$P$=p
                                                                          • API String ID: 554971792-1562919785
                                                                          • Opcode ID: b5d5a9e883f63c63b73acb1fb3ca6356cae487655b986fe6d4698597b4c5ac55
                                                                          • Instruction ID: 19a9d25f9e1eec9af3cb4d3cdd8dfe694e7e72f84254f0360642e97697a63b90
                                                                          • Opcode Fuzzy Hash: b5d5a9e883f63c63b73acb1fb3ca6356cae487655b986fe6d4698597b4c5ac55
                                                                          • Instruction Fuzzy Hash: 7CF0307B1056409EE7408F2BE854F493BF9A361309FB0E518D8408F3A8CFFA504ACB54
                                                                          APIs
                                                                          • DUserRegisterGuts.UXCORE(703D224C,?,7036A5DD,70367254,?,?,70315903,?,?), ref: 7036A5AB
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: GutsRegisterUser
                                                                          • String ID: L"=p$Root$Visual
                                                                          • API String ID: 554971792-903910022
                                                                          • Opcode ID: 6fa2c01009d654dc63a4f6349ce9e2f26571e773917f3c446ba44154ee912962
                                                                          • Instruction ID: c1f981fa5b0ed95af74848b10a7e41ba1e9f05c3d57dc28bbfeee89b9da28a35
                                                                          • Opcode Fuzzy Hash: 6fa2c01009d654dc63a4f6349ce9e2f26571e773917f3c446ba44154ee912962
                                                                          • Instruction Fuzzy Hash: 2DF01CBB1056418EE784CF2BE804F0937A9E3A5305B70DA58F1108A2B8D7FA4046CF15
                                                                          APIs
                                                                          • DUserRegisterGuts.UXCORE(703D2478,?,70372544,7036725D,?,?,70315903,?,?), ref: 70371E59
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: GutsRegisterUser
                                                                          • String ID: Interpolation$LogInterpolation$x$=p
                                                                          • API String ID: 554971792-26083439
                                                                          • Opcode ID: 2a7a97e57b6a92105236f1ca13f210105fd1a77dda17a34caead626ca69bc7f0
                                                                          • Instruction ID: f19686ba6b2736d1c72afaded4d7e7fd9d46cdcb23a08894509cb29a2a14cdcd
                                                                          • Opcode Fuzzy Hash: 2a7a97e57b6a92105236f1ca13f210105fd1a77dda17a34caead626ca69bc7f0
                                                                          • Instruction Fuzzy Hash: 5FF01CBB2146059BE344CF2BD851B0977BEA361308FB1E11CDD118B3A4D7BA4049AB64
                                                                          APIs
                                                                          • DUserSendEvent.UXCORE(()=p,00000000), ref: 7037709D
                                                                            • Part of subcall function 70379670: TlsGetValue.KERNEL32(?,703770A2,()=p,00000000), ref: 703796B6
                                                                          • OutputDebugStringA.KERNEL32(ERROR: RequestInitGdiplus failed,()=p,00000000), ref: 703770AE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: DebugEventOutputSendStringUserValue
                                                                          • String ID: ()=p$ERROR: RequestInitGdiplus failed
                                                                          • API String ID: 4003302160-724753262
                                                                          • Opcode ID: 82ebd681e4416a09c82f5632e109d702ad7268b69f6ad486b0955b53a0e1accd
                                                                          • Instruction ID: 2f41cd6ae109c240020314179506c28179a05f236b9d0a9deefa0783f0359f63
                                                                          • Opcode Fuzzy Hash: 82ebd681e4416a09c82f5632e109d702ad7268b69f6ad486b0955b53a0e1accd
                                                                          • Instruction Fuzzy Hash: C6E039716002099BDB10DFA9DC89F9D37BCB744319F204515E502D63A0D7B49596CB62
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: mallocmemcpymemset
                                                                          • String ID: l
                                                                          • API String ID: 1097350464-2517025534
                                                                          • Opcode ID: e30bc1f7a2003273da2f4a451d8a0b23d8056f55aeb5d5878bb37f8609abb785
                                                                          • Instruction ID: 4d66582c8cecf1b493d654689f023dea9c4e2a79b1435811e6b97e3824e1221e
                                                                          • Opcode Fuzzy Hash: e30bc1f7a2003273da2f4a451d8a0b23d8056f55aeb5d5878bb37f8609abb785
                                                                          • Instruction Fuzzy Hash: A5F10975E006099FCB08CFA9C981ADEB7F6BF8C314F158269E819AB354D735A942CF50
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: mallocmemcpymemset
                                                                          • String ID: l
                                                                          • API String ID: 1097350464-2517025534
                                                                          • Opcode ID: c784d4ab143c4cc5d09966805584bd8c19d5a2efd5a36d5a406728dc0aeb3841
                                                                          • Instruction ID: d72d55fa4e1a81ffd51e4e54c6e793efe1b82bccc37619965bbb7cd86016f9eb
                                                                          • Opcode Fuzzy Hash: c784d4ab143c4cc5d09966805584bd8c19d5a2efd5a36d5a406728dc0aeb3841
                                                                          • Instruction Fuzzy Hash: 4FF10775E006099FCB08CFA8C981ADEBBF6BF8C314F158269E919AB355D731A941CF50
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: mallocmemcpymemset
                                                                          • String ID: l
                                                                          • API String ID: 1097350464-2517025534
                                                                          • Opcode ID: e362ae4783567034c2a2a29c516cf7591777eeb44fcb12e3bfdba701d923d796
                                                                          • Instruction ID: fd708ac47b1f9ee7705d3b43d0b44cb74313953639f0d3142a9bc5d8c5e8027c
                                                                          • Opcode Fuzzy Hash: e362ae4783567034c2a2a29c516cf7591777eeb44fcb12e3bfdba701d923d796
                                                                          • Instruction Fuzzy Hash: EEF11D75E006199FCF08CF99C991AEEBBB6BF88314F158259E819AB344D731AD41CF90
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: mallocmemcpymemset
                                                                          • String ID: l
                                                                          • API String ID: 1097350464-2517025534
                                                                          • Opcode ID: a84890a726a0d6f9ac38734c4cd728476ff331bfaf9b1c90f5f550aae7f17d5c
                                                                          • Instruction ID: 85bc66747c0679254adf449acc02ec9c757cba3c718fe54075813834d91310f7
                                                                          • Opcode Fuzzy Hash: a84890a726a0d6f9ac38734c4cd728476ff331bfaf9b1c90f5f550aae7f17d5c
                                                                          • Instruction Fuzzy Hash: DBF10D75E005199FCF08CF98C991AEDBBB6BF88314F158259E815AB394D731AD41CF90
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: memset$malloc
                                                                          • String ID: l
                                                                          • API String ID: 1671641884-2517025534
                                                                          • Opcode ID: 5a4165d064ea80c925cba754b5e0680fb8620f61c62f8ccfd3aaa8987bec9c62
                                                                          • Instruction ID: 9d0b599730f6c0f5019a3ba04d0a42fc6c4513514a4e879f6f24285a2c9b99be
                                                                          • Opcode Fuzzy Hash: 5a4165d064ea80c925cba754b5e0680fb8620f61c62f8ccfd3aaa8987bec9c62
                                                                          • Instruction Fuzzy Hash: E2F11976E0061A9FCB18CFA9C981ADEBBB5FF4C310F158269E919A7344D734A941CF90
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: memset$malloc
                                                                          • String ID: l
                                                                          • API String ID: 1671641884-2517025534
                                                                          • Opcode ID: 828062857a7f30f7ad26017f1caf909e5ad9ebab16ade2110c678275d37dee5a
                                                                          • Instruction ID: 5e57b9f0579f094c8828458e5cee751fd0618170051275cb585c2ec1d181a019
                                                                          • Opcode Fuzzy Hash: 828062857a7f30f7ad26017f1caf909e5ad9ebab16ade2110c678275d37dee5a
                                                                          • Instruction Fuzzy Hash: 26F14976E006199FCB08CFA8C981ADEBBB5FF4C314F15822AE919A7345D734A941CF90
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: mallocmemset
                                                                          • String ID: l
                                                                          • API String ID: 2882185209-2517025534
                                                                          • Opcode ID: 623e22e774c026640218f7bb0fb2ca70a4c149041f52626bd3f7616bf7ad3a87
                                                                          • Instruction ID: 9ce245be0a70dc23dbbc429793ccf90d1f6b5a65a06b05a41318372c9234c6cb
                                                                          • Opcode Fuzzy Hash: 623e22e774c026640218f7bb0fb2ca70a4c149041f52626bd3f7616bf7ad3a87
                                                                          • Instruction Fuzzy Hash: 9FE12875E0060A9FCB08CF99C981AEEBBB6BF8D304F15856DE40AA7354D734A941CB50
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: mallocmemset
                                                                          • String ID: l
                                                                          • API String ID: 2882185209-2517025534
                                                                          • Opcode ID: e7400a0e082cf121dd91715a9589864e2ee2fcd5f38626cecdb9010a88bba43c
                                                                          • Instruction ID: 76150e82b96f27b5e7984388dcc70810cfc654dcc5214f2b43d23394c98ff605
                                                                          • Opcode Fuzzy Hash: e7400a0e082cf121dd91715a9589864e2ee2fcd5f38626cecdb9010a88bba43c
                                                                          • Instruction Fuzzy Hash: A6E13971E0060A9FCF18CF99C991AEEBBB6BF8C300F25856DE50AA7354D734A941CB50
                                                                          APIs
                                                                          • memset.MSVCR80 ref: 7031D2E8
                                                                          • malloc.MSVCR80 ref: 7031D39F
                                                                          • memcpy.MSVCR80(?,00000000,?,00000000), ref: 7031D55A
                                                                            • Part of subcall function 7031BE60: memset.MSVCR80 ref: 7031BE90
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: memset$mallocmemcpy
                                                                          • String ID: l
                                                                          • API String ID: 1726687030-2517025534
                                                                          • Opcode ID: 1e4eb70bf259e8eea6701463b8ce6af34cbc0047d3f43a7be835a1709a8223a7
                                                                          • Instruction ID: a94d2e9ad712655f5a0712e7ef9173d40a88e4a39f7e15febad39c6a26507664
                                                                          • Opcode Fuzzy Hash: 1e4eb70bf259e8eea6701463b8ce6af34cbc0047d3f43a7be835a1709a8223a7
                                                                          • Instruction Fuzzy Hash: 66D10775E0021A9FCF08CFA9C981AEDBBB6BF8D314F158169E919AB344D734A941CF50
                                                                          APIs
                                                                          • memset.MSVCR80 ref: 7031CF18
                                                                          • malloc.MSVCR80 ref: 7031CFCF
                                                                          • memcpy.MSVCR80(?,00000000,?,00000000), ref: 7031D18A
                                                                            • Part of subcall function 7031BCA0: memset.MSVCR80 ref: 7031BCD0
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: memset$mallocmemcpy
                                                                          • String ID: l
                                                                          • API String ID: 1726687030-2517025534
                                                                          • Opcode ID: 864c49e52b29398dfa6b5298242155813762c47ad97e8d1ad802926c42bfcfb1
                                                                          • Instruction ID: 47219da3c92d3048beb3ea45995320362561bbbf721e7618ab4f28aabaacb1f6
                                                                          • Opcode Fuzzy Hash: 864c49e52b29398dfa6b5298242155813762c47ad97e8d1ad802926c42bfcfb1
                                                                          • Instruction Fuzzy Hash: 9FD1F875E0060A9FCF08CFA9C981AEDBBB6BF8D310F158169E919AB344D735A941CF50
                                                                          APIs
                                                                          • malloc.MSVCR80 ref: 7036D58B
                                                                          • IntersectRect.USER32(00000000,00000002,00000000), ref: 7036D685
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: IntersectRectmalloc
                                                                          • String ID:
                                                                          • API String ID: 582184699-0
                                                                          • Opcode ID: f3210f1a8efa069aacc1cb7be98a1c3d4bb481e3ed195b2af6f73f0eff269b77
                                                                          • Instruction ID: 347d3184de0270afa2fd299189c57a5b1224813054b9288e125d71ee245af161
                                                                          • Opcode Fuzzy Hash: f3210f1a8efa069aacc1cb7be98a1c3d4bb481e3ed195b2af6f73f0eff269b77
                                                                          • Instruction Fuzzy Hash: 98419271D00219AFEF01DF98CC45EDDB7B9FF08214F10455AF606AB2A4D731A961CB64
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: malloc
                                                                          • String ID:
                                                                          • API String ID: 2803490479-0
                                                                          • Opcode ID: 6e4c87f6f74759f8abe91bb3e571dbc1861255a9cc28545ca534b4aa69d7b9a6
                                                                          • Instruction ID: a33bccf969904830250db9f40b3d8562a28ad56b61b386aa855b0eb1e6ed759a
                                                                          • Opcode Fuzzy Hash: 6e4c87f6f74759f8abe91bb3e571dbc1861255a9cc28545ca534b4aa69d7b9a6
                                                                          • Instruction Fuzzy Hash: 0A417CB1910A05DFCB14CF65C881D9EB7F9BF08324F124629E916AB3A1C730ED51CBA8
                                                                          APIs
                                                                          • ?StartDefer@Element@DirectUI@@SGXXZ.UXCORE(?,?,?,?,?,?,7038B7C5,?,?,?,7038C160,00000000,?,00000200,?), ref: 7038A12F
                                                                          • ?Included@ItemRange@@QBE_NJ@Z.UXCORE(00000001,?,?,?,?,?,?,7038B7C5,?,?,?,7038C160,00000000,?,00000200,?), ref: 7038A172
                                                                          • ?FocusElement@VirtualListView@@SGXPAVElement@DirectUI@@@Z.UXCORE(00000200,00000001,?,?,?,?,?,?,7038B7C5,?,?,?,7038C160,00000000,?,00000200), ref: 7038A19D
                                                                            • Part of subcall function 7033E879: ?CreateBool@Value@DirectUI@@SGPAV12@_N@Z.UXCORE(00000001,?,?,?,7038A189,?,00000001,?,?,?,?,?,?,7038B7C5), ref: 7033E885
                                                                          • ?EndDefer@Element@DirectUI@@SGXXZ.UXCORE(00000001,?,?,?,?,?,?,7038B7C5,?,?,?,7038C160,00000000,?,00000200,?), ref: 7038A20E
                                                                            • Part of subcall function 7037CF5E: memset.MSVCR80 ref: 7037CF70
                                                                            • Part of subcall function 7037CF5E: TraceEvent.ADVAPI32(00000100,?,00000038), ref: 7037CFA9
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: DirectElement@$Defer@$Bool@CreateEventFocusI@@@Included@ItemListRange@@StartTraceV12@_Value@View@@Virtualmemset
                                                                          • String ID:
                                                                          • API String ID: 2460363206-0
                                                                          • Opcode ID: 3bb0cbdcb5709f7910438464459ec39b7c4e7af4a459c8eb2581f8bbf42caeef
                                                                          • Instruction ID: af744cc426e0489db6669e0442fb54e764a7416a4d109895eae903eb28210d5e
                                                                          • Opcode Fuzzy Hash: 3bb0cbdcb5709f7910438464459ec39b7c4e7af4a459c8eb2581f8bbf42caeef
                                                                          • Instruction Fuzzy Hash: 14319F30604A40AFEB16DB65C885FAEB7AAAF41314F01848DE46B5B2E1CB25FC46C770
                                                                          APIs
                                                                          • TlsGetValue.KERNEL32(00000000,00000008,00000001,?,70377566,00000000,00000008,00000001,?), ref: 703675A0
                                                                          • HeapAlloc.KERNEL32(00000000,00000010,?,70377566,00000000,00000008,00000001,?), ref: 703675D1
                                                                          • TlsSetValue.KERNEL32(fu7p,?,70377566,00000000,00000008,00000001,?), ref: 70367668
                                                                            • Part of subcall function 70367349: HeapCreate.KERNEL32(00000000,00040000,00000000,00000001,00000000,?,70367612,?,?,70377566,00000000,00000008,00000001,?), ref: 70367364
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: HeapValue$AllocCreate
                                                                          • String ID: fu7p
                                                                          • API String ID: 371077168-2905672816
                                                                          • Opcode ID: d505e8fef2a486f3f6a9852b628023310c260f913bb35bd4f11399e94182968f
                                                                          • Instruction ID: ffc2c0134b31534d3181ffb3a5310f19897cca66cdf5b56dc053dcb40b10969e
                                                                          • Opcode Fuzzy Hash: d505e8fef2a486f3f6a9852b628023310c260f913bb35bd4f11399e94182968f
                                                                          • Instruction Fuzzy Hash: 8931C572500B068FC721CF1DC88494E77E9FB40362761CA2EE5A79B268D7709C11CF94
                                                                          APIs
                                                                          • CreateCompatibleBitmap.GDI32(?,00000001,00000001), ref: 70315B06
                                                                          • GetDIBits.GDI32(?,?,00000000,00000001,00000000,?,00000000), ref: 70315B40
                                                                          • GetDIBits.GDI32(?,?,00000000,00000001,00000000,?,00000000), ref: 70315B67
                                                                          • DeleteObject.GDI32(?), ref: 70315BB5
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Bits$BitmapCompatibleCreateDeleteObject
                                                                          • String ID:
                                                                          • API String ID: 2475891097-0
                                                                          • Opcode ID: 7277b19b43b616eb4fcdbde56030b53d4edc99d2c024fdd76b2a33545abe4dd8
                                                                          • Instruction ID: f10728c37726d34e0039db6dd704e2f8a8c4067346a69cb9e192137ab3cbbd0f
                                                                          • Opcode Fuzzy Hash: 7277b19b43b616eb4fcdbde56030b53d4edc99d2c024fdd76b2a33545abe4dd8
                                                                          • Instruction Fuzzy Hash: B9218D72808249FEEB198F58C884A9EBFBAEB49350F11C06AF5469A240D3719DC68B50
                                                                          APIs
                                                                          • HeapCreate.KERNEL32(00000000,00040000,00000000,?,?,?,70315913,?,?), ref: 70349CC7
                                                                          • TlsAlloc.KERNEL32(?,?,70315913,?,?), ref: 70349CD6
                                                                          • TlsFree.KERNEL32(FFFFFFFF,?,?,70315913,?,?), ref: 70349D61
                                                                          • HeapDestroy.KERNEL32(00000000,?,?,70315913,?,?), ref: 70349D78
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Heap$AllocCreateDestroyFree
                                                                          • String ID:
                                                                          • API String ID: 1372329789-0
                                                                          • Opcode ID: 62f4afc3ce6ad28bfd7cf9433b82878061e01ca7d8a9f6b6f1bedc3a842297a4
                                                                          • Instruction ID: 0fbb2bc9d12dbe1462b5eaaa59e02593e3bc79a3bbc0d50667412ad263213e68
                                                                          • Opcode Fuzzy Hash: 62f4afc3ce6ad28bfd7cf9433b82878061e01ca7d8a9f6b6f1bedc3a842297a4
                                                                          • Instruction Fuzzy Hash: 74216D72A002009FC710AF6A9C89B6E77EEAB862543701A1BF123CE3B0D775A841DB50
                                                                          APIs
                                                                          • ?InitProcess@DirectUI@@YGJXZ.UXCORE(?,?), ref: 7031590E
                                                                          • ?RMInitialize@@YGXXZ.UXCORE(?,?), ref: 70315917
                                                                          • ?Register@WLEditT@@SGJXZ.UXCORE(?,?), ref: 70315925
                                                                          • ?Register@VirtualListView@@SGJXZ.UXCORE(?,?), ref: 7031592E
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Register@$DirectEditInitInitialize@@ListProcess@View@@Virtual
                                                                          • String ID:
                                                                          • API String ID: 3972834298-0
                                                                          • Opcode ID: 9796e2f22000edc52f1074e6779941beb8704f8b7f12d62621f05ef34a23c92f
                                                                          • Instruction ID: df72fe7d64c1c9a26423d6201f7f1ebfbaafe419cbbbf86f66db168b282ea820
                                                                          • Opcode Fuzzy Hash: 9796e2f22000edc52f1074e6779941beb8704f8b7f12d62621f05ef34a23c92f
                                                                          • Instruction Fuzzy Hash: 28E09262641AA7DEF60567BE4B01B4F229C0D782B0B05045BBD47DE310EB10FC8386B7
                                                                          APIs
                                                                          • EnterCriticalSection.KERNEL32(703D217C,?,00000000,?,7037A9D2,?,00000002,?,?,?,70373B79,7030B14C,70371BFE,703724E1,7036725D), ref: 70379499
                                                                          • LeaveCriticalSection.KERNEL32(703D217C,?,?,?,?,00000000,?,7037A9D2,?,00000002,?,?,?,70373B79,7030B14C,70371BFE), ref: 703794BE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: CriticalSection$EnterLeave
                                                                          • String ID: l!=p$|!=p
                                                                          • API String ID: 3168844106-3185462832
                                                                          • Opcode ID: cc474afef593ebd6d28756045eabf79939665875038845b58780d28aacadacde
                                                                          • Instruction ID: 869148b2879f8eddd35cc24c34547fb08a92e6a362627c4b0395a49599bc12a2
                                                                          • Opcode Fuzzy Hash: cc474afef593ebd6d28756045eabf79939665875038845b58780d28aacadacde
                                                                          • Instruction Fuzzy Hash: BCE01237102514BBC7115B57CD09F5E7BAEAB95262F21C026F71A92260CA354912C6A4
                                                                          APIs
                                                                          • EnterCriticalSection.KERNEL32(703D29B4,00000002,?,703785F9), ref: 703792D0
                                                                          • OleUninitialize.OLE32(00000002,?,703785F9), ref: 703792DB
                                                                          • CoUninitialize.OLE32(00000002,?,703785F9), ref: 703792E6
                                                                          • LeaveCriticalSection.KERNEL32(703D29B4,00000002,?,703785F9), ref: 703792FC
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: CriticalSectionUninitialize$EnterLeave
                                                                          • String ID:
                                                                          • API String ID: 2838938670-0
                                                                          • Opcode ID: 0ff7f05b9a4f99efc87bf667255b001890c77eccd6cc65ba64b2482b301d02dc
                                                                          • Instruction ID: daae03703d6f637862412f114375219a3aaba80ef7729289a04a81c1e3d9d3cf
                                                                          • Opcode Fuzzy Hash: 0ff7f05b9a4f99efc87bf667255b001890c77eccd6cc65ba64b2482b301d02dc
                                                                          • Instruction Fuzzy Hash: 88E092320021489BC3122F63DC9CB683BBDBB96311F36A51FF443912B297790881DB24
                                                                          APIs
                                                                          • memset.MSVCR80 ref: 7037CF70
                                                                          • TraceEvent.ADVAPI32(00000100,?,00000038), ref: 7037CFA9
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: EventTracememset
                                                                          • String ID: 8
                                                                          • API String ID: 2224389777-4194326291
                                                                          • Opcode ID: 771f5a9cbee078310e6d704b2a8a3dae2feb38a7bcd89afed17fb4e77a552fd2
                                                                          • Instruction ID: 7494e562c726adc68a9684ba1bfb0759a3655b59f5c59b6fbfae66c2a3c71d01
                                                                          • Opcode Fuzzy Hash: 771f5a9cbee078310e6d704b2a8a3dae2feb38a7bcd89afed17fb4e77a552fd2
                                                                          • Instruction Fuzzy Hash: 7EF0173690124CBACF01DF95E845ACFBF7AEF96310F004056FD00AB250D271A619CBA1
                                                                          APIs
                                                                            • Part of subcall function 70373E0F: RegisterGadgetProperty.UXCORE(7030B15C,70371829,703724EA,7036725D,?,?,70315903,?,?), ref: 70373E14
                                                                          • DUserRegisterGuts.UXCORE(703D22E8,?,703724EA,7036725D,?,?,70315903,?,?), ref: 70371899
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Register$GadgetGutsPropertyUser
                                                                          • String ID: DropTarget$"=p
                                                                          • API String ID: 1627608279-850056363
                                                                          • Opcode ID: 3d215b2645979c4eda68a035d83ad9c04570d686059831f5a1168cbe9ecfb04b
                                                                          • Instruction ID: fbbed8cd2cdfb2cd179399b62ddc86c1eaf58f9ec29bfb6bd067d2c14b57fd72
                                                                          • Opcode Fuzzy Hash: 3d215b2645979c4eda68a035d83ad9c04570d686059831f5a1168cbe9ecfb04b
                                                                          • Instruction Fuzzy Hash: 1DF05EB72026065AD384CF2BDD80F0E3BA9A765304F70DA18F1208A264D7FA80429B59
                                                                          APIs
                                                                            • Part of subcall function 703708DC: RegisterGadgetProperty.UXCORE(7030AB8C,703721D9,7037250E,7036725D,?,?,70315903,?,?), ref: 703708E1
                                                                          • DUserRegisterGuts.UXCORE(703D2388,?,7037250E,7036725D,?,?,70315903,?,?), ref: 70372249
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Register$GadgetGutsPropertyUser
                                                                          • String ID: Flow$RectFlow
                                                                          • API String ID: 1627608279-2833845405
                                                                          • Opcode ID: 83f39b9537e24b5fdf788231ac1b39d793a6f2ec571ccc3d3f91dae1926919f3
                                                                          • Instruction ID: 85528e92b05bf66e3cc3f53730dbdeec2cd217496e0a9a834aaf63e164ed83e2
                                                                          • Opcode Fuzzy Hash: 83f39b9537e24b5fdf788231ac1b39d793a6f2ec571ccc3d3f91dae1926919f3
                                                                          • Instruction Fuzzy Hash: C0F05EBF2016069FE7048F3BDD42F0A37E9A3A2704F71D628E504DE254D7BE90458B51
                                                                          APIs
                                                                            • Part of subcall function 70370A70: RegisterGadgetProperty.UXCORE(7030AB9C,70372260,70372517,7036725D,?,?,70315903,?,?), ref: 70370A75
                                                                          • DUserRegisterGuts.UXCORE(703D23B0,?,70372517,7036725D,?,?,70315903,?,?), ref: 703722D0
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Register$GadgetGutsPropertyUser
                                                                          • String ID: Flow$RotateFlow
                                                                          • API String ID: 1627608279-4292475050
                                                                          • Opcode ID: fd21ef5de1af10185776aa96b2cec1d388425a4c5e03663c454fe0f48743bf0d
                                                                          • Instruction ID: ee674ce6326b401278a17325f24d6650b76c6eabd36df8485894d24feaaab556
                                                                          • Opcode Fuzzy Hash: fd21ef5de1af10185776aa96b2cec1d388425a4c5e03663c454fe0f48743bf0d
                                                                          • Instruction Fuzzy Hash: F8F03ABB2096419AE7458F2BDD40F093BE9E3A1704F31E918F500CA2A8DBBE9005DB24
                                                                          APIs
                                                                            • Part of subcall function 70370CE2: RegisterGadgetProperty.UXCORE(7030AB7C,703722E7,70372520,7036725D,?,?,70315903,?,?), ref: 70370CE7
                                                                          • DUserRegisterGuts.UXCORE(703D23D8,?,70372520,7036725D,?,?,70315903,?,?), ref: 70372357
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: Register$GadgetGutsPropertyUser
                                                                          • String ID: Flow$ScaleFlow
                                                                          • API String ID: 1627608279-4073241970
                                                                          • Opcode ID: 00999291909071fc9337bc3de5bdd5b968810f273be1431125fc1905aa9c3ef9
                                                                          • Instruction ID: 30630a7f8739059bdcac4b81e4e40b82b9a620d57677edee97289877708a589c
                                                                          • Opcode Fuzzy Hash: 00999291909071fc9337bc3de5bdd5b968810f273be1431125fc1905aa9c3ef9
                                                                          • Instruction Fuzzy Hash: 18F0307A2016015BD344CF2BDD94F0E37E9E361704F309A18E111CE254D7FE90498B54
                                                                          APIs
                                                                          • DUserRegisterGuts.UXCORE(703D2224,?,7036A5D4,70367254,?,?,70315903,?,?), ref: 7036A43F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: GutsRegisterUser
                                                                          • String ID: $"=p$Visual
                                                                          • API String ID: 554971792-51452228
                                                                          • Opcode ID: 10f322faa66b63cb9476e0fefa76944af968ea78d699868e5d989a28e174791c
                                                                          • Instruction ID: b0a0b199f28379ddd43d58ae0d977688d29feac28debf502f8ad293278446866
                                                                          • Opcode Fuzzy Hash: 10f322faa66b63cb9476e0fefa76944af968ea78d699868e5d989a28e174791c
                                                                          • Instruction Fuzzy Hash: F5F03A766056098AD3848F67E840F0E37A9A765304F309E28F4108E2A8D7F781428F19
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: P(=p$Visual
                                                                          • API String ID: 0-1523099900
                                                                          • Opcode ID: 6bf00479dc95042451cc95ac27697aa673f08ce60af51c98dd597ad6d0e8fe2a
                                                                          • Instruction ID: ea6a00f9451605115dd9a4592dd536889ee0ce1c9837a10d6ed76b53aa3add59
                                                                          • Opcode Fuzzy Hash: 6bf00479dc95042451cc95ac27697aa673f08ce60af51c98dd597ad6d0e8fe2a
                                                                          • Instruction Fuzzy Hash: 10E048762019417EE3449B7FCC50B5A73EDAB68305F20547DE412C71B4D7B98846BB12
                                                                          APIs
                                                                          • DUserRegisterGuts.UXCORE(703D2400,?,70372529,7036725D,?,?,70315903,?,?), ref: 703724CA
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: GutsRegisterUser
                                                                          • String ID: Listener$Sequence
                                                                          • API String ID: 554971792-287765493
                                                                          • Opcode ID: 3704d76e7e61a76b6b3e70e6c357d8645aa8c35f3ed95bd9f7945d7b4a20f4cc
                                                                          • Instruction ID: 006a479f118bfd275819a065cf0ef20134b7bff6a0b01acd2268ff8d89ebf9ee
                                                                          • Opcode Fuzzy Hash: 3704d76e7e61a76b6b3e70e6c357d8645aa8c35f3ed95bd9f7945d7b4a20f4cc
                                                                          • Instruction Fuzzy Hash: 8BF030B71042058AE7408F2BDE54F0D37B9E361308FB0E528D9108B2A9D7FA409A8B65
                                                                          APIs
                                                                          • DUserRegisterGuts.UXCORE(703D24A0,?,7037254D,7036725D,?,?,70315903,?,?), ref: 70371ED5
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: GutsRegisterUser
                                                                          • String ID: ExpInterpolation$Interpolation
                                                                          • API String ID: 554971792-1694254177
                                                                          • Opcode ID: 094707cab3d8c8ca84c868413909ad90ffc4242e47f0c6195227ec40b524b651
                                                                          • Instruction ID: 536b071c3dd25352029bb96c1337d1571f477926e0231f1475b03ef68d058a80
                                                                          • Opcode Fuzzy Hash: 094707cab3d8c8ca84c868413909ad90ffc4242e47f0c6195227ec40b524b651
                                                                          • Instruction Fuzzy Hash: 49F01CB71046019EE341CF2BD896B0A77BAB7A131CFB2E11CE9028B364D7FA40058B54
                                                                          APIs
                                                                          • DUserRegisterGuts.UXCORE(703D24C8,?,70372556,7036725D,?,?,70315903,?,?), ref: 70371F51
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: GutsRegisterUser
                                                                          • String ID: Interpolation$SCurveInterpolation
                                                                          • API String ID: 554971792-356549333
                                                                          • Opcode ID: ddd0f122f76b0764877d2fd4cce0514b08f0f6ad3e1fa7dac73455033fb570cf
                                                                          • Instruction ID: 8a0ebd9bd3fc7cb4ea07c442ff0cfcd958fae6a3f75ab0f556470310f38ac6bf
                                                                          • Opcode Fuzzy Hash: ddd0f122f76b0764877d2fd4cce0514b08f0f6ad3e1fa7dac73455033fb570cf
                                                                          • Instruction Fuzzy Hash: E9F01CB71006058BE744CF2FED50B093BBEB3A1308F72E158E9058B364D7BA40459B24
                                                                          APIs
                                                                          • DUserRegisterSuper.UXCORE(703D2820,?,7037236E,7037253B,7036725D,?,?,70315903,?,?), ref: 703769A8
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: RegisterSuperUser
                                                                          • String ID: (=p$Interpolation
                                                                          • API String ID: 2297203629-1707983260
                                                                          • Opcode ID: 5f285024d040a5d21c415a6a16e814a9e990085d065128ee03843c33b8bbfa56
                                                                          • Instruction ID: dfb5376b4b385bf6b9e6ba7f30f22bb6352afad6febb629b68f0006038e5ca10
                                                                          • Opcode Fuzzy Hash: 5f285024d040a5d21c415a6a16e814a9e990085d065128ee03843c33b8bbfa56
                                                                          • Instruction Fuzzy Hash: A3E08CB2601501AFE74D8B7EE850B49B7EDEB78300B30003EE502C22B0CBB28880B765
                                                                          APIs
                                                                          • DUserRegisterStub.UXCORE(703D26E0,?,703767AD,?,70367269,?,?,70315903,?,?), ref: 703761A4
                                                                            • Part of subcall function 7037BA29: SetLastError.KERNEL32(80070057,?,?,7037614B,703D26F4,?,703767A8,?,70367269,?,?,70315903,?,?), ref: 7037BA5F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLastRegisterStubUser
                                                                          • String ID: Listener$&=p
                                                                          • API String ID: 2013390475-3947555299
                                                                          • Opcode ID: 9f50754ff47399666514370cc31ca721240e344033616364e8db528bd33898be
                                                                          • Instruction ID: 1ae85efe8ed3026d8d4b4de0251983f068bef4dba043eb9dda9dc8c86fdba8ba
                                                                          • Opcode Fuzzy Hash: 9f50754ff47399666514370cc31ca721240e344033616364e8db528bd33898be
                                                                          • Instruction Fuzzy Hash: A1E0B6B62153018BE708CF6BDC14F5A3BADA3A0314B30812DA415CB2B1DBFAC4559B60
                                                                          APIs
                                                                          • DUserRegisterStub.UXCORE(703D267C,?,703767C6,?,70367269,?,?,70315903,?,?), ref: 7037637A
                                                                            • Part of subcall function 7037BA29: SetLastError.KERNEL32(80070057,?,?,7037614B,703D26F4,?,703767A8,?,70367269,?,?,70315903,?,?), ref: 7037BA5F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLastRegisterStubUser
                                                                          • String ID: LinearInterpolation$|&=p
                                                                          • API String ID: 2013390475-949280290
                                                                          • Opcode ID: 17ef757d80962d18f16651220b4a3b803d44046f091870cc6697f1bbd53c7849
                                                                          • Instruction ID: 5c3a5364c4fc9d8e4fd788146abc3cc961d5816b475b28147d72035cf9120d1b
                                                                          • Opcode Fuzzy Hash: 17ef757d80962d18f16651220b4a3b803d44046f091870cc6697f1bbd53c7849
                                                                          • Instruction Fuzzy Hash: F4E09AB61017025AE7488F2BE814B5977A9A7B8314B31412DA805876A0C7F5C411AB24
                                                                          APIs
                                                                          • DUserRegisterStub.UXCORE(703D2668,?,703767CB,?,70367269,?,?,70315903,?,?), ref: 703763D8
                                                                            • Part of subcall function 7037BA29: SetLastError.KERNEL32(80070057,?,?,7037614B,703D26F4,?,703767A8,?,70367269,?,?,70315903,?,?), ref: 7037BA5F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLastRegisterStubUser
                                                                          • String ID: LogInterpolation$h&=p
                                                                          • API String ID: 2013390475-2494261804
                                                                          • Opcode ID: 909d55802d61c5e449a994f252e19503968d6ca3ebc5b63d56977527545379ef
                                                                          • Instruction ID: ee4e69fbfd9f592ec2673c883cc1474eac1e505015a7af5e39e97ed3499820a0
                                                                          • Opcode Fuzzy Hash: 909d55802d61c5e449a994f252e19503968d6ca3ebc5b63d56977527545379ef
                                                                          • Instruction Fuzzy Hash: 14E092B6202B018FE7088F2BE854F5A3BA9A7A5715F30416DE505CB6A0CBF5C855DB28
                                                                          APIs
                                                                          • DUserRegisterStub.UXCORE(703D2654,?,703767D0,?,70367269,?,?,70315903,?,?), ref: 70376436
                                                                            • Part of subcall function 7037BA29: SetLastError.KERNEL32(80070057,?,?,7037614B,703D26F4,?,703767A8,?,70367269,?,?,70315903,?,?), ref: 7037BA5F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLastRegisterStubUser
                                                                          • String ID: ExpInterpolation$T&=p
                                                                          • API String ID: 2013390475-3430947370
                                                                          • Opcode ID: d04a5157ce76317443753e6e02a01d633b973d31c759dc95bf0450b3aa103489
                                                                          • Instruction ID: 35796223b029f5cb02402ec870471b3a6f3cb83772f2df9d3b49c82dd8a5dce1
                                                                          • Opcode Fuzzy Hash: d04a5157ce76317443753e6e02a01d633b973d31c759dc95bf0450b3aa103489
                                                                          • Instruction Fuzzy Hash: DAE092F62123818FE7088F2BD844F5A3BA9E7B4314F30516DA505CA6A0CBF6C4568B24
                                                                          APIs
                                                                          • DUserRegisterStub.UXCORE(703D2640,?,703767D5,?,70367269,?,?,70315903,?,?), ref: 70376494
                                                                            • Part of subcall function 7037BA29: SetLastError.KERNEL32(80070057,?,?,7037614B,703D26F4,?,703767A8,?,70367269,?,?,70315903,?,?), ref: 7037BA5F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLastRegisterStubUser
                                                                          • String ID: @&=p$SCurveInterpolation
                                                                          • API String ID: 2013390475-834322660
                                                                          • Opcode ID: 903c367242f664cc0a293751423162a74b7ae2acfeca72f1c054eb9bf6269c83
                                                                          • Instruction ID: c9cf8fb0c35e5c1c04647dd9d1b73d1220460512f781c2eff5464b743f8ca8c9
                                                                          • Opcode Fuzzy Hash: 903c367242f664cc0a293751423162a74b7ae2acfeca72f1c054eb9bf6269c83
                                                                          • Instruction Fuzzy Hash: 2BE092B62093418FE7188F3BD804B5A3BA9A7A4314B31512DE545CA6B0CBF5C4128B24
                                                                          APIs
                                                                          • DUserRegisterStub.UXCORE(703D262C,?,703767DA,?,70367269,?,?,70315903,?,?), ref: 703764F2
                                                                            • Part of subcall function 7037BA29: SetLastError.KERNEL32(80070057,?,?,7037614B,703D26F4,?,703767A8,?,70367269,?,?,70315903,?,?), ref: 7037BA5F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLastRegisterStubUser
                                                                          • String ID: ,&=p$Animation
                                                                          • API String ID: 2013390475-4262056056
                                                                          • Opcode ID: 4f18ccebb295ffb613b80817517f481a7b6984a838fe1cb991a31774cae50112
                                                                          • Instruction ID: 0108406d0dcf11d957e19c57547ae7d32d0eb2be040decd9f740cd7408abfac2
                                                                          • Opcode Fuzzy Hash: 4f18ccebb295ffb613b80817517f481a7b6984a838fe1cb991a31774cae50112
                                                                          • Instruction Fuzzy Hash: 7EE0BFF69123008BD7088F6BD884F5977ADE7B4314F35512DA405C7261C7F9C415CB24
                                                                          APIs
                                                                          • DUserRegisterGuts.UXCORE(703D2338,?,703724FC,7036725D,?,?,70315903,?,?), ref: 70371D69
                                                                            • Part of subcall function 7037B9E1: SetLastError.KERNEL32(80070057,?,?,7036A4B8,703D21D4,?,7036A5C2,70367254,?,?,70315903,?,?), ref: 7037BA17
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorGutsLastRegisterUser
                                                                          • String ID: 8#=p$Flow
                                                                          • API String ID: 3989148403-561575188
                                                                          • Opcode ID: 75ff804ed8f869d2c3d25ef2890c181061f28ff642c5b41c7d32055392ed8a3c
                                                                          • Instruction ID: 1ca4fdb5dcd4f7b82cbf3c47376757535e90643b55b22b922d9656c1ccbcaae3
                                                                          • Opcode Fuzzy Hash: 75ff804ed8f869d2c3d25ef2890c181061f28ff642c5b41c7d32055392ed8a3c
                                                                          • Instruction Fuzzy Hash: A6F0C9BF6452449BD354CF6FDC44F193BA9A3A1718F78995CE1048A3A8C7FE80468B15
                                                                          APIs
                                                                          • DUserRegisterGuts.UXCORE(703D2428,?,70372532,7036725D,?,?,70315903,?,?), ref: 70371DDD
                                                                            • Part of subcall function 7037B9E1: SetLastError.KERNEL32(80070057,?,?,7036A4B8,703D21D4,?,7036A5C2,70367254,?,?,70315903,?,?), ref: 7037BA17
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 0000000E.00000002.1782303693.0000000070301000.00000020.00000001.01000000.00000008.sdmp, Offset: 70300000, based on PE: true
                                                                          • Associated: 0000000E.00000002.1782276366.0000000070300000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782378900.00000000703B3000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782434262.00000000703BF000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782457240.00000000703C0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782481431.00000000703D2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 0000000E.00000002.1782503138.00000000703D4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_14_2_70300000_Dashboard.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorGutsLastRegisterUser
                                                                          • String ID: ($=p$Interpolation
                                                                          • API String ID: 3989148403-3884189633
                                                                          • Opcode ID: c38d666f742e8ac1cef4c5e1a2756fb0a5df6881fae050fd8c0f919646761dd9
                                                                          • Instruction ID: e13fa39490a22cd32baf41f9082dec3375dd4f1a6d49f131aa0fbcf9d4bf7445
                                                                          • Opcode Fuzzy Hash: c38d666f742e8ac1cef4c5e1a2756fb0a5df6881fae050fd8c0f919646761dd9
                                                                          • Instruction Fuzzy Hash: 14F039B75852008BD354CF2BD894F0A3BB9E3A1318FF0A608D8148B3A4C7F600058B25

                                                                          Execution Graph

                                                                          Execution Coverage:7.8%
                                                                          Dynamic/Decrypted Code Coverage:49.9%
                                                                          Signature Coverage:2.1%
                                                                          Total number of Nodes:373
                                                                          Total number of Limit Nodes:12
                                                                          execution_graph 21295 140018fe4 44 API calls _RunAllParam 21434 14001bae4 39 API calls 21296 1400143e8 204 API calls 21346 7ff75d9359c1 VirtualAlloc calloc free malloc calloc 21347 1400200ec 39 API calls 21435 14001c2ec 163 API calls 21348 7ff75d9379c0 free 21349 1400190ef InitializeCriticalSection 21394 1400075f0 FindClose 21395 1400259f8 34 API calls 2 library calls 21396 14000f9f9 53 API calls 2 library calls 21297 14000bffc 130 API calls 2 library calls 21352 1400018fc 49 API calls 21298 14001d000 73 API calls _cwprintf_s_l 21353 14001e504 RedrawWindow 21299 140026008 35 API calls 21300 7ff75d9346a2 calloc free malloc calloc free 21398 14002420c 127 API calls 21232 14011bc1c 21233 14011bc21 _RunAllParam 21232->21233 21242 14011e988 21233->21242 21235 14011bc2e _RunAllParam 21256 1401232a8 21235->21256 21237 14011bd5a _RunAllParam 21260 140120b68 21237->21260 21239 14011be2e _RunAllParam 21240 14011be07 std::_Debug_message _RunAllParam 21240->21239 21241 7ff75d931157 29 API calls 21240->21241 21241->21239 21243 14011e9c4 _RunAllParam 21242->21243 21263 140120018 21243->21263 21245 14011f0c6 _RunAllParam 21267 14011dea8 21245->21267 21247 14011f23a 21248 140120018 _RunAllParam LoadLibraryExW 21247->21248 21249 14011f2b7 _RunAllParam 21248->21249 21271 14011ff38 CreateFileW 21249->21271 21251 14011f580 21280 14011fe28 CreateFileW 21251->21280 21253 14011f385 std::_Debug_message _RunAllParam 21253->21251 21277 14011f888 21253->21277 21255 14011f59a _RunAllParam 21255->21235 21257 1401232c3 _RunAllParam 21256->21257 21259 140123337 _RunAllParam 21257->21259 21284 14011d758 CreateFileW 21257->21284 21259->21237 21289 1401209f8 21260->21289 21262 140120b85 21262->21240 21265 14012003b _RunAllParam 21263->21265 21264 140120048 21264->21245 21265->21264 21266 14012006a LoadLibraryExW 21265->21266 21266->21264 21268 14011decf _RunAllParam 21267->21268 21269 140120018 _RunAllParam LoadLibraryExW 21268->21269 21270 14011dfa6 _RunAllParam 21269->21270 21270->21247 21272 14011ff87 21271->21272 21273 14011ff8c malloc 21271->21273 21272->21253 21273->21272 21275 14011ffc5 ReadFile 21273->21275 21275->21272 21276 14011ffff NtClose 21275->21276 21276->21272 21278 14011f8d3 realloc 21277->21278 21279 14011f8a3 21277->21279 21278->21279 21279->21251 21281 14011fe8b _RunAllParam 21280->21281 21282 14011fea6 CreateFileMappingW MapViewOfFile 21281->21282 21283 14011feff 21282->21283 21283->21255 21285 14011d7b8 21284->21285 21287 14011d7b1 21284->21287 21286 14011d7f1 GlobalAlloc ReadFile 21285->21286 21285->21287 21286->21287 21288 14011d847 CloseHandle 21286->21288 21287->21259 21288->21287 21293 14011c578 21289->21293 21292 140120a57 _RunAllParam 21292->21262 21294 14011c5a2 VirtualAlloc 21293->21294 21294->21292 21301 14001c80c 72 API calls 2 library calls 21355 140015d0c SetCapture ReleaseCapture 21356 140017914 34 API calls 21400 140019e14 36 API calls 21438 14001cf14 130 API calls _RunAllParam 21401 140001614 43 API calls _RunAllParam 21302 140025018 339 API calls 21439 140020f18 33 API calls 2 library calls 21440 140015f18 InvalidateRect 21402 14000861a 56 API calls 21441 140016b1c FindWindowExW EnumChildWindows #6 #2 _cwprintf_s_l 21303 140022420 SendMessageW lstrlenW PostMessageW 21304 140002020 #6 21442 14001f724 50 API calls _cwprintf_s_l 21305 14000b824 73 API calls 2 library calls 21306 140001424 47 API calls _cwprintf_s_l 21308 140025c28 30 API calls 21403 140020228 SendMessageW SendMessageW 21357 140005d28 61 API calls 2 library calls 21309 14001442c 244 API calls 21404 14001a22c 46 API calls _RunAllParam 21310 1400c8028 lstrlenW lstrcatW lstrlenW _cwprintf_s_l 21311 140015c2d 6 API calls 21443 140015f30 InvalidateRgn 21358 14011a924 RegOpenKeyW lstrlenW RegSetValueExW RegCloseKey 21359 140008134 ReleaseDC DeleteDC 21360 140006138 55 API calls 2 library calls 21406 140001638 SetBkColor SetTextColor CreateSolidBrush GetWindowLongPtrW CallWindowProcW 21362 14000cd3c 86 API calls _RunAllParam 21408 140019240 65 API calls 21446 140002f40 44 API calls _RunAllParam 21363 140025944 484 API calls 21447 140019f44 39 API calls 21312 14000a844 67 API calls _cwprintf_s_l 21364 1400aa950 34 API calls 21365 140008546 20 API calls 21004 140014548 21005 140014551 21004->21005 21006 140014556 21004->21006 21008 140014528 21005->21008 21009 140014531 21008->21009 21012 14001448c 21009->21012 21016 1400144aa 21012->21016 21013 1400144f3 OutputDebugStringA 21020 14011be80 21013->21020 21016->21013 21018 14011d934 GetComputerNameW 21016->21018 21017 14001451a Sleep 21017->21009 21019 14011d950 _RunAllParam 21018->21019 21019->21016 21021 14011be87 std::_Debug_message _RunAllParam 21020->21021 21022 14011bf59 _RunAllParam 21021->21022 21024 7ff75d931157 21021->21024 21022->21017 21027 7ff75d9311b5 21024->21027 21028 7ff75d9311ec 21027->21028 21029 7ff75d931252 exit 21028->21029 21030 7ff75d93125c 21028->21030 21029->21030 21035 7ff75db8ca21 21030->21035 21032 7ff75d9312e5 21041 7ff75db8c1e0 21032->21041 21036 7ff75db8cabd 21035->21036 21037 7ff75db8ca37 21035->21037 21036->21032 21045 7ff75db8c6fb 21037->21045 21042 7ff75db8c1f8 21041->21042 21064 7ff75db8c0f1 21042->21064 21046 7ff75db8c7c3 21045->21046 21047 7ff75db8c72e 21045->21047 21052 7ff75db8c5dc 21046->21052 21048 7ff75db8c76f 21047->21048 21050 7ff75db8c7c8 21047->21050 21048->21046 21056 7ff75db8c6b4 21048->21056 21050->21046 21051 7ff75db8c6b4 VirtualProtect 21050->21051 21051->21050 21053 7ff75db8c5f0 21052->21053 21054 7ff75db8c6ac 21053->21054 21055 7ff75db8c618 VirtualProtect 21053->21055 21054->21036 21055->21053 21057 7ff75db8c6cf 21056->21057 21059 7ff75db8c6db 21056->21059 21060 7ff75db8c360 21057->21060 21059->21048 21062 7ff75db8c378 21060->21062 21061 7ff75db8c5be 21061->21059 21062->21061 21063 7ff75db8c532 VirtualProtect 21062->21063 21063->21061 21067 7ff75db8c0de 21064->21067 21070 7ff75db8aa10 21067->21070 21071 7ff75db8ab96 21070->21071 21075 7ff75db8aab4 21070->21075 21086 7ff75db8ab91 21075->21086 21087 7ff75d933e00 21075->21087 21108 7ff75d93454b 21075->21108 21118 7ff75d935d7c 21075->21118 21126 7ff75d9699c6 21075->21126 21132 7ff75d9d3fe0 21075->21132 21141 7ff75d9d4130 21075->21141 21162 7ff75d9d4360 21075->21162 21173 7ff75d9eb4ae 21075->21173 21181 7ff75da7d8a0 21075->21181 21190 7ff75db7b0e7 21075->21190 21200 7ff75db7da0c 21075->21200 21208 7ff75db8a9b0 21075->21208 21088 7ff75d934068 21087->21088 21089 7ff75d933e92 21087->21089 21090 7ff75d933f47 21089->21090 21091 7ff75d933f42 21089->21091 21092 7ff75d9443e0 ExitProcess 21090->21092 21094 7ff75d943d40 12 API calls 21091->21094 21093 7ff75d933f69 21092->21093 21093->21091 21095 7ff75d933f8c 21094->21095 21096 7ff75d943d40 12 API calls 21095->21096 21097 7ff75d933fae 21096->21097 21098 7ff75d943d40 12 API calls 21097->21098 21099 7ff75d933fd0 21098->21099 21100 7ff75d943d40 12 API calls 21099->21100 21101 7ff75d933ff2 21100->21101 21102 7ff75d943d40 12 API calls 21101->21102 21103 7ff75d934014 21102->21103 21104 7ff75d943d40 12 API calls 21103->21104 21105 7ff75d934036 21104->21105 21106 7ff75d943d40 12 API calls 21105->21106 21107 7ff75d934058 21106->21107 21107->21075 21109 7ff75d934571 21108->21109 21110 7ff75d934587 21109->21110 21111 7ff75d9345b5 21109->21111 21112 7ff75d9443e0 ExitProcess 21110->21112 21113 7ff75d943d40 12 API calls 21111->21113 21114 7ff75d9345a9 21112->21114 21115 7ff75d9345c6 21113->21115 21114->21111 21116 7ff75d943d40 12 API calls 21115->21116 21117 7ff75d9345e0 21116->21117 21117->21075 21119 7ff75d935d8e 21118->21119 21120 7ff75d935dfd 21119->21120 21121 7ff75d935dcb 21119->21121 21123 7ff75d943d40 12 API calls 21120->21123 21122 7ff75d9443e0 ExitProcess 21121->21122 21125 7ff75d935dee 21122->21125 21124 7ff75d935e11 21123->21124 21124->21075 21125->21120 21127 7ff75d9699d6 21126->21127 21128 7ff75d9699ec ExitProcess 21127->21128 21129 7ff75d969a03 21127->21129 21128->21129 21130 7ff75d943d40 12 API calls 21129->21130 21131 7ff75d969a14 TlsAlloc TlsSetValue 21130->21131 21131->21075 21133 7ff75d9d3ff4 21132->21133 21134 7ff75d9d40f7 21133->21134 21135 7ff75d9d4064 21133->21135 21136 7ff75d9d411b 21133->21136 21137 7ff75d943d40 12 API calls 21134->21137 21138 7ff75d9443e0 ExitProcess 21135->21138 21140 7ff75d9d40ea 21135->21140 21139 7ff75d9d410b 21137->21139 21138->21135 21139->21075 21140->21134 21142 7ff75d9d4144 21141->21142 21143 7ff75d9d425a 21142->21143 21145 7ff75d9d41bc 21142->21145 21146 7ff75d9d434a 21142->21146 21144 7ff75d943d40 12 API calls 21143->21144 21147 7ff75d9d426e 21144->21147 21148 7ff75d9443e0 ExitProcess 21145->21148 21151 7ff75d9d424d 21145->21151 21149 7ff75d943d40 12 API calls 21147->21149 21148->21145 21150 7ff75d9d4290 21149->21150 21152 7ff75d943d40 12 API calls 21150->21152 21151->21143 21153 7ff75d9d42b2 21152->21153 21154 7ff75d943d40 12 API calls 21153->21154 21155 7ff75d9d42d4 21154->21155 21156 7ff75d943d40 12 API calls 21155->21156 21157 7ff75d9d42f6 21156->21157 21158 7ff75d943d40 12 API calls 21157->21158 21159 7ff75d9d4318 21158->21159 21160 7ff75d943d40 12 API calls 21159->21160 21161 7ff75d9d433a 21160->21161 21161->21075 21163 7ff75d9d4374 21162->21163 21164 7ff75d9d4477 21163->21164 21166 7ff75d9d43e4 21163->21166 21167 7ff75d9d44bd 21163->21167 21165 7ff75d943d40 12 API calls 21164->21165 21168 7ff75d9d448b 21165->21168 21169 7ff75d9443e0 ExitProcess 21166->21169 21171 7ff75d9d446a 21166->21171 21170 7ff75d943d40 12 API calls 21168->21170 21169->21166 21172 7ff75d9d44ad 21170->21172 21171->21164 21172->21075 21174 7ff75d9eb4d4 21173->21174 21175 7ff75d9eb4ea 21174->21175 21176 7ff75d9eb518 21174->21176 21177 7ff75d9443e0 ExitProcess 21175->21177 21178 7ff75d943d40 12 API calls 21176->21178 21179 7ff75d9eb50c 21177->21179 21180 7ff75d9eb529 21178->21180 21179->21176 21180->21075 21182 7ff75da7d8b4 21181->21182 21183 7ff75da7d9de 21182->21183 21184 7ff75da7da02 21182->21184 21188 7ff75da7d92c 21182->21188 21185 7ff75d943d40 12 API calls 21183->21185 21187 7ff75da7d9f2 21185->21187 21186 7ff75d9443e0 ExitProcess 21186->21188 21187->21075 21188->21186 21189 7ff75da7d9d1 21188->21189 21189->21183 21191 7ff75db7b10d 21190->21191 21192 7ff75db7b123 21191->21192 21193 7ff75db7b151 21191->21193 21194 7ff75d9443e0 ExitProcess 21192->21194 21195 7ff75d943d40 12 API calls 21193->21195 21197 7ff75db7b145 21194->21197 21196 7ff75db7b162 21195->21196 21198 7ff75d943d40 12 API calls 21196->21198 21197->21193 21199 7ff75db7b17c 21198->21199 21199->21075 21201 7ff75db7da32 21200->21201 21202 7ff75db7da48 21201->21202 21203 7ff75db7da76 21201->21203 21204 7ff75d9443e0 ExitProcess 21202->21204 21205 7ff75d943d40 12 API calls 21203->21205 21206 7ff75db7da6a 21204->21206 21207 7ff75db7da87 21205->21207 21206->21203 21207->21075 21209 7ff75db8a9b9 21208->21209 21210 7ff75d995e8b 10 API calls 21209->21210 21211 7ff75db8a9be 21210->21211 21212 7ff75d998c72 calloc free free malloc calloc 21211->21212 21213 7ff75db8a9c3 21212->21213 21214 7ff75d99e3ec 10 API calls 21213->21214 21215 7ff75db8a9c8 21214->21215 21216 7ff75d9d1a10 12 API calls 21215->21216 21217 7ff75db8a9cd 21216->21217 21218 7ff75da0a740 12 API calls 21217->21218 21219 7ff75db8a9d7 21218->21219 21220 7ff75da68e60 9 API calls 21219->21220 21221 7ff75db8a9dc 21220->21221 21222 7ff75da6a400 9 API calls 21221->21222 21223 7ff75db8a9e1 21222->21223 21224 7ff75da7f7a1 8 API calls 21223->21224 21225 7ff75db8a9eb 21224->21225 21226 7ff75da97fe4 6 API calls 21225->21226 21227 7ff75db8a9f0 21226->21227 21228 7ff75dad1fac 10 API calls 21227->21228 21229 7ff75db8a9f5 21228->21229 21230 7ff75dae9257 11 API calls 21229->21230 21231 7ff75db8a9fa 21230->21231 21366 14001554c InterlockedPushEntrySList _RunAllParam 21449 140013f50 105 API calls _RunAllParam 21314 140005450 62 API calls 2 library calls 21410 1400ab254 31 API calls 2 library calls 21316 140016c5c OleLockRunning 21412 140008a5c DeleteObject DestroyCursor InterlockedPushEntrySList _RunAllParam 21369 14005c55c GetModuleHandleW GetProcAddress GetCurrentProcess 21318 140007860 56 API calls _RunAllParam 21413 140001260 45 API calls _cwprintf_s_l 21370 140016964 41 API calls _cwprintf_s_l 21319 140007c64 35 API calls 2 library calls 21371 14000f565 29 API calls 2 library calls 21320 140007468 RegCloseKey 21373 140015d6c 9 API calls 21414 140002a6c LoadLibraryW GetProcAddress 21415 14000a26c 46 API calls _RunAllParam 21321 140026470 73 API calls 2 library calls 21322 140016470 #6 #7 #6 21323 140022074 42 API calls 2 library calls 21374 7ff75d93d548 calloc free realloc malloc calloc 21416 140007274 37 API calls 21450 140017b78 9 API calls _cwprintf_s_l 21417 140002278 GlobalUnlock GlobalFree 21451 140007778 DeleteDC 21375 140001d7c FindWindowExW EnumChildWindows 21376 14010656c lstrlenA MultiByteToWideChar lstrlenW 21452 14000277c LeaveCriticalSection 21325 7ff75d931653 6 API calls 21377 14000a180 EndPaint 21418 14000ae80 146 API calls 21379 14001d988 SendMessageW SendMessageW 21419 140015e88 GetClientRect BitBlt DeleteDC ReleaseDC 21327 140002488 KillTimer SetTimer 21380 140001988 41 API calls 21328 14001048c 64 API calls 2 library calls 21423 14010ae9c 42 API calls _cwprintf_s_l 21424 140016290 45 API calls _RunAllParam 21453 140019790 27 API calls 21454 14001e790 KillTimer SetTimer GetWindowLongPtrW DefWindowProcW 21331 140007490 DestroyMenu 21455 140001390 lstrcpynW 21332 14001e494 GetWindowRect GetWindowRect SetWindowPos 21382 140015594 SetWindowLongPtrW DestroyWindow SetLastError 21456 140006794 74 API calls _RunAllParam 21383 14001f99c 8 API calls 21384 140016d9c CallWindowProcW 21333 14001c4a0 64 API calls 2 library calls 21385 1400179a0 #7 lstrlenW CoTaskMemAlloc lstrlenW 21457 1400143a0 155 API calls 21458 7ff75d931b34 calloc free malloc calloc 21334 14001c0a4 22 API calls 21335 1400200a8 44 API calls 21459 140019fa8 40 API calls 21460 14001a7ac 46 API calls _RunAllParam 21386 1400089ac 9 API calls 21336 1400250b0 170 API calls _RunAllParam 21337 1400238b0 90 API calls 21425 140002ab0 FindWindowExW GetFocus 21339 1400170bd EnterCriticalSection LeaveCriticalSection 21390 1400069c0 129 API calls 21461 140002bc0 31 API calls 2 library calls 21429 140034ec4 44 API calls _cwprintf_s_l 21341 7ff75d93565b TlsSetValue 21391 14001e5c8 DeleteObject 21462 1400147c8 44 API calls 2 library calls 21431 1400256d0 728 API calls 21342 1400198d0 85 API calls _cwprintf_s_l 21463 140016bd0 GetDC ReleaseDC 21464 140019fd0 37 API calls 21343 1400010d0 LoadLibraryW GetProcAddress 21344 1400224d4 79 API calls 21433 140024ed4 238 API calls 21465 140015bd4 #2 21393 14000b1dc lstrlenA MultiByteToWideChar lstrlenW lstrlenW _RunAllParam 21466 140006fdc GetWindowLongW SetWindowLongW SetWindowPos 21467 1400023e0 SetWindowPos GetClientRect SetTimer

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 166 14011ff38-14011ff85 CreateFileW 167 14011ff87 166->167 168 14011ff8c-14011ffc1 malloc 166->168 169 14012000f-140120013 167->169 171 14011ffc3 168->171 172 14011ffc5-14011fffb ReadFile 168->172 171->169 173 14011ffff-140120009 NtClose 172->173 174 14011fffd 172->174 173->169 174->169
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: CreateFilemalloc
                                                                          • String ID:
                                                                          • API String ID: 3010914732-0
                                                                          • Opcode ID: 08291fb8f84a33b773d04131f42d1229c88b2589c06dea98ea13bb42374a242d
                                                                          • Instruction ID: 2d00926db45b5a94333cbffaf12b2d1fc501933b49b87ad3f4aa4d041c57759c
                                                                          • Opcode Fuzzy Hash: 08291fb8f84a33b773d04131f42d1229c88b2589c06dea98ea13bb42374a242d
                                                                          • Instruction Fuzzy Hash: F921C536218B8482D761DF16E44475EBBB1F3C9B94F204219EB9D47BA8DF7AD4449B00

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2141098105.00007FF75D931000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75D930000, based on PE: true
                                                                          • Associated: 00000015.00000002.2141075525.00007FF75D930000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141576230.00007FF75DB8E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141627621.00007FF75DB9F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DBB7000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DBBA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DC1D000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141903602.00007FF75DC21000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141967096.00007FF75DC23000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_7ff75d930000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: exit
                                                                          • String ID: 0
                                                                          • API String ID: 2483651598-4108050209
                                                                          • Opcode ID: 9806047a5bf1b5b1efa68b36b15cbb6a6b813d4a6b907c62d5d9039e1853b056
                                                                          • Instruction ID: d13134626950621ea62a7f060271b24ad2bf218394d3138c9e588a6ba620aa9f
                                                                          • Opcode Fuzzy Hash: 9806047a5bf1b5b1efa68b36b15cbb6a6b813d4a6b907c62d5d9039e1853b056
                                                                          • Instruction Fuzzy Hash: A741B775E0DB1689FB41AB95E88036C73B2BB44B84F984436DE0D977A4EF7DE8408760

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2141098105.00007FF75D931000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75D930000, based on PE: true
                                                                          • Associated: 00000015.00000002.2141075525.00007FF75D930000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141576230.00007FF75DB8E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141627621.00007FF75DB9F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DBB7000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DBBA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DC1D000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141903602.00007FF75DC21000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141967096.00007FF75DC23000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_7ff75d930000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AllocExitProcessValue
                                                                          • String ID:
                                                                          • API String ID: 2754199502-0
                                                                          • Opcode ID: b46a69d197219e6e408c84a58ccdc3ff8e93cada09a11a21b366b25cb23b4699
                                                                          • Instruction ID: d20a074a4035d2f61070a65d63ca081526fe0467ffdd111bd939704484464ad8
                                                                          • Opcode Fuzzy Hash: b46a69d197219e6e408c84a58ccdc3ff8e93cada09a11a21b366b25cb23b4699
                                                                          • Instruction Fuzzy Hash: B9312472B2C45247F348B77D9C5617AA9539F85330BEC8738F43ACA6E9EF2CA4010620

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 486 7ff75d93d640-7ff75d93d652 487 7ff75d93d658-7ff75d93d667 malloc 486->487 488 7ff75d93d66c-7ff75d93d691 486->488 489 7ff75d93da28-7ff75d93da31 487->489 490 7ff75d93d697-7ff75d93d69c call 7ff75d93888d 488->490 491 7ff75d93d6a1-7ff75d93d770 488->491 490->489 492 7ff75d93d77b-7ff75d93d780 call 7ff75d93888d 491->492 493 7ff75d93d776-7ff75d93d7dd 491->493 492->489 499 7ff75d93d7ed-7ff75d93d80c 493->499 500 7ff75d93d7e3-7ff75d93d7e8 call 7ff75d93888d 493->500 502 7ff75d93d822-7ff75d93d875 499->502 503 7ff75d93d812-7ff75d93d81d call 7ff75d93990a 499->503 500->489 506 7ff75d93d87b-7ff75d93d9a1 call 7ff75db8d2d0 502->506 507 7ff75d93da32 502->507 503->489 516 7ff75d93d9a7-7ff75d93d9ad 506->516 509 7ff75d93da34 507->509 510 7ff75d93da73-7ff75d93da84 507->510 509->510 512 7ff75d93da8a-7ff75d93db0c 510->512 513 7ff75d93dd57-7ff75d93dd59 510->513 515 7ff75d93db12-7ff75d93dbda call 7ff75d93874b call 7ff75d93967e 512->515 517 7ff75d93dd5d-7ff75d93dd65 513->517 531 7ff75d93dbe0-7ff75d93dbe5 515->531 519 7ff75d93d9b8-7ff75d93d9bd call 7ff75d93888d 516->519 520 7ff75d93d9b3-7ff75d93d9f1 516->520 519->489 526 7ff75d93d9f7-7ff75d93da23 520->526 527 7ff75d93d9fc-7ff75d93da01 call 7ff75d93888d 520->527 526->489 527->489 533 7ff75d93dbeb-7ff75d93dc64 531->533 534 7ff75d93dbf0-7ff75d93dbfd call 7ff75d93888d 531->534 538 7ff75d93dc6a-7ff75d93dcd9 call 7ff75d93888d 533->538 539 7ff75d93dcde-7ff75d93dce6 533->539 542 7ff75d93dd4a-7ff75d93dd52 534->542 538->542 540 7ff75d93dcec-7ff75d93dcff call 7ff75d93990a 539->540 541 7ff75d93dd04-7ff75d93dd0c 539->541 540->542 545 7ff75d93dd2a-7ff75d93dd36 call 7ff75d93d640 541->545 546 7ff75d93dd12-7ff75d93dd25 call 7ff75d93990a 541->546 542->517 554 7ff75d93dd3b-7ff75d93dd46 545->554 546->542 554->542
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2141098105.00007FF75D931000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75D930000, based on PE: true
                                                                          • Associated: 00000015.00000002.2141075525.00007FF75D930000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141576230.00007FF75DB8E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141627621.00007FF75DB9F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DBB7000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DBBA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DC1D000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141903602.00007FF75DC21000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141967096.00007FF75DC23000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_7ff75d930000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: malloc
                                                                          • String ID:
                                                                          • API String ID: 2803490479-0
                                                                          • Opcode ID: 9d4a1e6eeaf1f1cdb7226a09114b4d0fe3d4781d08394e3eee49611d3cad540f
                                                                          • Instruction ID: b4f80cb3996d4e565127786744ad3e29489372c51092153ce9337af39284461c
                                                                          • Opcode Fuzzy Hash: 9d4a1e6eeaf1f1cdb7226a09114b4d0fe3d4781d08394e3eee49611d3cad540f
                                                                          • Instruction Fuzzy Hash: 8FF17762F2C64542FB18DBB698712BA66A2DB827F4F549339ED3E9B7D4DE2CD0014700

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,00007FF75DA7F334), ref: 00007FF75DA7DBC4
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2141098105.00007FF75D931000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75D930000, based on PE: true
                                                                          • Associated: 00000015.00000002.2141075525.00007FF75D930000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141576230.00007FF75DB8E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141627621.00007FF75DB9F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DBB7000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DBBA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DC1D000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141903602.00007FF75DC21000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141967096.00007FF75DC23000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_7ff75d930000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: InfoSystem
                                                                          • String ID:
                                                                          • API String ID: 31276548-0
                                                                          • Opcode ID: 5d371ad9e8605828d13a16163c515848834932142afd4dbd7bdc4d4a438b4d53
                                                                          • Instruction ID: e010987050b12fe445d7ee3f2b54560d60afecf95b9dc6b6a59aaeecb9b0297f
                                                                          • Opcode Fuzzy Hash: 5d371ad9e8605828d13a16163c515848834932142afd4dbd7bdc4d4a438b4d53
                                                                          • Instruction Fuzzy Hash: 8E418B3273C55143A7A89738AD62D376A92EBC5760B886339E95EC3FE4DE2CD5008B10
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2141098105.00007FF75D931000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75D930000, based on PE: true
                                                                          • Associated: 00000015.00000002.2141075525.00007FF75D930000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141576230.00007FF75DB8E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141627621.00007FF75DB9F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DBB7000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DBBA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DC1D000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141903602.00007FF75DC21000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141967096.00007FF75DC23000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_7ff75d930000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: ff4f314fb52d58614d020e5335608645761c06bbe78508165f7a109119a175a6
                                                                          • Instruction ID: b4ad74c40ec0b5a94656ad3dcbdab3c3fa65ae2e0a0331f58d8093816691922d
                                                                          • Opcode Fuzzy Hash: ff4f314fb52d58614d020e5335608645761c06bbe78508165f7a109119a175a6
                                                                          • Instruction Fuzzy Hash: A7414A3373DA9542E760D739B85192BAAD1E7897A4B542324EE6EC3FD8DA3ED1014B00

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 155 14011d758-14011d7af CreateFileW 156 14011d7b1-14011d7b3 155->156 157 14011d7b8-14011d7de 155->157 158 14011d866-14011d86a 156->158 160 14011d7f1-14011d834 GlobalAlloc ReadFile 157->160 161 14011d7e0-14011d7ef 157->161 162 14011d836-14011d845 160->162 163 14011d847-14011d864 CloseHandle 160->163 161->158 162->158 163->158
                                                                          APIs
                                                                          • CreateFileW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,0000000140123371), ref: 000000014011D7A1
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: CreateFile
                                                                          • String ID:
                                                                          • API String ID: 823142352-0
                                                                          • Opcode ID: fa702a1818ffb6b8e9e1b8e5fb94fe68093c190d33758d34eb9046929484e72f
                                                                          • Instruction ID: a872d6ac15e49e81bcb6e402cc2fdf8fedc509efffe6e503cca0c791e6531545
                                                                          • Opcode Fuzzy Hash: fa702a1818ffb6b8e9e1b8e5fb94fe68093c190d33758d34eb9046929484e72f
                                                                          • Instruction Fuzzy Hash: B3319336608B4487EB60CF2AE49435EBBB4F7C9B94F604115EB9947BA8DF39C5458F00

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: File$Create$MappingView
                                                                          • String ID:
                                                                          • API String ID: 1299149932-0
                                                                          • Opcode ID: adc7ce85746f15b18e302e3d6d9fbbf35a76bdbe9ac71d6ff60923e7ba8727e8
                                                                          • Instruction ID: 820315da7b4020408db1b1cc614476c0a1407536e4ab1f95ad091a2a37da56bc
                                                                          • Opcode Fuzzy Hash: adc7ce85746f15b18e302e3d6d9fbbf35a76bdbe9ac71d6ff60923e7ba8727e8
                                                                          • Instruction Fuzzy Hash: 1621A376218B8082EBA0DB56F45575EBBA0F3C9B84F209115EBCD87B68DF7DC4598B00

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2141098105.00007FF75D931000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75D930000, based on PE: true
                                                                          • Associated: 00000015.00000002.2141075525.00007FF75D930000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141576230.00007FF75DB8E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141627621.00007FF75DB9F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DBB7000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DBBA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DC1D000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141903602.00007FF75DC21000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141967096.00007FF75DC23000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_7ff75d930000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: ProtectVirtual
                                                                          • String ID: @
                                                                          • API String ID: 544645111-2766056989
                                                                          • Opcode ID: e5394c59ebb7de25128ae237650083047c7b9f2dc1cc76e2994e0239bd5923de
                                                                          • Instruction ID: 2f51c0c9013975b12781e39da5410d61d177a07788d9f8d267a2b8734e126214
                                                                          • Opcode Fuzzy Hash: e5394c59ebb7de25128ae237650083047c7b9f2dc1cc76e2994e0239bd5923de
                                                                          • Instruction Fuzzy Hash: 9C613BE2F0DB098BEB14DB59D58226863A2FB587C4B988035DE1D93714EF3CEA02D310

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2141098105.00007FF75D931000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75D930000, based on PE: true
                                                                          • Associated: 00000015.00000002.2141075525.00007FF75D930000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141576230.00007FF75DB8E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141627621.00007FF75DB9F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DBB7000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DBBA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DC1D000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141903602.00007FF75DC21000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141967096.00007FF75DC23000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_7ff75d930000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AllocCreateThreadVirtual
                                                                          • String ID:
                                                                          • API String ID: 3065189322-0
                                                                          • Opcode ID: 7c4e89417ec1145bc31552d12b82915981abf6b5d74b4fcfd4d2f285ab6a69ed
                                                                          • Instruction ID: 2201222990ce51f450fa09bc9822fe7eaeb78049fb89d2c131f29acb720e1693
                                                                          • Opcode Fuzzy Hash: 7c4e89417ec1145bc31552d12b82915981abf6b5d74b4fcfd4d2f285ab6a69ed
                                                                          • Instruction Fuzzy Hash: F0314436F1DB89C9E740ABA5E8412A973B5F70C758F940036DA4C47764EF78C162C760

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 579 14011d934-14011d94b GetComputerNameW call 14011c948 581 14011d950-14011d9b0 call 14011d2a8 579->581 586 14011d9bc-14011d9c5 581->586 587 14011d9c7-14011d9d7 586->587 588 14011d9d9-14011d9e1 586->588 587->586 590 14011d9ed-14011d9f5 588->590 591 14011d9f7-14011da28 590->591 592 14011da2a-14011da43 590->592 591->590
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: ComputerName
                                                                          • String ID:
                                                                          • API String ID: 3545744682-0
                                                                          • Opcode ID: 8aa76fb0e6ea81a43412a6e4ce3e67ee4a0c44f8450056c290c247b20c5f490d
                                                                          • Instruction ID: 3d613ac56ecaa76a4e7d91ee78244c06fa0071a276e7ba6f2ac5590dae2c62da
                                                                          • Opcode Fuzzy Hash: 8aa76fb0e6ea81a43412a6e4ce3e67ee4a0c44f8450056c290c247b20c5f490d
                                                                          • Instruction Fuzzy Hash: 3931B272218A848AC774CB29E48075EB7A1F7CCB58F444216E6CE87B69DA3CCA45CF04

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 595 7ff75db8c5dc-7ff75db8c5eb 596 7ff75db8c69d-7ff75db8c6a6 595->596 597 7ff75db8c5f0-7ff75db8c612 596->597 598 7ff75db8c6ac-7ff75db8c6b3 596->598 599 7ff75db8c698 597->599 600 7ff75db8c618-7ff75db8c696 VirtualProtect 597->600 601 7ff75db8c699 599->601 600->601 601->596
                                                                          APIs
                                                                          • VirtualProtect.KERNELBASE(?,?,?,?,?,00007FF75DB8CABD,?,?,?,?,?,00007FF75D9312E5), ref: 00007FF75DB8C694
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2141098105.00007FF75D931000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75D930000, based on PE: true
                                                                          • Associated: 00000015.00000002.2141075525.00007FF75D930000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141576230.00007FF75DB8E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141627621.00007FF75DB9F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DBB7000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DBBA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DC1D000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141903602.00007FF75DC21000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141967096.00007FF75DC23000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_7ff75d930000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: ProtectVirtual
                                                                          • String ID:
                                                                          • API String ID: 544645111-0
                                                                          • Opcode ID: beb8c38d02a2b53fbd7be99df4a00c79adf73913b803789b3b0d298dfa95b0ee
                                                                          • Instruction ID: 58042e7a001378ed6309bbca3bdc5ead414b95bf923e20ad9d40a16ad66c6b60
                                                                          • Opcode Fuzzy Hash: beb8c38d02a2b53fbd7be99df4a00c79adf73913b803789b3b0d298dfa95b0ee
                                                                          • Instruction Fuzzy Hash: 861142E2F0D7458BEF04DB55D582268A362BB98BC5B598035CD1D97314EE3CEB029710
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2141098105.00007FF75D931000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75D930000, based on PE: true
                                                                          • Associated: 00000015.00000002.2141075525.00007FF75D930000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141576230.00007FF75DB8E000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141627621.00007FF75DB9F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DBB7000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DBBA000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141680045.00007FF75DC1D000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141903602.00007FF75DC21000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2141967096.00007FF75DC23000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_7ff75d930000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AllocCreateThreadVirtual
                                                                          • String ID:
                                                                          • API String ID: 3065189322-0
                                                                          • Opcode ID: bb50a292e33c1ae5368d5b7c105191ac3e88e23a404754edeedffa150133abed
                                                                          • Instruction ID: 613ea8381723b45de5dbabc5e7f82576ddec97ce44fcaa4357ca43090affd8a1
                                                                          • Opcode Fuzzy Hash: bb50a292e33c1ae5368d5b7c105191ac3e88e23a404754edeedffa150133abed
                                                                          • Instruction Fuzzy Hash: A9215A36A1DB8982D740EB54E44036AB3A6F78CB64F944136EA8D87764EF7CC415C750
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: realloc
                                                                          • String ID:
                                                                          • API String ID: 471065373-0
                                                                          • Opcode ID: 3f1eb1290eb503b2145d9c0e382a8b9ab882b585fb38e67f0ecac83848e7f568
                                                                          • Instruction ID: 561e48d5a86c5783f5dc688081665245eb1983b796079a5d4baa60a9d0ab499f
                                                                          • Opcode Fuzzy Hash: 3f1eb1290eb503b2145d9c0e382a8b9ab882b585fb38e67f0ecac83848e7f568
                                                                          • Instruction Fuzzy Hash: 84119736604B4886DA44DB0AE48025E77B4F3D9B80F614026EF8D57B68DF3AC946DB40
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: LibraryLoad
                                                                          • String ID:
                                                                          • API String ID: 1029625771-0
                                                                          • Opcode ID: 5fdda1b636b50f9fc504353daad9641b4c9c534a50ade388255728a4b60dc926
                                                                          • Instruction ID: d573d171b4691707fc38c9ddb05e420b9f30bf651de66fe43147e61a49fc26ed
                                                                          • Opcode Fuzzy Hash: 5fdda1b636b50f9fc504353daad9641b4c9c534a50ade388255728a4b60dc926
                                                                          • Instruction Fuzzy Hash: AF01D672218B88C2E6219B16E45436EB7B0F3CDB88F504625EBCD47B69CF3DC9448B04
                                                                          APIs
                                                                          • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,0000000140120B85), ref: 0000000140120A36
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: 6bcd8b487a366c1c59843c47b777b3e1da3161276deb4923ee1d31ae147b4254
                                                                          • Instruction ID: 666a9bba36a8258ab6c1abd1cc1a10056bbc9ec2a7f906673a408a3f03c71112
                                                                          • Opcode Fuzzy Hash: 6bcd8b487a366c1c59843c47b777b3e1da3161276deb4923ee1d31ae147b4254
                                                                          • Instruction Fuzzy Hash: A541B776219B8486DB61CF0AE08075EBBA0F388F94F405156EB8E97B69DB79C545CB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Window$MessageSend$Item$EnableSystem$LongMetrics$ClientImageLoadParentRectScreenTextlstrlen$ByteCharInfoMultiParametersWide
                                                                          • String ID: LZDE$LZEN$LZIT$Lizenz$lng
                                                                          • API String ID: 2727863672-2363247610
                                                                          • Opcode ID: 174c2ef5cb3542c4634db0dd5a4240508240e34c614a04612fcd01b8688baa98
                                                                          • Instruction ID: 9f9485a48d6402ffa7bcfd86dcc73b779697d7fdc7c33d9dfa55754880688632
                                                                          • Opcode Fuzzy Hash: 174c2ef5cb3542c4634db0dd5a4240508240e34c614a04612fcd01b8688baa98
                                                                          • Instruction Fuzzy Hash: 93F15C72301A8082EB52DB27E8587DA7361F78CFE0F448225AB5A5B7B5DF39C845CB40
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$Window$CreateHandleIconImageList_ModuleRectShow
                                                                          • String ID: $L$ToolbarWindow32$d$shell32.dll
                                                                          • API String ID: 1744847649-4053673454
                                                                          • Opcode ID: ec00726696b043959fb503d2530eeb205b183dbc9545bf4d2d9651eca1e06abb
                                                                          • Instruction ID: 14f72573145001a94804b50c9369ed43ca5d4e3a5e1751d385d7e3ab38500a66
                                                                          • Opcode Fuzzy Hash: ec00726696b043959fb503d2530eeb205b183dbc9545bf4d2d9651eca1e06abb
                                                                          • Instruction Fuzzy Hash: 5EA15771314A8482EBA18B63B954BAA37A1F78DFC5F444025AF0A4BF74DF3DC54A8B44
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$lstrlen$Item$DriveFolderPathSpecial$CloseLogicalOpenStringsType_cwprintf_s_l
                                                                          • String ID: %C:\$SoftwareOK\$UninstallString
                                                                          • API String ID: 423617-1242695785
                                                                          • Opcode ID: ce4a602b15cb63e03b6c9d7a59fa3f4c24bcbb6a3fbfdff46da888468d75f5d0
                                                                          • Instruction ID: 1213c6fbc6b11f0d7670e3afec7627d9e251dbf8b966614931f2d1ab06e0adb4
                                                                          • Opcode Fuzzy Hash: ce4a602b15cb63e03b6c9d7a59fa3f4c24bcbb6a3fbfdff46da888468d75f5d0
                                                                          • Instruction Fuzzy Hash: BF429F72204A8082EB52DB26E8507DE73A1FB89BF4F544212E76E97AF5DF38C485C740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Message$ItemSend$DialogPostQuit
                                                                          • String ID: forall
                                                                          • API String ID: 3324692860-1056140417
                                                                          • Opcode ID: f6947c149669c0dbfbf2dbbacbf94d7a9bfeb96a041f4d752126100307eba41c
                                                                          • Instruction ID: 87455486c33b27b8cf29d0c37acd839ce203718a171ce02a85bea06c2aac402e
                                                                          • Opcode Fuzzy Hash: f6947c149669c0dbfbf2dbbacbf94d7a9bfeb96a041f4d752126100307eba41c
                                                                          • Instruction Fuzzy Hash: 70B19E72700A8182FB66DB37EC55BAA73A1E78DFD5F4481209B5A4BBB4CF39C8458740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: lstrlen$Filelstrcmpi$CharLowerModuleName$ActiveCopyExecuteLoadMessagePathShellStringTempWindowlstrcmp
                                                                          • String ID: -install$-runas -uninstall+"$-uninstall$_uninstall.exe$_uninstall.ini$for_all_install$forall$inst_all$install$open$runas$setup
                                                                          • API String ID: 2504411763-1341484687
                                                                          • Opcode ID: 8562d175aedde86520c8cd2ec8d3d0bc397fb097088fd8139ba27f20c5951f99
                                                                          • Instruction ID: cf43a6124aa4e3bb155e5ad45821fdca4f14204c7f904ce3f0e914a877faeb3c
                                                                          • Opcode Fuzzy Hash: 8562d175aedde86520c8cd2ec8d3d0bc397fb097088fd8139ba27f20c5951f99
                                                                          • Instruction Fuzzy Hash: 87826272312A8082EA62DB6AE8517DA63A1F7897B4F584311E77E876F5CF3CC485C740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: _cwprintf_s_l$File$CopyItemMessageSend$AttributesExecuteShell
                                                                          • String ID: %s\%s.lnk$.\Favoriten\$.\Favoriten\Quick-Link\$Favoriten$Link$Ordner$Program$\Microsoft\Internet Explorer\Quick Launch$m_lang_id$m_lang_id=%d$open$portable_install
                                                                          • API String ID: 865069665-912432381
                                                                          • Opcode ID: 09fd3be6d87d3314e842234ac9bfaaf60286fd91aaa6fe79aa6a6f993e03e53e
                                                                          • Instruction ID: f5fd568eb4fa89ef09741f301376edfd5dbb115e4928b6f7acd597c23f9de95b
                                                                          • Opcode Fuzzy Hash: 09fd3be6d87d3314e842234ac9bfaaf60286fd91aaa6fe79aa6a6f993e03e53e
                                                                          • Instruction Fuzzy Hash: 56E1B633205A8086E7628B7AE8553DD33A0F789BB4F444302E7A99B6F2DE7DD4858740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$Window$lstrlen$ClientIconImageList_RectSize_cwprintf_s_l
                                                                          • String ID: 0$@
                                                                          • API String ID: 3730665866-1545510068
                                                                          • Opcode ID: 11cc51ba024c335070304a6cd7586fed144db14e9716be4ba93d075a169ea3cb
                                                                          • Instruction ID: f515dbf1d49814e9e3407b6919e0efcb9013ed6d199b989b111f9ff7d72fbfb8
                                                                          • Opcode Fuzzy Hash: 11cc51ba024c335070304a6cd7586fed144db14e9716be4ba93d075a169ea3cb
                                                                          • Instruction Fuzzy Hash: AFE16B722146C48BE765CF66E8447DEB7A0F3C8B84F548115EB8957B68CB39D865CF00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Window$LongMessageSend$CreateObjectText$ClassCloseCursorFontIndirectLengthNameOpenParentStocklstrcmpi
                                                                          • String ID: Anchor Color$Anchor Color Visited$H$Software\Microsoft\Internet Explorer\Settings$static$tooltips_class32
                                                                          • API String ID: 4016893531-15458338
                                                                          • Opcode ID: 212ea544e0e226f010af4f5bfcc0c737a4f562a775f8519822f56687e2b46025
                                                                          • Instruction ID: 85be3385342c9aca68e5758e7a1ed4048d160111e8e1d2afd3ed2a036945b3fd
                                                                          • Opcode Fuzzy Hash: 212ea544e0e226f010af4f5bfcc0c737a4f562a775f8519822f56687e2b46025
                                                                          • Instruction Fuzzy Hash: 44E16172204B8186EB72DF26F4847DEB3A1F788B90F544126EB9A47AB4DF78D545CB00
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Item$MessageSend$EnableWindow$LoadStringlstrlen
                                                                          • String ID:
                                                                          • API String ID: 1173643101-0
                                                                          • Opcode ID: 7c7d513955768bfae79e3a188177268da00716552af1d794ceb65d20afd4135a
                                                                          • Instruction ID: 6dabcdcea65f6328270f3a14a4be7ba257ce24461f4ee2d6b5f721c516a55c37
                                                                          • Opcode Fuzzy Hash: 7c7d513955768bfae79e3a188177268da00716552af1d794ceb65d20afd4135a
                                                                          • Instruction Fuzzy Hash: 09512F71602A9182F766DF76ED1479A3361EBCDFA5F1881219B050BAB8CF3DC885C740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: ItemMessage$Send$lstrlen$ByteCharEnableMultiWideWindow_cwprintf_s_l
                                                                          • String ID: %d$Folder
                                                                          • API String ID: 1125211564-3146767445
                                                                          • Opcode ID: d5c5b766d43663587aaf605c0f3c775f4b55a46af071f10d0a1cd3309bd6e41c
                                                                          • Instruction ID: 21c51c626c70cd87c04718b6dab06da61f7cb9eb7a6040d354ccdd7e0e2232fa
                                                                          • Opcode Fuzzy Hash: d5c5b766d43663587aaf605c0f3c775f4b55a46af071f10d0a1cd3309bd6e41c
                                                                          • Instruction Fuzzy Hash: 73D1707230198082EA52DB6AE8547DA63A1F7C9BF4F544712AB2E4BBF5DE3DC8418740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Resource$FindLoad
                                                                          • String ID: @ $ToolbarWindow32
                                                                          • API String ID: 2619053042-323118299
                                                                          • Opcode ID: ba8c7da73fdf4611577f9cc5b69f03cab2a023da74b4aa09a77eb4ab799658c9
                                                                          • Instruction ID: 86fd8192aee64fd393b297de248f850f55717a7b1b35142793763b7c302a9f68
                                                                          • Opcode Fuzzy Hash: ba8c7da73fdf4611577f9cc5b69f03cab2a023da74b4aa09a77eb4ab799658c9
                                                                          • Instruction Fuzzy Hash: E0C1BE72215BD086E7A1CB26F8147AE77A1F38CBD4F548125EB8A47BA4DB3DC480CB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Resource$GlobalWindow$Lock$FindLoad$AllocContextCreateDialogErrorHelpLastRectStreamUnlock
                                                                          • String ID: AtlAxWinLic90
                                                                          • API String ID: 3889352284-3795641830
                                                                          • Opcode ID: de0d6f08919c3052e159f00e3193dda42f239365d0447abbbd27013998200e8d
                                                                          • Instruction ID: 51d079df90b8a02c2a86cf8d9dc758cc88ac7561a0772db8427750d37b632643
                                                                          • Opcode Fuzzy Hash: de0d6f08919c3052e159f00e3193dda42f239365d0447abbbd27013998200e8d
                                                                          • Instruction Fuzzy Hash: 13D16F3620469086EB65DF62E4503EA73A1F78CBC4F188526FB5A4FBB4DB7AD844C740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$Window$CreateFileInfoLong$DirectoryFolderLocationMetricsParentRectShowSpecialSystemWindows
                                                                          • String ID: ToolbarWindow32$d
                                                                          • API String ID: 3673439606-1364537291
                                                                          • Opcode ID: da462dc776a07fecd68a21ef27e8583de3242e8132480acd492de46ce9948398
                                                                          • Instruction ID: 9830e13c2f5f986fa01b6c7e6cdaa0575e950eba642a179dc9f7cec8fa218f83
                                                                          • Opcode Fuzzy Hash: da462dc776a07fecd68a21ef27e8583de3242e8132480acd492de46ce9948398
                                                                          • Instruction Fuzzy Hash: 15A16C7620468087E765DF26E8507DEB3A1F78CB94F544025EB8A8BB75CF39C94ACB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Menu$Item$DestroyMessageSendlstrlen$CountInfo$ByteCharLoadMultiWide_cwprintf_s_l
                                                                          • String ID: ID:%d$ | $10900$H$InitLangCombo-ERR$P
                                                                          • API String ID: 2576854577-3851071048
                                                                          • Opcode ID: b755c7a2f0a5b9e27a8672cc3b79c1c9fff2e32756b21b6200b3ea2545efba30
                                                                          • Instruction ID: 20116706675992dc0dd6a543d8b96af0499e673c97be450d8ca5d57fafb5b745
                                                                          • Opcode Fuzzy Hash: b755c7a2f0a5b9e27a8672cc3b79c1c9fff2e32756b21b6200b3ea2545efba30
                                                                          • Instruction Fuzzy Hash: 28B1A272215A4182EA62DB2AE8417EA7360FB8DBF4F444212AF6D476F5DF78C845CB40
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$Client$CreateItemLibraryObjectRectScreenSelect$CompatibleFreeLoadMessageReleaseSectionSendWindow
                                                                          • String ID: ($PNG$bitmap9.jpg
                                                                          • API String ID: 730289181-2908563061
                                                                          • Opcode ID: 09fbaf4045a4607f18a197df20f88c37a2a963bc86c1ec830f2e47abbfd2117b
                                                                          • Instruction ID: e3f5f732d1241b50202e92e1289a60451ceede66af42e874af80bba1de0125b7
                                                                          • Opcode Fuzzy Hash: 09fbaf4045a4607f18a197df20f88c37a2a963bc86c1ec830f2e47abbfd2117b
                                                                          • Instruction Fuzzy Hash: 24513972218B818AE751DF26E41839EB360F788BD6F145125EB8A07BA9CF7DC449CF40
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$CreateObject$CommonControlsFontIndirectInitStockWindow
                                                                          • String ID: $ToolbarWindow32$d
                                                                          • API String ID: 2235514304-853020219
                                                                          • Opcode ID: 04f20807d92875e8a941c46ab5e9a55c7c36849dd24a71f01fe2bb3f4ca10e66
                                                                          • Instruction ID: 81380e565916d0e3a220b6bcff18d90d1e69f70c6a8208045f8504cb5dddd19f
                                                                          • Opcode Fuzzy Hash: 04f20807d92875e8a941c46ab5e9a55c7c36849dd24a71f01fe2bb3f4ca10e66
                                                                          • Instruction Fuzzy Hash: BF61E1722146908BE761CF26F854BEA77A0F788F99F544114EF990BEA9DB3CC546CB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: File$PathTemplstrlen$ByteCharCloseCreateExecuteHandleModuleMultiNameShellWideWrite_cwprintf_s_l
                                                                          • String ID: ###$:Repeat###DEL "%s"###if exist "%s" goto Repeat###DEL "%s"###$_selfdestruct.bat$open
                                                                          • API String ID: 526318972-2663367853
                                                                          • Opcode ID: e0ef0da1caaaa179e51490a716369e6204e6a809852cf07e17a30ec8e6058aa4
                                                                          • Instruction ID: 604c710743bc7a9a6ac54444303196fb82ccd627159c2c83cb5586e85e4cd396
                                                                          • Opcode Fuzzy Hash: e0ef0da1caaaa179e51490a716369e6204e6a809852cf07e17a30ec8e6058aa4
                                                                          • Instruction Fuzzy Hash: 8BA15F72200A848AEB21DF76E8517D933A1F789BBCF444315E7294BAE9DF39C549C740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Window$ClientMessageRectSendShow$Folder$DesktopLocationSpecial
                                                                          • String ID:
                                                                          • API String ID: 410288209-0
                                                                          • Opcode ID: 322aa77159f3c7b8964ab516e3fed0feb13d7947f0b69d87805b915b5fec351c
                                                                          • Instruction ID: 942626af1d8c366efc04faf1e635a78e2675706e48596580cf5a1b9c9d0c1d8e
                                                                          • Opcode Fuzzy Hash: 322aa77159f3c7b8964ab516e3fed0feb13d7947f0b69d87805b915b5fec351c
                                                                          • Instruction Fuzzy Hash: A8A12972204B8486E761DF26E4403DAB761F789F94F588129EF8D0BB69DF79C985CB00
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Window$ClientMessageOffsetRectSend$Screen$ClipExcludePoints
                                                                          • String ID:
                                                                          • API String ID: 986806451-0
                                                                          • Opcode ID: 8c00654a11622e0dcc756902661d98b627de24cb9cdf065ffea1d5c81ef6825d
                                                                          • Instruction ID: 00f282a4903dedcf0ef504674032e559c766e118f53e70da6700473c5c189a97
                                                                          • Opcode Fuzzy Hash: 8c00654a11622e0dcc756902661d98b627de24cb9cdf065ffea1d5c81ef6825d
                                                                          • Instruction Fuzzy Hash: 7E414676624A9087E7618F26F944B8ABBB0F38CFC4F545116EF4A47B28CB79C405CB80
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$Malloc$ClientFileInfoRectWindow
                                                                          • String ID: 0
                                                                          • API String ID: 30954516-4108050209
                                                                          • Opcode ID: cb529b6333ca4705a5f3cca5ab3b9139987fc52c36c606cb42ce1bf2cc7aac13
                                                                          • Instruction ID: e8b1978d66d724abf10e59701e6cad1c3fbe022964d49da35ceb54ce9944eccd
                                                                          • Opcode Fuzzy Hash: cb529b6333ca4705a5f3cca5ab3b9139987fc52c36c606cb42ce1bf2cc7aac13
                                                                          • Instruction Fuzzy Hash: F4E1A072204A8486EB62DB26E4547DEB3A1F389BD4F444216EB6D47BF5CF38D985CB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$lstrlen$wsprintf
                                                                          • String ID: entry_%03d$last_entry
                                                                          • API String ID: 2298119551-2593065581
                                                                          • Opcode ID: 008a9c5fa7d62b771aece80f0896661768ff2290b8738e3542514f7c33eedfca
                                                                          • Instruction ID: 86b7992cb3d53b04f29448162b060c05a39dc93cda4563d4c974ff5a86073e78
                                                                          • Opcode Fuzzy Hash: 008a9c5fa7d62b771aece80f0896661768ff2290b8738e3542514f7c33eedfca
                                                                          • Instruction Fuzzy Hash: 4B41707231099192FB65DB63F895BDA6291EBCDBC5F844021EF4A4BE66DE38C1058B40
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: ClientRect$#190AddressFolderLibraryLoadLocationProcSpecial
                                                                          • String ID: d$d$d
                                                                          • API String ID: 2660539279-1898527202
                                                                          • Opcode ID: 71c33372302f916ebc354bbbe30eccb46d4915fba6f3a10c20ba7567cc0c0410
                                                                          • Instruction ID: a6f3bc1b3df756f0986c1d608cc1a7eeb1e4ca896bd857a2471bc125daaf5835
                                                                          • Opcode Fuzzy Hash: 71c33372302f916ebc354bbbe30eccb46d4915fba6f3a10c20ba7567cc0c0410
                                                                          • Instruction Fuzzy Hash: 52E16C76205A8482EB21DF26E4907DEB361F789FD4F448126EB9E47BA5DF39C548CB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: lstrlen$MessageSend$ByteCharFileInfoMultiWidelstrcat
                                                                          • String ID: 0$o$p
                                                                          • API String ID: 2028529823-2855627637
                                                                          • Opcode ID: 1b963002c905acdd9e4b1c3cbb92eebd2488d5de023baa553beeb7a623ec9a00
                                                                          • Instruction ID: 3be114c49241565be9ad57c24d918b27290463d7114049797c8fd31369fbb42a
                                                                          • Opcode Fuzzy Hash: 1b963002c905acdd9e4b1c3cbb92eebd2488d5de023baa553beeb7a623ec9a00
                                                                          • Instruction Fuzzy Hash: 77719D32204A8181EA52EB2BE8513EA6361FBDDBF4F804316BB6D476F5DE38C945C700
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Clipboard$Global$AllocCloseDataEmptyLockOpen
                                                                          • String ID:
                                                                          • API String ID: 1872618283-0
                                                                          • Opcode ID: 594cd973ebf979aee4e0bde8c44eb27d035c6e478d97713dde4b44e7a8cf85c9
                                                                          • Instruction ID: be190ecb7c61bb58360671a9dd132366ebcc16387152280a04eaceafb3a8eab2
                                                                          • Opcode Fuzzy Hash: 594cd973ebf979aee4e0bde8c44eb27d035c6e478d97713dde4b44e7a8cf85c9
                                                                          • Instruction Fuzzy Hash: 6C216032201A4085EA62EB36E8553EA6761EB88FF4F480335AB6D477F6DF38C545C744
                                                                          APIs
                                                                            • Part of subcall function 0000000140003AE4: lstrlenA.KERNEL32 ref: 0000000140003B08
                                                                            • Part of subcall function 0000000140003AE4: MultiByteToWideChar.KERNEL32 ref: 0000000140003B86
                                                                            • Part of subcall function 0000000140003AE4: lstrlenW.KERNEL32 ref: 0000000140003BA2
                                                                          • GetTimeZoneInformation.KERNEL32 ref: 00000001400262AF
                                                                            • Part of subcall function 000000014000399C: lstrlenA.KERNEL32 ref: 00000001400039CA
                                                                            • Part of subcall function 000000014000399C: MultiByteToWideChar.KERNEL32 ref: 0000000140003A0F
                                                                            • Part of subcall function 000000014000399C: lstrlenW.KERNEL32 ref: 0000000140003A2B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: lstrlen$ByteCharMultiWide$InformationTimeZone
                                                                          • String ID: com$http$https
                                                                          • API String ID: 1891917992-1205338474
                                                                          • Opcode ID: 7f8d9ded14d1b2e1fbde5ff34204a7be8db8e8b6ccaffbc52d971124b6693e83
                                                                          • Instruction ID: 7e7559996cf9e42fc57bdc9444302e077bc977e404b3c2ff2fd3f9c16d10a7aa
                                                                          • Opcode Fuzzy Hash: 7f8d9ded14d1b2e1fbde5ff34204a7be8db8e8b6ccaffbc52d971124b6693e83
                                                                          • Instruction Fuzzy Hash: F3918332309680C1EB02DB7AD8497ED37A0A749BE4F580219E7AD472F6CB7ACD45C761
                                                                          APIs
                                                                            • Part of subcall function 000000014000A9E8: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140001249), ref: 000000014000AA2C
                                                                          • GetPrivateProfileStringW.KERNEL32 ref: 0000000140085466
                                                                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,for_all_install,Program,0000000140085790), ref: 0000000140085478
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: lstrlen$PrivateProfileString
                                                                          • String ID: Program$for_all_install
                                                                          • API String ID: 2516951217-68737091
                                                                          • Opcode ID: ccdaf7ac6400ac0d2139999ccba3a0792c53768118820b3a4d037f2c4a500497
                                                                          • Instruction ID: 80b73980f0693fcc24a34737d6480afba8fa95c67a586a6b7372958da9185dee
                                                                          • Opcode Fuzzy Hash: ccdaf7ac6400ac0d2139999ccba3a0792c53768118820b3a4d037f2c4a500497
                                                                          • Instruction Fuzzy Hash: 39213B72210A808AE741EF26E85439E6764F78DFF4F544221BF6E877E5CB78C5518740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Timer$AsyncKillState
                                                                          • String ID:
                                                                          • API String ID: 3065476933-0
                                                                          • Opcode ID: c61981b638d52854e934b5ce57fdcafba756d400136af1b0950cb53aa9c6da54
                                                                          • Instruction ID: 83b0dc558db1e19b8b48179a39578b0fa32cfe84b150e48cabf1ca8d5a4039f0
                                                                          • Opcode Fuzzy Hash: c61981b638d52854e934b5ce57fdcafba756d400136af1b0950cb53aa9c6da54
                                                                          • Instruction Fuzzy Hash: ACE0927170058182EB1ADB63F4213A92224E79CFD2F084020EF460B3A2CE3AC8918750
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Window$ColorLongRedraw
                                                                          • String ID: 7$:$M$h$l$m$m$s$t
                                                                          • API String ID: 4056730343-774144524
                                                                          • Opcode ID: b7f5465834f6e590c0bbed4cce9958aad9cdde72733777f65dba2b1614c7fcd9
                                                                          • Instruction ID: 78b4388999416cd18bfcb0f14d0a6cd4aa7666f392b8eb34da5cf203a5b0034f
                                                                          • Opcode Fuzzy Hash: b7f5465834f6e590c0bbed4cce9958aad9cdde72733777f65dba2b1614c7fcd9
                                                                          • Instruction Fuzzy Hash: 99E1B432208A8481EB62DF66E4443ED77A5F788BD4F548116EB4A5F7B8CF7AC884C741
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: lstrlen$ByteCharMultiWide
                                                                          • String ID: .$.$/$/$:$Start$a$auto_update_domain$com$e$f$h$k$o$o$p$r$s$t$t$t$w$w$w$w
                                                                          • API String ID: 477651035-1038781873
                                                                          • Opcode ID: 652a20e7a2572e4ecdc1d2d50a95e814720ad845413677b369cbd449c423dca3
                                                                          • Instruction ID: 605818b88a422d67cb553fba9621f2b72a2fa53064d5ecd022150907ca5edf59
                                                                          • Opcode Fuzzy Hash: 652a20e7a2572e4ecdc1d2d50a95e814720ad845413677b369cbd449c423dca3
                                                                          • Instruction Fuzzy Hash: 5481913220868086E752CB3AE8487DD77A5F389BD8F584215F79C476BACB7DC949CB10
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: LongWindow$MessageSend$AllocFolderGlobalLocationSettingsSpecial
                                                                          • String ID: g
                                                                          • API String ID: 1528256793-30677878
                                                                          • Opcode ID: 9d70cd2dfe3b08ff4a48f132ec8a9e10b75704701d64df2a7dac44062355b066
                                                                          • Instruction ID: 3535d59f8bcc30ae388a77284d4861c99e2a340e566c5f91dd2fabfe10c68ed7
                                                                          • Opcode Fuzzy Hash: 9d70cd2dfe3b08ff4a48f132ec8a9e10b75704701d64df2a7dac44062355b066
                                                                          • Instruction Fuzzy Hash: 0C81C336200B9096E7659F63E8147D9B3A1F38CBA4F184225EF5A47BA4CF79C495C740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$MenuParent$AppendMalloc$ClientCountItemScreen
                                                                          • String ID: 0$0
                                                                          • API String ID: 3922845531-203156872
                                                                          • Opcode ID: 7ce9dacb1bc64561837ac27299ddedabc1a54e358a56596400871af15922fa3b
                                                                          • Instruction ID: 7f67bf3373ce3a456f9989ec7ffe31b5fd478d69111acfe88976eef59cd645a9
                                                                          • Opcode Fuzzy Hash: 7ce9dacb1bc64561837ac27299ddedabc1a54e358a56596400871af15922fa3b
                                                                          • Instruction Fuzzy Hash: 67A14A72215A8082EB66DF23E8547DAB3A1F389BC0F444526EB9A47BB4CF78C945C740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Window$Long$InitializeLengthProcTextUninitialize
                                                                          • String ID:
                                                                          • API String ID: 2434527812-0
                                                                          • Opcode ID: 82c245bcf7b4fbf843697dfbe54cce4bd7381970a776bb4d117c168738b632a9
                                                                          • Instruction ID: 8cf8d774629b1b792a8639e8062def99c3f65678199ee207a8be0d27a644c741
                                                                          • Opcode Fuzzy Hash: 82c245bcf7b4fbf843697dfbe54cce4bd7381970a776bb4d117c168738b632a9
                                                                          • Instruction Fuzzy Hash: 63B16D32210B4486EB169F76D8957EC23A1FB4DFE9F444616EB6A4B7E4CF3AC4058341
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: CharNext$lstrlen
                                                                          • String ID: %*.*f
                                                                          • API String ID: 2675299387-4192566172
                                                                          • Opcode ID: 3fe3da11784543e7d843720205ee1903bdd7cf345871e15eea4f6f606d473c2e
                                                                          • Instruction ID: b4c1326da23ca97ccb6389a22e72082814a40bd792c4521e559d803615b2f45d
                                                                          • Opcode Fuzzy Hash: 3fe3da11784543e7d843720205ee1903bdd7cf345871e15eea4f6f606d473c2e
                                                                          • Instruction Fuzzy Hash: D6F1F0B660058086FB67EB2BB4183FD62A5F78CBD4F584125EB4A57AF5DB39C881C304
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: ClassRegister$CriticalCursorInfoLoadMessageSectionWindow$EnterLeave
                                                                          • String ID: AtlAxWin90$AtlAxWinLic90$WM_ATLGETCONTROL$WM_ATLGETHOST
                                                                          • API String ID: 185448633-2573294316
                                                                          • Opcode ID: 4a4dc0a71a64f910c3efcc53002b9c8d915b523e739c08cd6505fd3f4404b1fa
                                                                          • Instruction ID: 7986171e3b76222582f8c06ca4b60176ae19bcc8dc82d8985c2837d70915d36b
                                                                          • Opcode Fuzzy Hash: 4a4dc0a71a64f910c3efcc53002b9c8d915b523e739c08cd6505fd3f4404b1fa
                                                                          • Instruction Fuzzy Hash: 0951E635208B8596E761DF12F88039AB7A4F78CB84F95011AE68E47A78DF7DC549CB40
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Window$Long$InitializeLengthProcTextUninitialize
                                                                          • String ID:
                                                                          • API String ID: 2434527812-0
                                                                          • Opcode ID: 227c9dd65ee7533fb1e84d7316d8b4941004fe8c613ba2a53903bd98b2763ab7
                                                                          • Instruction ID: 76dc4582497b9bdb2348e122cf3ea98d43fabccae93ac3cae806c58874e0c8c8
                                                                          • Opcode Fuzzy Hash: 227c9dd65ee7533fb1e84d7316d8b4941004fe8c613ba2a53903bd98b2763ab7
                                                                          • Instruction Fuzzy Hash: CBA16B32210B4086EB169F67D854BE823A1FB4DFE8F544616EB2A4BBF4DF7AC4458340
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: ObjectSelect$DrawText$ClientRectReleaseWindow
                                                                          • String ID:
                                                                          • API String ID: 1355666434-0
                                                                          • Opcode ID: 893e0c766cdfdd3461609f2a558485331817d1031521fe845494253acd3cdb6d
                                                                          • Instruction ID: 9d926bde3497d3a3371b77ea12b0fb76e1a34730dc86fc67dd60e8615cecfe53
                                                                          • Opcode Fuzzy Hash: 893e0c766cdfdd3461609f2a558485331817d1031521fe845494253acd3cdb6d
                                                                          • Instruction Fuzzy Hash: 1B615C72604A8086E761CF6AE4443AEB3A1F789FD8F444125EF8957B68DF79C489CB40
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Window$ClientShow$Screen$Rect
                                                                          • String ID:
                                                                          • API String ID: 4033864348-0
                                                                          • Opcode ID: 82c66f738b9c41a2d33d2497e02259bb66c8bcd59079c4847bd791c22aabd92b
                                                                          • Instruction ID: 1976d155ac8d099234ee3f07ae942c047681902390d94a75db932e77025a7aee
                                                                          • Opcode Fuzzy Hash: 82c66f738b9c41a2d33d2497e02259bb66c8bcd59079c4847bd791c22aabd92b
                                                                          • Instruction Fuzzy Hash: AF7128762056C4CADB11CF26E48439E7BB1F388F98F180125EB465BB68CF7AD585CB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: FolderMenuWindows$HookInfoLocationSpecial$ClassCreateCurrentCursorDesktopDestroyDirectoryFileFromItemListMessagePathPopupRegisterSendThreadTrackUnhookWindowlstrlen
                                                                          • String ID: 1
                                                                          • API String ID: 1986443932-2212294583
                                                                          • Opcode ID: 017e1fcdb5041dea43e4e5ef5ca760f41a045f45972e04e04561bb667492bedf
                                                                          • Instruction ID: 4a34fb743099f5c0d21492d07469bf26186d2e4b10e55b7b02df0579b31d6d60
                                                                          • Opcode Fuzzy Hash: 017e1fcdb5041dea43e4e5ef5ca760f41a045f45972e04e04561bb667492bedf
                                                                          • Instruction Fuzzy Hash: D8616D32200B8196E7A9DB22E590BDDB3A5F38CBC4F444016EF9947B64DFB9C4A4D780
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Window$MessageSendShow$AsyncFocusKillStateTimer$ClientCursorParentScreenText
                                                                          • String ID:
                                                                          • API String ID: 1093764380-0
                                                                          • Opcode ID: 37ebd5f6e52e66a54b59bbc2f7ff1f2532833614a27d4f5e2fa0e94b20c9e92b
                                                                          • Instruction ID: 6805c90a65e38899544e8c03b055e5b4624535c23f5bf62ab5c369371d14bfbe
                                                                          • Opcode Fuzzy Hash: 37ebd5f6e52e66a54b59bbc2f7ff1f2532833614a27d4f5e2fa0e94b20c9e92b
                                                                          • Instruction Fuzzy Hash: 5B518E32304A8082EB66EB63D9503EA7361F78CBD5F444026EB8E47AB5CF39DD958740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$ParentWindow$FocusKillRectShowTimer
                                                                          • String ID: 0$n$z
                                                                          • API String ID: 67215063-1260578908
                                                                          • Opcode ID: ad2fa97399c74bd8e148a163742bb3981c4192edaa37dd00953432776324da9c
                                                                          • Instruction ID: 353916c933dbeb335ca23472a2ee22bd995c05d693e285e5e6657473a8f6f8bf
                                                                          • Opcode Fuzzy Hash: ad2fa97399c74bd8e148a163742bb3981c4192edaa37dd00953432776324da9c
                                                                          • Instruction Fuzzy Hash: 9A516F32205B8492EB56CF27E5403DD73A0F38CBC0F18452AEB5A47BA4CF78C9958740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Window$ClientRectScreen$ClipColorExcludeMessageOffsetParentPointsProcSend
                                                                          • String ID: @@@
                                                                          • API String ID: 2202115610-159275591
                                                                          • Opcode ID: a8ba20d67e2554cb8f7e019cc5a408e0be371603667b6fe64e080c7b47ba407f
                                                                          • Instruction ID: cfd89bdcf9b9de1506be96823bbc52b926521566db7552c5b4f4f4d4a564549d
                                                                          • Opcode Fuzzy Hash: a8ba20d67e2554cb8f7e019cc5a408e0be371603667b6fe64e080c7b47ba407f
                                                                          • Instruction Fuzzy Hash: 81515E76604B8486E761CF27E84079EB761F388FC0F444116EB9A4BBA9CF3AD455CB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: ObjectStock
                                                                          • String ID: (
                                                                          • API String ID: 3428563643-3887548279
                                                                          • Opcode ID: dbfb32c48899aaefe43eaba97014cafc6b24533e1e6f2073b3d9948d7bb9592a
                                                                          • Instruction ID: 5c754f1ce86fb98e8e9def602d4d805f5c7ee26293241d6fdc1ebd05c272f42c
                                                                          • Opcode Fuzzy Hash: dbfb32c48899aaefe43eaba97014cafc6b24533e1e6f2073b3d9948d7bb9592a
                                                                          • Instruction Fuzzy Hash: 86412176206B408AEB529B62E8543AA77A0FB4DBC5F484025EF4E4B764DF7DC844CB41
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Window$Client$Screen$Rect$Show
                                                                          • String ID: \
                                                                          • API String ID: 246452983-2967466578
                                                                          • Opcode ID: d47420ffb9c6a9e4f20d59f050cefa3e15003d7d6e67e64eaf7e1f1bf76f9deb
                                                                          • Instruction ID: f665aa084009d26088d94018eddfa345193660b9efb92d92c2f5957e8de33296
                                                                          • Opcode Fuzzy Hash: d47420ffb9c6a9e4f20d59f050cefa3e15003d7d6e67e64eaf7e1f1bf76f9deb
                                                                          • Instruction Fuzzy Hash: 5F51B076214B848AD711CF2AE48865EBBB5F38CB94F184125EB8947B28CF3AD945CF40
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: lstrlen$Version$_cwprintf_s_l
                                                                          • String ID: Unbekannt $ Win32 NT $ Win32 WINDOWS$ Win32s$Windows %d.%d
                                                                          • API String ID: 186566674-1665667020
                                                                          • Opcode ID: 7ac9d5a7afde2f0ab05f418263c8f16b336959beaec5b9c1beb767fe6be93ec7
                                                                          • Instruction ID: a7870134e7f6aaab7ce6c1545d93f9d4c2554553abfe56dcda2b0a86a282c088
                                                                          • Opcode Fuzzy Hash: 7ac9d5a7afde2f0ab05f418263c8f16b336959beaec5b9c1beb767fe6be93ec7
                                                                          • Instruction Fuzzy Hash: B741CE74220E059AFB57DB1BEC453E437B1B75DB86F880451EB0A6B2B0DB3AC848CB51
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: ClientGlobalKillRectTimer$#190FolderFreeLocationShowSpecialUnlockWindow
                                                                          • String ID:
                                                                          • API String ID: 296821359-0
                                                                          • Opcode ID: f5d0d520823314f4caf08c963358c158c66f2b9a780af6c20416ee76c4d95752
                                                                          • Instruction ID: 3652137149b15181d2ea5413d4dbcb7718f1dd4f1004878e16fc513910652855
                                                                          • Opcode Fuzzy Hash: f5d0d520823314f4caf08c963358c158c66f2b9a780af6c20416ee76c4d95752
                                                                          • Instruction Fuzzy Hash: B18149B2315A4182FB66DB26F8547AA63A0F78CFD8F084121EB5A476B5DF3DC449C704
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$ItemTextWindowlstrlen$_cwprintf_s_l
                                                                          • String ID: %s\%s
                                                                          • API String ID: 4093046438-4073750446
                                                                          • Opcode ID: 68f6d6e936142cc6abd4d8e24d6dd9447a291e48de21addc7d95c0bade4a9985
                                                                          • Instruction ID: 53bbeb9e5caabb3b8c04ebf1d86b7c83d5c5240be59d6a0cb739a061037817ca
                                                                          • Opcode Fuzzy Hash: 68f6d6e936142cc6abd4d8e24d6dd9447a291e48de21addc7d95c0bade4a9985
                                                                          • Instruction Fuzzy Hash: C4814F72214A8182EA52DB26E8903E97360F789BF0F544322AB7E87BF5DF38C445C740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Window$Rect$ClientLongParent$InfoParametersPointsSystem
                                                                          • String ID:
                                                                          • API String ID: 2289592163-0
                                                                          • Opcode ID: e78856af9152c24a87f141017bd36f2d3bad89628bb575f646988a1160544266
                                                                          • Instruction ID: 312306d3f7eb7005132e0c3f4ef1c4776f6e8c197fce6b373ac1fd4fb78c43b8
                                                                          • Opcode Fuzzy Hash: e78856af9152c24a87f141017bd36f2d3bad89628bb575f646988a1160544266
                                                                          • Instruction Fuzzy Hash: 7E418D72324A4186E712CF3AF94879EB761F78CBD0F644110EB9987AA8CF39D804CB40
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Object$CreateFontIndirect$DeleteInfoParametersStockSystemlstrcpyn
                                                                          • String ID: FontFaceName$Start
                                                                          • API String ID: 3063546216-3130205924
                                                                          • Opcode ID: c6e1499cfb9564bb87d0e889e4a3538c7a7504f1bc9edd6da0c40f8a7d3fc47a
                                                                          • Instruction ID: 1335b930583471c401568da85460d81441081d594d8bf66777c56c906804ed68
                                                                          • Opcode Fuzzy Hash: c6e1499cfb9564bb87d0e889e4a3538c7a7504f1bc9edd6da0c40f8a7d3fc47a
                                                                          • Instruction Fuzzy Hash: 69816272204A8086EB62DB26F4503DAB7A1F78DB90F544225EB9D476B9DF3CC544CB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Message$Send$Focus$#155ShowWindow
                                                                          • String ID: o
                                                                          • API String ID: 2215054203-252678980
                                                                          • Opcode ID: 94a81325d3e9a3dd52085e5951d4ef5b73bf1f2d353f4957e86eb7ed04f8b1f8
                                                                          • Instruction ID: f360dae6c34f02a1a50e69c9ca832809ff607a5ede2e33d9de8455e465023ea0
                                                                          • Opcode Fuzzy Hash: 94a81325d3e9a3dd52085e5951d4ef5b73bf1f2d353f4957e86eb7ed04f8b1f8
                                                                          • Instruction Fuzzy Hash: C7715C72210A4182EB629B67E8507DA6360F7D8BF4F444312AB6E47AF5CF7CC881C740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc
                                                                          • String ID: GdipCreateFromHDC$GdipCreateImageAttributes$GdipDeleteGraphics$GdipDrawImageRectRectI$GdipSetImageAttributesColorMatrix
                                                                          • API String ID: 190572456-226930721
                                                                          • Opcode ID: ec020341f3fd1c9a219bf9e339275d5b6ec1268e70b2c8aff49a7e354ba13650
                                                                          • Instruction ID: d79905fdd51cec85347cc80a3e93e2b177e4b0c056a36e1656d9055f5e08d980
                                                                          • Opcode Fuzzy Hash: ec020341f3fd1c9a219bf9e339275d5b6ec1268e70b2c8aff49a7e354ba13650
                                                                          • Instruction Fuzzy Hash: 0681E732515F819AE671CF13E8807AAB3B0F7DDB90F14521AEB8946678DF78C490DB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: CloseItemMessageSend$DeleteDialogExecuteFileModuleNameOpenShell_cwprintf_s_l
                                                                          • String ID: RegisterAdminKey4_EEETWETRFSD=%d$runas
                                                                          • API String ID: 1829791887-816592029
                                                                          • Opcode ID: e372da56c28a990fbb92f7d819f175b5be815f8c1b7e09dd1fcf64c85f84d74b
                                                                          • Instruction ID: 4334877fde328765f94068981d195eae6652ff7aec441a5f90725909425142f0
                                                                          • Opcode Fuzzy Hash: e372da56c28a990fbb92f7d819f175b5be815f8c1b7e09dd1fcf64c85f84d74b
                                                                          • Instruction Fuzzy Hash: CB517432305A8182F762DF66E8913D973A0F78CBA4F584225E7698BAF5DF39C845C740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Class$CriticalInfoSection$Leave$CursorEnterLoadRegister
                                                                          • String ID: ATL:%p$P
                                                                          • API String ID: 269841140-2635742592
                                                                          • Opcode ID: 7135ce2e13eeb8f1b9f4bcc9cc07b40e4abefb95b85b1c23abd4ab857eedd00b
                                                                          • Instruction ID: 5c11983778a0ab81b461f75c5dd45ad7feddb2b90970f6c6fe026f4118fcad2c
                                                                          • Opcode Fuzzy Hash: 7135ce2e13eeb8f1b9f4bcc9cc07b40e4abefb95b85b1c23abd4ab857eedd00b
                                                                          • Instruction Fuzzy Hash: 26518A76200B80A3EA25DB23E5443DD33A0F389BC0F444612EF5A4BBA4CB7AD5A5C740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Window$ClassCreateFolderHandleLocationLongModuleRegisterShowSpecial
                                                                          • String ID: NotifyWnd_123$P
                                                                          • API String ID: 299184763-2082992119
                                                                          • Opcode ID: 1d53f2cbd94e36df47257f48112cbb351e0baf55650e9ff48d23cdca450d3295
                                                                          • Instruction ID: 6e4335584d0a11d185457a98343a665f84a6d97a261aeb1d3196329f68ad3c39
                                                                          • Opcode Fuzzy Hash: 1d53f2cbd94e36df47257f48112cbb351e0baf55650e9ff48d23cdca450d3295
                                                                          • Instruction Fuzzy Hash: 57415E32614B8087F765CF22E44839EB3A0F78CB99F540119EB894BAA8CF7EC155CB40
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: lstrcat$lstrlen
                                                                          • String ID:
                                                                          • API String ID: 751011610-0
                                                                          • Opcode ID: 2c46cecf6dd1d1aeaeca04e78982a9fbe33ca1ac9120f1a51e7d7d4f4d1fd1c9
                                                                          • Instruction ID: a6d428bd347c04e7a3eb1a91d8404619ce07dde4f06cd20341777a9d9b1d3f47
                                                                          • Opcode Fuzzy Hash: 2c46cecf6dd1d1aeaeca04e78982a9fbe33ca1ac9120f1a51e7d7d4f4d1fd1c9
                                                                          • Instruction Fuzzy Hash: BC514EB130064189DF669F22E9543A973A2FB1CBD4F488022DF46AB374EB7DC490C344
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: CreateInstance
                                                                          • String ID: {
                                                                          • API String ID: 542301482-366298937
                                                                          • Opcode ID: 6bd7c3035b2f1fec2c520c9da2092109bdcf0cc699e1576e10d92db8021fd3a6
                                                                          • Instruction ID: e2cddfe4c8c8dd64bed88e1f857c62dc5917b2c5f16a611aa439516e0512c65a
                                                                          • Opcode Fuzzy Hash: 6bd7c3035b2f1fec2c520c9da2092109bdcf0cc699e1576e10d92db8021fd3a6
                                                                          • Instruction Fuzzy Hash: 4D51743260464181EB629F2AE844BD973B1F38CB98F588112FB5A4B6B4DB7AC586C700
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$Parent$ClientCursorScreen
                                                                          • String ID: 0
                                                                          • API String ID: 3424710631-4108050209
                                                                          • Opcode ID: 6972e0b8af878e675b3cba79eeed6a12daec459d72d18f05386f1dda4083b506
                                                                          • Instruction ID: b08a569aa33570b1f3eb60ac203390e3ace8c55b3d1c2544c6414936085219ec
                                                                          • Opcode Fuzzy Hash: 6972e0b8af878e675b3cba79eeed6a12daec459d72d18f05386f1dda4083b506
                                                                          • Instruction Fuzzy Hash: 9B312F72214A8482E761DF22E4547DE73A1F78CF89F484016EB8D4BAA8CF3DC949CB40
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Ctrl$Parent$ExecuteInvalidateMessageRectSendShell
                                                                          • String ID: open
                                                                          • API String ID: 1200564152-2758837156
                                                                          • Opcode ID: 518eda953508c50585776ef5b8d8172c329e54e578ab125f7fbe16511b086925
                                                                          • Instruction ID: bdd8e8cff3ba433485ce1aaed6632ce3e642ae7ee45adf98f839c4fb0c243799
                                                                          • Opcode Fuzzy Hash: 518eda953508c50585776ef5b8d8172c329e54e578ab125f7fbe16511b086925
                                                                          • Instruction Fuzzy Hash: F4215C36204B8083E725CB22F8953A9B761F78DBD5F084526EB9A4BB64CF3AD465C740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: LineObject$DeleteSelect$CreateMove
                                                                          • String ID:
                                                                          • API String ID: 942295950-0
                                                                          • Opcode ID: 8905afc1c0ad8fed279197ddca2ebb14e51d8cef65e504ca11912654cb231f72
                                                                          • Instruction ID: dafebe9fe28e3f16b7396be985a0e8fda7e01714ea8ec3aa6c9759547280ec70
                                                                          • Opcode Fuzzy Hash: 8905afc1c0ad8fed279197ddca2ebb14e51d8cef65e504ca11912654cb231f72
                                                                          • Instruction Fuzzy Hash: 5A21963A710A808BD7559F23E95479AB761F78DFD4F188015EF5A0BB28CF39E4458B80
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: _cwprintf_s_l$AddressLibraryLoadMessageProclstrlen
                                                                          • String ID: $--$%d c2:%d$%d.) %s : %s
                                                                          • API String ID: 2498098824-883129594
                                                                          • Opcode ID: 70e4913d2d89bd3880ad882b7e21b25d7f954f37d94998cd494a27b14dc6733a
                                                                          • Instruction ID: 1662987e0f51c3c27642f526c6c655dd5087fd7a4b320527f6e57c0d40f780c9
                                                                          • Opcode Fuzzy Hash: 70e4913d2d89bd3880ad882b7e21b25d7f954f37d94998cd494a27b14dc6733a
                                                                          • Instruction Fuzzy Hash: 9EE17072305A8082EA52CB7AE8517D963A1F789BF4F444312EB6E976F5DF38C445CB40
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: ImageMessageSend$ClientCreateCtrlFindInfoInstanceList_RectWindow
                                                                          • String ID: SysTreeView32
                                                                          • API String ID: 3498475682-1698111956
                                                                          • Opcode ID: b40857ce68eca97ac279472ae2654539bca499f7acb29a13780fa7775b3860a5
                                                                          • Instruction ID: b967fff96086e11505ed5890c6433bfeb092e69e14d3da72218f5800dead6df7
                                                                          • Opcode Fuzzy Hash: b40857ce68eca97ac279472ae2654539bca499f7acb29a13780fa7775b3860a5
                                                                          • Instruction Fuzzy Hash: E7812576210B8486DB65DF26E8847DE73A5F388B80F548922DBAE47B64DF39D885C700
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: lstrlen$CloseOpenQueryValue
                                                                          • String ID: Content Type$application/unknown
                                                                          • API String ID: 2304643261-1085911772
                                                                          • Opcode ID: 729a1a9da6d946ea1f34177d70679dbff31b99967a0bb983a2b847bf8bd67fac
                                                                          • Instruction ID: 7d05fe7c52b983f75d58c2bb761ad57d65d29fbc042a1f479a0e2f95defb6702
                                                                          • Opcode Fuzzy Hash: 729a1a9da6d946ea1f34177d70679dbff31b99967a0bb983a2b847bf8bd67fac
                                                                          • Instruction Fuzzy Hash: DE716C36211A4096EB529F66E8803DA63A0F788BE4F448225FB6E477F6DF38C455CB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: lstrlen$BrowseFolderFromListMallocMessagePath
                                                                          • String ID: Failed to get directory$Verzeichnisauswahl / Select a directory:
                                                                          • API String ID: 611531059-3768070435
                                                                          • Opcode ID: e5d83f78b5bc466dd82e8a16b2694b29347c46f22ebacb69bd1f815ada073fac
                                                                          • Instruction ID: 70b6ff1d12bcbbf4c6862068cb43ef99f1d53f3ccfea9ca737139f6557321e0e
                                                                          • Opcode Fuzzy Hash: e5d83f78b5bc466dd82e8a16b2694b29347c46f22ebacb69bd1f815ada073fac
                                                                          • Instruction Fuzzy Hash: 4D615032211A4086E756EB3AE8953A923A0FB8CFB4F544711DB6F8B6F4DF39C4558740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$ClientScreen$Cursor
                                                                          • String ID: o
                                                                          • API String ID: 2946236063-252678980
                                                                          • Opcode ID: ef7565315ca815afcddbb04c803b954a53bf61e154ffe7df45128ba5cbdcb52e
                                                                          • Instruction ID: 45a8256c60a5a16804508c6eb6fde6f4c1b61692bd0d3b56c2c541f91f8d4270
                                                                          • Opcode Fuzzy Hash: ef7565315ca815afcddbb04c803b954a53bf61e154ffe7df45128ba5cbdcb52e
                                                                          • Instruction Fuzzy Hash: C3413B36214A8583EB65CB22E4547DEB3A0F78CFD5F448122EB5A0BB68DF79C555CB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Window$FocusFolderLocationMessageRedrawSendShowSpecialUpdate
                                                                          • String ID: p
                                                                          • API String ID: 1076984956-2181537457
                                                                          • Opcode ID: 266f0b2ab112205f0fbbeebdebc48049461b818aec0bb42451ce944bca3b1aed
                                                                          • Instruction ID: 9eb0a05253ee0a9591f03b78a0303ee2663ee33ba0746f13fc5c789fc2b9bbd8
                                                                          • Opcode Fuzzy Hash: 266f0b2ab112205f0fbbeebdebc48049461b818aec0bb42451ce944bca3b1aed
                                                                          • Instruction Fuzzy Hash: DB318D72300A8087E718DF67E95478EB761F78CBA0F448225DBAA47BA4CF39D465CB40
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Folder$LocationSpecial$Version$Concurrency::details::stl_critical_section_win7::stl_critical_section_win7CreateCriticalDeleteDesktopFontIndirectInitializeObjectSectionSettings
                                                                          • String ID:
                                                                          • API String ID: 4159206225-0
                                                                          • Opcode ID: a799804ddf88ae58d7e28c15e9a88a2b400b0d6743f4b1ee47025bf93db21a22
                                                                          • Instruction ID: 6f3ffeec9e0406492a276f117b0f5e0e68a6d5468a7e380ec3e4171c25c19210
                                                                          • Opcode Fuzzy Hash: a799804ddf88ae58d7e28c15e9a88a2b400b0d6743f4b1ee47025bf93db21a22
                                                                          • Instruction Fuzzy Hash: 2C810872201B8087E769CF26F8947DEB7A8F749BA4F504219DBEA076A0DF39D055CB40
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$lstrlen$DrivesLogical
                                                                          • String ID: 0
                                                                          • API String ID: 1932446174-4108050209
                                                                          • Opcode ID: 592ac17d05d446328c3688e30ddf1153552348c05069813c25ede8053c76e5e4
                                                                          • Instruction ID: e856c5174a01106574392260ac54b9b31cd9196cc3e436c50abd4262a28f5b2a
                                                                          • Opcode Fuzzy Hash: 592ac17d05d446328c3688e30ddf1153552348c05069813c25ede8053c76e5e4
                                                                          • Instruction Fuzzy Hash: 8771A132204A8096E762DF26E8407DE77A0F788BA4F444226EB9D47AF5DF3CC549CB40
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Global$Unlock$ClipboardFormatFreeLockMediumRegisterRelease
                                                                          • String ID: Shell IDList Array
                                                                          • API String ID: 660139674-4184189358
                                                                          • Opcode ID: d9502714cfd4eeb025a438ff4370efde520d43677dca64ecf7438b66c26511cb
                                                                          • Instruction ID: d4b21c7c341ee0f96bc615b554f6c755829edfc16a3668a57fc3daebf2462da3
                                                                          • Opcode Fuzzy Hash: d9502714cfd4eeb025a438ff4370efde520d43677dca64ecf7438b66c26511cb
                                                                          • Instruction Fuzzy Hash: D031F3B2204A4186EB52CB26E88439967B0FB8CBD4F144125EB8A87674DF3DC554CB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$Focus$DebugOutputString
                                                                          • String ID: fffff
                                                                          • API String ID: 3720455092-4168676731
                                                                          • Opcode ID: d87b18b21f16af6a7ec6c76fb937ac97ee716c7bf0c7f15d98149f5f35deb68e
                                                                          • Instruction ID: 06b651e80687653329116ea51fc719b0f8f11fc327404b097ad18aa9ec196e5c
                                                                          • Opcode Fuzzy Hash: d87b18b21f16af6a7ec6c76fb937ac97ee716c7bf0c7f15d98149f5f35deb68e
                                                                          • Instruction Fuzzy Hash: 93011D3171154182EB518F72F859BE93360E79DF8AF4C50218F0A0FA70DF3AC44A8740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$Timer$CurrentExceptionKillRaiseThread
                                                                          • String ID:
                                                                          • API String ID: 3847418034-0
                                                                          • Opcode ID: 68dc1cbe0aa24f5a72b5a5f84de792b169ec02f3503486e96eca1d02fefaeae8
                                                                          • Instruction ID: b550e88aca2e2971f9cabf041bfae2363234ac33b535199f5b93c579eccb6f49
                                                                          • Opcode Fuzzy Hash: 68dc1cbe0aa24f5a72b5a5f84de792b169ec02f3503486e96eca1d02fefaeae8
                                                                          • Instruction Fuzzy Hash: A2414B32310B4082EB658B27E4947A973A5F788FD5F548129EF5E4BBA5CF39C8858700
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: CreateInstance
                                                                          • String ID:
                                                                          • API String ID: 542301482-0
                                                                          • Opcode ID: 0b51c8b527ad2f00af57ab81d83cb1fae91b659708fd774fc8f7d48fba9401a9
                                                                          • Instruction ID: 30c3a11663207b04ce095c9100f30b01413de14057cc9cfd9d68442222aacb3b
                                                                          • Opcode Fuzzy Hash: 0b51c8b527ad2f00af57ab81d83cb1fae91b659708fd774fc8f7d48fba9401a9
                                                                          • Instruction Fuzzy Hash: 88413572214B4492EB22DF26E8503D973B0F789F95F544122DB8E4B6B8DF39C989C740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Window$FocusMessageSendShow$TextTimer
                                                                          • String ID:
                                                                          • API String ID: 1913100717-0
                                                                          • Opcode ID: de8d7ff7c91b498aabb582babbec0c5d97a4d4816c88dcba63e197aca167ba28
                                                                          • Instruction ID: c75126f2db7df582280ac30466f0de8ea6cd3c0ad971bec71a96c073e1f00cd0
                                                                          • Opcode Fuzzy Hash: de8d7ff7c91b498aabb582babbec0c5d97a4d4816c88dcba63e197aca167ba28
                                                                          • Instruction Fuzzy Hash: 83312B36200A8182E752DF76E8507D97362F7C8BF8F5842229F694BAE8CF39C945C740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$KillTimer
                                                                          • String ID:
                                                                          • API String ID: 1116794301-0
                                                                          • Opcode ID: e45ad180756f6a66daf05634541f668884d209b0447e005d31019f26e81111e8
                                                                          • Instruction ID: 1bab376f7a794c7d31a38753163fbee1d4bf8b7147017290e8f01d4ca8160433
                                                                          • Opcode Fuzzy Hash: e45ad180756f6a66daf05634541f668884d209b0447e005d31019f26e81111e8
                                                                          • Instruction Fuzzy Hash: 30211C35201A8082EB919FB7E85479D6361E7CDFDAF5890319F4A5BBA8DE38C8858350
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: FreeTask_cwprintf_s_llstrlen$AddressByteCharLibraryLoadMultiProcWide
                                                                          • String ID: %s,%d;$ViewMode,%d;ImageSize,%d;FolderFlags,%d;GroupBy,%s;Group,%d;
                                                                          • API String ID: 1249642529-1631008325
                                                                          • Opcode ID: 203c4573784517ce03fd3c447d22a9bbf788c9fd543a52949406ede2e60a0183
                                                                          • Instruction ID: 9ab6454bb757e8da9094741ec634296485af00c7723aab5dd1c2fcc9ba6f4e5e
                                                                          • Opcode Fuzzy Hash: 203c4573784517ce03fd3c447d22a9bbf788c9fd543a52949406ede2e60a0183
                                                                          • Instruction Fuzzy Hash: 17C16172204A8086EA12DB2AE4403DEB7A1F7C9FE4F544212EB9D47BA9DF79C545CB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AllocGlobalMessageSend
                                                                          • String ID: g
                                                                          • API String ID: 277534643-30677878
                                                                          • Opcode ID: a3ede16d70b84d5b16f8be3e7eef29651660cf2209a86c703adac8cf844c0f0e
                                                                          • Instruction ID: 58952fd4f6ce98fa664fcb414808b88aa69d7abdc39faae01a3d54ba6093df09
                                                                          • Opcode Fuzzy Hash: a3ede16d70b84d5b16f8be3e7eef29651660cf2209a86c703adac8cf844c0f0e
                                                                          • Instruction Fuzzy Hash: 5F416B72604B85C6EB61CF56E8447DAB3A1F38CF94F544226EBA943BA8CF39C545CB40
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MenuPopup$CreateDesktopFolderMessageParentSendTrack
                                                                          • String ID: 8
                                                                          • API String ID: 4175632323-4194326291
                                                                          • Opcode ID: 953e1428a459ef7c34fd10fe8bc78450de88d03029f7ffd9cdbf9f1594351eae
                                                                          • Instruction ID: 6b4657662e0c15f174c5e52701b3c905c76491e72966aaa2a50895af07cd93e3
                                                                          • Opcode Fuzzy Hash: 953e1428a459ef7c34fd10fe8bc78450de88d03029f7ffd9cdbf9f1594351eae
                                                                          • Instruction Fuzzy Hash: C4510576314B8486EB618B26E49479AB7A0F789B89F548115EB8D4BB68CF7DC448CB00
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$Focus
                                                                          • String ID:
                                                                          • API String ID: 3982298024-0
                                                                          • Opcode ID: f860ffe6d2140f2844f54cab0ca51870d3129242f74bd8ea73c5c69872e084bb
                                                                          • Instruction ID: b610f388160f3f1a26fda727c0b36c87e76938eff2afb54359062850295804c1
                                                                          • Opcode Fuzzy Hash: f860ffe6d2140f2844f54cab0ca51870d3129242f74bd8ea73c5c69872e084bb
                                                                          • Instruction Fuzzy Hash: 5A419F31314A80C2FBA6AB62E8507DA7350F789BD5F488125AB594BEF5DF38CC95C704
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AllocTask
                                                                          • String ID:
                                                                          • API String ID: 277515162-0
                                                                          • Opcode ID: 5e8679a3c84486a76ba3651a4798ff9ea1603562ef64feffcd663faec1f149ab
                                                                          • Instruction ID: 2024940fa7bce86b04e29bd2d8e461a2552d7b48f24a366a49c5181144aec1d9
                                                                          • Opcode Fuzzy Hash: 5e8679a3c84486a76ba3651a4798ff9ea1603562ef64feffcd663faec1f149ab
                                                                          • Instruction Fuzzy Hash: 28319431200B8586FB569B67A4547D953B0EBCCBD4F184429BF4D8F7B5DE7AC8848380
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: CriticalSection$CurrentEnterExceptionRaiseThread$Leave
                                                                          • String ID:
                                                                          • API String ID: 1900833728-0
                                                                          • Opcode ID: ba634b300a653fc6c7866f7a959c155f4ccca22f17d11136a9290faf1b74e37b
                                                                          • Instruction ID: aa2b480570dfd8a4a5ca896e549a89b7028c7b0db67c4808613ad90208e02cc4
                                                                          • Opcode Fuzzy Hash: ba634b300a653fc6c7866f7a959c155f4ccca22f17d11136a9290faf1b74e37b
                                                                          • Instruction Fuzzy Hash: E8318E72210B8182EBA5CF62F95079977A4FB4CBC4F485421EF9A07F64DF38D4A58740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Rect$InvalidateUpdateWindow$CursorEventMouseTrack
                                                                          • String ID:
                                                                          • API String ID: 1598129390-0
                                                                          • Opcode ID: 802e805989fa9d4c4a32bece14764307a2230e9df8b2b09ca72670b31ce017dd
                                                                          • Instruction ID: 949cb897e6d9736c8290268a34c261f74a99af520b63d9f9da859e87e208ad99
                                                                          • Opcode Fuzzy Hash: 802e805989fa9d4c4a32bece14764307a2230e9df8b2b09ca72670b31ce017dd
                                                                          • Instruction Fuzzy Hash: E1314F7260468486EB52CF3AE5547DD77E0F788F88F484026EB894B679CF39C946CB90
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$TextWindowlstrlenwsprintf
                                                                          • String ID: @$entry_%03d$last_entry
                                                                          • API String ID: 1117576183-2027942737
                                                                          • Opcode ID: 48a734eb831d4a926fa84141339b4d994ed079c3306510baa5842e080204d01d
                                                                          • Instruction ID: 20367c67e7e0e347c9ea5ae8511fba4c3340f68be4988edafbc17f5fb6ca8904
                                                                          • Opcode Fuzzy Hash: 48a734eb831d4a926fa84141339b4d994ed079c3306510baa5842e080204d01d
                                                                          • Instruction Fuzzy Hash: 35316B72204A85A1EB31DFA2F4957DA73A1F78CBC0F841012EB8947A6ADF38C115CB84
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: LongWindow$MessageSend
                                                                          • String ID:
                                                                          • API String ID: 2178440468-0
                                                                          • Opcode ID: fa389dbd0ff469c580dd02baa99d938c1ff7d63db430f8735c4fcb3ba0e5e364
                                                                          • Instruction ID: 64377e77e092256bba4b0bf8dd6efe28a2cdfd72a8759b74ea15fe6f58fd8926
                                                                          • Opcode Fuzzy Hash: fa389dbd0ff469c580dd02baa99d938c1ff7d63db430f8735c4fcb3ba0e5e364
                                                                          • Instruction Fuzzy Hash: C7213576700B8193E718CB72E984B9A73A0F78DB94F448121DB1A07F21DF35D0798340
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: ColorRect$ClientClipCopyText
                                                                          • String ID:
                                                                          • API String ID: 3037928153-0
                                                                          • Opcode ID: 8f9e3595d1f24f89afdd309441a8681e8f0c67a4d7e7932a1e4881341db277d8
                                                                          • Instruction ID: 8260f42f37f333a98bb1e8b9bc4db72a3e4eedd5c871235fd60e27b76e8a4575
                                                                          • Opcode Fuzzy Hash: 8f9e3595d1f24f89afdd309441a8681e8f0c67a4d7e7932a1e4881341db277d8
                                                                          • Instruction Fuzzy Hash: 4D5177766187908BD315CF1AA84479AFBA5F3D8B81F50411AFB8643B28DB7DD846CF00
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSendWindow$Capture$ReleaseShow$CursorRectVisible
                                                                          • String ID:
                                                                          • API String ID: 898369708-0
                                                                          • Opcode ID: 9c36f5682363d8106458575818e2ac02bb8ebccf653df2b50aa808af24c2f18c
                                                                          • Instruction ID: 9e7ededcd470cc7bf4384a777be597110a382e4ea636f7fee75998e3a344dd72
                                                                          • Opcode Fuzzy Hash: 9c36f5682363d8106458575818e2ac02bb8ebccf653df2b50aa808af24c2f18c
                                                                          • Instruction Fuzzy Hash: 89515B36604B8096EB618B62F4043DE72A4F388BC8F20452AFB8917BA5DF79C945CB45
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Close$DeleteEnumOpen
                                                                          • String ID:
                                                                          • API String ID: 1912718029-0
                                                                          • Opcode ID: bf99dca1336df69e9244f836b331ceaeb518d51efc0e3d7ef9c974df55cd5413
                                                                          • Instruction ID: d7bd5abe59ac059ee7eff851a91fbfb4fc1a61cb37cfc273d06cbcdd0c71c80d
                                                                          • Opcode Fuzzy Hash: bf99dca1336df69e9244f836b331ceaeb518d51efc0e3d7ef9c974df55cd5413
                                                                          • Instruction Fuzzy Hash: 32313E76608B8486DA51DF66F88479AB7A0F38CBD4F940025EB8E47B65CF7DC485CB40
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$LongWindow
                                                                          • String ID:
                                                                          • API String ID: 312131281-0
                                                                          • Opcode ID: 12d0f0d73ac8d2e3b61ed2c7a29258e4ce9088586d7d1f5a5a690189d225b3e2
                                                                          • Instruction ID: 39fb874ae95ad9df0cd18ba223608d9a1f9d5846aaa8b884554e399c5500fca1
                                                                          • Opcode Fuzzy Hash: 12d0f0d73ac8d2e3b61ed2c7a29258e4ce9088586d7d1f5a5a690189d225b3e2
                                                                          • Instruction Fuzzy Hash: FA21BE71B1068182FB618BA3F845BDA2390E7CCBE5F589121AB0A4BEB4DE79C1418740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: CapsDevice$FindReleaseWindow
                                                                          • String ID:
                                                                          • API String ID: 359319186-0
                                                                          • Opcode ID: 335af62c087f23680f868d21f8b268083a477dfa7f84046068a8233ea32e3cee
                                                                          • Instruction ID: 555d2e7100eae8ecbc063fbf60d384ae605c5965ff4310db2ed006cd44cf6971
                                                                          • Opcode Fuzzy Hash: 335af62c087f23680f868d21f8b268083a477dfa7f84046068a8233ea32e3cee
                                                                          • Instruction Fuzzy Hash: AF113D75300B408AEB4ADF72E84935A76A1F78CFC1F188129EF4A4BB65DF3AD8118744
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: ClientScreen$MoveParentWindow
                                                                          • String ID:
                                                                          • API String ID: 2420994850-0
                                                                          • Opcode ID: 1f98c295c3b08c56dcbf839a4a4d2b88b824048dac41c1f21ebf9688380bf2dc
                                                                          • Instruction ID: 7f329799f33bd3262adc9ebb96557a10ded11004f7850d3629f50e521894eeb0
                                                                          • Opcode Fuzzy Hash: 1f98c295c3b08c56dcbf839a4a4d2b88b824048dac41c1f21ebf9688380bf2dc
                                                                          • Instruction Fuzzy Hash: E6115C76316B418AEA51DF26E84479DB760FB88BC4F045511EB8A4BB28EF3DC455CB40
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: FocusKillShowTimerWindow
                                                                          • String ID:
                                                                          • API String ID: 3044290596-0
                                                                          • Opcode ID: 8621990ddfdd798133131d01057765c320258a9855b5f303c8fe18765cb774f9
                                                                          • Instruction ID: 2b9b25263dbd1fb5fa7c94dd138958bca2446ae866684a869933d9ca086554c2
                                                                          • Opcode Fuzzy Hash: 8621990ddfdd798133131d01057765c320258a9855b5f303c8fe18765cb774f9
                                                                          • Instruction Fuzzy Hash: D5015E31705A8092EB86C76BE5543EE6261F7DCBC1F0840259B494BA70CF3CC9D2C340
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Window$MessageSendShow$CaptureReleaseVisible
                                                                          • String ID:
                                                                          • API String ID: 3175066377-0
                                                                          • Opcode ID: ce0e83a03ec4ee1dd4523d9e77da799b9ee6c93cae91b3f4803d904d8190cee2
                                                                          • Instruction ID: 16d2b01de5cf0ce976be5311fdb5b58e5e045f856cc25ec0490923595423f03d
                                                                          • Opcode Fuzzy Hash: ce0e83a03ec4ee1dd4523d9e77da799b9ee6c93cae91b3f4803d904d8190cee2
                                                                          • Instruction Fuzzy Hash: 5B01FB7170164582F7969F73E8587E92361EB8CF96F4880368B0A5F665CF39C9868350
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: lstrlen$ByteCharInfoItemMenuMultiWide
                                                                          • String ID: $0$H$MENU_2017
                                                                          • API String ID: 3110664725-3967075016
                                                                          • Opcode ID: 8e81b88c14c24131ab1970799924c347965d24fb70a2d45b9b1259aab2ef4ff1
                                                                          • Instruction ID: 814d161aec673e9a6ab83f971220734419c78d4361167942e45194d01dc9a85f
                                                                          • Opcode Fuzzy Hash: 8e81b88c14c24131ab1970799924c347965d24fb70a2d45b9b1259aab2ef4ff1
                                                                          • Instruction Fuzzy Hash: 76D1617330598182EB62CB2AE8517DA6360FB89BB4F444311B7BD879E6DF78C585CB40
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: DebugOutputString
                                                                          • String ID: >>>>>>>>>>>>>>>>>>>>>>>>:$audio$image$video
                                                                          • API String ID: 1166629820-85831261
                                                                          • Opcode ID: 89fbec7ecaf396ec757d79277fa80d567e2ed32d2e822b1b38b77f2b79e6fa56
                                                                          • Instruction ID: 4ea4c7d9c971c157d1c39f83fbb9d670df84a9e1285380ed96d5ec2a79abadac
                                                                          • Opcode Fuzzy Hash: 89fbec7ecaf396ec757d79277fa80d567e2ed32d2e822b1b38b77f2b79e6fa56
                                                                          • Instruction Fuzzy Hash: FFC14FB3201A8086EA62DB2AE4913DE73A1F7897B4F144312B779576F6CF38D885C740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: CompareString$lstrlen
                                                                          • String ID: </A>$<A>
                                                                          • API String ID: 1657112622-2122467442
                                                                          • Opcode ID: f1ae98306a0dc4d9a198098ee93d0280e83c32c987eb90ee134b27f4caac6ae2
                                                                          • Instruction ID: a16723b432ad62851a6586a46339e6a28edab238c7e60eb586aea2c4c25c0ee0
                                                                          • Opcode Fuzzy Hash: f1ae98306a0dc4d9a198098ee93d0280e83c32c987eb90ee134b27f4caac6ae2
                                                                          • Instruction Fuzzy Hash: 81417C72A04B84C9EB25CF2AE8447E9BBA4F798F84F558115DB8C83768EF38D446C740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$lstrlen
                                                                          • String ID: 0$@
                                                                          • API String ID: 1172434978-1545510068
                                                                          • Opcode ID: 1601c8e892db72aa0a1cf2bf1ea9bc19a7191a27e1eb105fa9045aeaef51daeb
                                                                          • Instruction ID: ddbfc51c3a79b05a2869253fabb33f1850f7458376bc7d084a722858f95e90de
                                                                          • Opcode Fuzzy Hash: 1601c8e892db72aa0a1cf2bf1ea9bc19a7191a27e1eb105fa9045aeaef51daeb
                                                                          • Instruction Fuzzy Hash: 4321813231464082E7619B3AE44439A77A0E7C9BA4F548315E7A987AF9CF38C556CF44
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: CloseOpenValuelstrlen
                                                                          • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
                                                                          • API String ID: 2964171075-3913687870
                                                                          • Opcode ID: 7c50986e9f4b8f3e8bd8faefeb71720e6021442e1d482e1be689d0675f62ecc8
                                                                          • Instruction ID: 5cfe4bb5abde329db52458d4a005f69208c2917290fcb5ade1d3e3645eb3a88a
                                                                          • Opcode Fuzzy Hash: 7c50986e9f4b8f3e8bd8faefeb71720e6021442e1d482e1be689d0675f62ecc8
                                                                          • Instruction Fuzzy Hash: 48014C76214B5087DB109F66E84039DBBA1F788FE0F594621EF8947B68CF39C54ACB44
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Library$AddressFreeLoadProc
                                                                          • String ID: IsThemeActive$UxTheme.dll
                                                                          • API String ID: 145871493-3611418440
                                                                          • Opcode ID: 908373fd2877a7542c0fe83e044299c2c99612ad8c6aa36e03c116ce3a162b6c
                                                                          • Instruction ID: de9107f110dc6e1ef5aef7b735d2bc255ab8f3378797630c10079203d58b98cd
                                                                          • Opcode Fuzzy Hash: 908373fd2877a7542c0fe83e044299c2c99612ad8c6aa36e03c116ce3a162b6c
                                                                          • Instruction Fuzzy Hash: AC018F31B0165086E751DF67B8803A673E0F70CF94F880929FB5A877B4CB38C8819B00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Library$AddressFreeLoadProc
                                                                          • String ID: EnableThemeDialogTexture$UxTheme.dll
                                                                          • API String ID: 145871493-3190584797
                                                                          • Opcode ID: 34f173713268b76265d243d26936bb18781a0dd01399a9456a214fb2d26c225c
                                                                          • Instruction ID: f56c2b9d72aac4315c18d815eab8db19e53424442d43405e60542a7c232650f8
                                                                          • Opcode Fuzzy Hash: 34f173713268b76265d243d26936bb18781a0dd01399a9456a214fb2d26c225c
                                                                          • Instruction Fuzzy Hash: 48E0C970711A4181EE869B63F9557A523A1EB8CFC0F4C64249E5A0B774EE39C994C740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: CriticalSection$#161#162EnterFileLeaveModuleName
                                                                          • String ID:
                                                                          • API String ID: 2971530505-0
                                                                          • Opcode ID: 690f21a3e1845385bcaf53a61c12f3dc099acad6d1dcaefb814ef141a452e445
                                                                          • Instruction ID: a25afa92f56d2209929bf59a66b26f0a43651612561abbed378a00cff9f07290
                                                                          • Opcode Fuzzy Hash: 690f21a3e1845385bcaf53a61c12f3dc099acad6d1dcaefb814ef141a452e445
                                                                          • Instruction Fuzzy Hash: 8A613E32205B4086EB66CB2AE4903AD77B1F788FD4F644125EF594B6B8DF3ACA45C740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$RectWindow$ClientScreen
                                                                          • String ID:
                                                                          • API String ID: 2198136683-0
                                                                          • Opcode ID: 25aae191ebed58256dedb4c8005e7a6a9c56e7cefbce6b6ef52f19e44207613b
                                                                          • Instruction ID: 625f7a3db415114be2c7c946a1617b858740bbf1a3ad8bb013b25d59d0c9dcbb
                                                                          • Opcode Fuzzy Hash: 25aae191ebed58256dedb4c8005e7a6a9c56e7cefbce6b6ef52f19e44207613b
                                                                          • Instruction Fuzzy Hash: 3D419076210B8086EB419F22E4447ED7360F788FC9F888029EF090B7A5CF78C949C751
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: ItemText$Window
                                                                          • String ID:
                                                                          • API String ID: 2802354418-0
                                                                          • Opcode ID: a594adfbb520d1e042016f0e6dc4fa538fe7353b5541c58799b67476dee03054
                                                                          • Instruction ID: b634ca63e069e3e971be17b39d32aaa82f392764d4f4bf4a7909ee36b2a31c6b
                                                                          • Opcode Fuzzy Hash: a594adfbb520d1e042016f0e6dc4fa538fe7353b5541c58799b67476dee03054
                                                                          • Instruction Fuzzy Hash: 0D31617270094183EA41DB7BD8113996361EB88BF0F184321AB7D877E5DF3DC8828751
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Message$ItemSend
                                                                          • String ID:
                                                                          • API String ID: 950433545-0
                                                                          • Opcode ID: 6e43536db41890a5825e03dcb4903996deabe10d9ec55dcb28b7f51d9de9cb92
                                                                          • Instruction ID: 7bca7bfb517bbd07c9e830d1f50b30bb9cf377672a3dcc04f259e63f8db61dda
                                                                          • Opcode Fuzzy Hash: 6e43536db41890a5825e03dcb4903996deabe10d9ec55dcb28b7f51d9de9cb92
                                                                          • Instruction Fuzzy Hash: 00319F3271098083EB619B3AE86439A7360FBC9BF0F544311AB7A8BAF5DF79C4518740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: FolderFromItemListLocationPathSpecialTextWindowwsprintf
                                                                          • String ID:
                                                                          • API String ID: 3259017916-0
                                                                          • Opcode ID: b337608be67815e1f882543b53302fc6b7cb76a9cbfcc451b9fed8b6dfe20f4a
                                                                          • Instruction ID: bfd92be44cf0351dca82a94b62c2d325711ab0d382a8b8545932bfc03b26e6e2
                                                                          • Opcode Fuzzy Hash: b337608be67815e1f882543b53302fc6b7cb76a9cbfcc451b9fed8b6dfe20f4a
                                                                          • Instruction Fuzzy Hash: C3215E72214A8592EA15DB22E4943EA6361F7CCFC5F4880219F8D0BB69CF3CC14ACB80
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: LineObject$DeleteRectSelect$ClientClipColorCreateIntersectMessageMoveParentSend
                                                                          • String ID:
                                                                          • API String ID: 640795467-0
                                                                          • Opcode ID: 8abdaa05f8489e53c2f73c3562a215e7ab2baa942873b570995f9dff90c38e61
                                                                          • Instruction ID: 5038d5b4792f7b22fca29c3999077a22cbaf7a2f18104be4f42bbff3053623b0
                                                                          • Opcode Fuzzy Hash: 8abdaa05f8489e53c2f73c3562a215e7ab2baa942873b570995f9dff90c38e61
                                                                          • Instruction Fuzzy Hash: 0821E5726286848ADB918F26F44079AB7B0F7C8B84F049116EF8A87B28DF79C445CF40
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AsyncState$FocusMessageSendShowWindow
                                                                          • String ID:
                                                                          • API String ID: 3327096832-0
                                                                          • Opcode ID: 5f866e217674990f0777899df403e4e448b59f894e4c893b9b520a52e3229b59
                                                                          • Instruction ID: fe49c99cfa19325b68a893d8f7872c518b3e05df83aafa69b7cd2fa17d13bb67
                                                                          • Opcode Fuzzy Hash: 5f866e217674990f0777899df403e4e448b59f894e4c893b9b520a52e3229b59
                                                                          • Instruction Fuzzy Hash: FB115131700681C2FB6A9B23E55439973A1F7ACBD1F444822EB464BAB4CFB9C8D1C780
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: #155
                                                                          • String ID:
                                                                          • API String ID: 1122522878-0
                                                                          • Opcode ID: 9a32cc60d28c6435935e3f868d0b0a818da1d710b44b85fc901688fecaf1c201
                                                                          • Instruction ID: da2093146b1d4883f13c63bd912c2f832ea7c315c3b51f47c1b6f2bbca3d1f38
                                                                          • Opcode Fuzzy Hash: 9a32cc60d28c6435935e3f868d0b0a818da1d710b44b85fc901688fecaf1c201
                                                                          • Instruction Fuzzy Hash: 62014F31606B4582EB9A8B23E5943A963A0BB5DFC4F084020EF0A0B778EF3DC4658340
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: FileInfoMallocMessageSend
                                                                          • String ID: '$ftp://
                                                                          • API String ID: 2720085397-2224211471
                                                                          • Opcode ID: b6ef2afb53ec975224ac763cd79f9719379ac8e05474e69a604d13932f95c70a
                                                                          • Instruction ID: 9e87be585b3c4869394aaa91d6377e58f1872d871267d8a4f42fb31f4084679d
                                                                          • Opcode Fuzzy Hash: b6ef2afb53ec975224ac763cd79f9719379ac8e05474e69a604d13932f95c70a
                                                                          • Instruction Fuzzy Hash: 68B15332255AC181EB62DB26E4947DEB360F7887E4F444326A7AD47AF9DF78C845CB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: FileInfoMessageSendlstrlen
                                                                          • String ID: 7
                                                                          • API String ID: 1791443542-1790921346
                                                                          • Opcode ID: fd089fbe94b865a4ff175553e115fef7a51f2bc2555e8dd100df362627659a02
                                                                          • Instruction ID: d8490fb1d67b395f664c64d04c705b151f0ec587bd65ca41e6f578b32846002c
                                                                          • Opcode Fuzzy Hash: fd089fbe94b865a4ff175553e115fef7a51f2bc2555e8dd100df362627659a02
                                                                          • Instruction Fuzzy Hash: 5B41B332214A8082E762DB26E8417DA73A1F7CCBA0F444225BB5E4BAE5DF3CC445CB00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Message$PostQuitlstrlen
                                                                          • String ID: -install -nolisense$DIR (error):
                                                                          • API String ID: 3530804915-3378501890
                                                                          • Opcode ID: da9d2116cc6d976f98589fa54ca457e95707e8747e53270dfad2b62e2fa2f9a8
                                                                          • Instruction ID: 02d7fa17c24a308701276c9fe8fa7bfc21bf2d42b33da7dad155f12c4e7e3459
                                                                          • Opcode Fuzzy Hash: da9d2116cc6d976f98589fa54ca457e95707e8747e53270dfad2b62e2fa2f9a8
                                                                          • Instruction Fuzzy Hash: 8941937234098082E662DB7AE8553EA2391F78C7F0F144701AB3D976E2DF3DD8859B01
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: ClassCreateRegisterWindow
                                                                          • String ID: P$statis_dum_iii
                                                                          • API String ID: 3469048531-1313065383
                                                                          • Opcode ID: 7204a8fc8213da2249f4636d29afe0a13662ff5a4b7e30aacd79e94bcc40acda
                                                                          • Instruction ID: 0e978ea9e3005acd3e133d29108afae009959e9db712d3859dcc4d955e5486f4
                                                                          • Opcode Fuzzy Hash: 7204a8fc8213da2249f4636d29afe0a13662ff5a4b7e30aacd79e94bcc40acda
                                                                          • Instruction Fuzzy Hash: 02311972218B848AD750CF11F84838EB7B8F348B80FA5412AEB9C47724CF7AD965CB44
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AddressLibraryLoadProc
                                                                          • String ID: QISearch$SHLWAPI.DLL
                                                                          • API String ID: 2574300362-4145147620
                                                                          • Opcode ID: 024a2e34a9e16ffaf39e3ee9d7162d9bb1e6c21d7cf10d2e7c5e60dc774e91dc
                                                                          • Instruction ID: ab2e1c7d4fd7b7f29266dee46f7ffa0049422a4993816f206347337d25c21c3c
                                                                          • Opcode Fuzzy Hash: 024a2e34a9e16ffaf39e3ee9d7162d9bb1e6c21d7cf10d2e7c5e60dc774e91dc
                                                                          • Instruction Fuzzy Hash: 80011274206B4481EA9ACB17B84079A63A0BB5CFC0F488426EF5D07778EF3CC458C700
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AddressLibraryLoadProc
                                                                          • String ID: SHCreateItemFromIDList$shell32.dll
                                                                          • API String ID: 2574300362-1230108373
                                                                          • Opcode ID: 55f173ef94ab55738991bd415ffd65b7ca69e7955fa855aaca1ef78abd096189
                                                                          • Instruction ID: 3ec731725c5976e047d5f3ed11543dc33774e5eb01105c34f16c41895327d7f4
                                                                          • Opcode Fuzzy Hash: 55f173ef94ab55738991bd415ffd65b7ca69e7955fa855aaca1ef78abd096189
                                                                          • Instruction Fuzzy Hash: 90012C34306B4180FE6ACB17B8643E522A4BB4CBD0F484539AF0E0BB74EF78C5429344
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AddressLibraryLoadProc
                                                                          • String ID: SHAutoComplete$SHLWAPI.DLL
                                                                          • API String ID: 2574300362-1962728933
                                                                          • Opcode ID: 91fbb4a9fa89c319b7572ef584f78a7a01c34eab096ff84b722d1c6fe429b0da
                                                                          • Instruction ID: 9c84f83e5ba2447c17645bfe4ecb8d1c6c0cccc2d12660ec6964ceba05baf484
                                                                          • Opcode Fuzzy Hash: 91fbb4a9fa89c319b7572ef584f78a7a01c34eab096ff84b722d1c6fe429b0da
                                                                          • Instruction Fuzzy Hash: E1F03C31315A5081EB96DF57F9803EA62A1A78CBC0F984935EB5A47BB8DF78C9958300
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AddressLibraryLoadProc
                                                                          • String ID: SHAutoComplete$SHLWAPI.DLL
                                                                          • API String ID: 2574300362-1962728933
                                                                          • Opcode ID: 1fce9783a230938123d34a771df2d9e771897002ef47b020f12f1327e121a8b2
                                                                          • Instruction ID: fed27306617197554a2f73ec955ba6208234ef249cfd57f541c290223bed88eb
                                                                          • Opcode Fuzzy Hash: 1fce9783a230938123d34a771df2d9e771897002ef47b020f12f1327e121a8b2
                                                                          • Instruction Fuzzy Hash: F9F04F3131565082EA569B57F9C07AA23A0B74CFC0F8C9832DB5E4BB78DB78C8958344
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AddressLibraryLoadProc
                                                                          • String ID: GdiplusStartup$gdiplus.dll
                                                                          • API String ID: 2574300362-2859723088
                                                                          • Opcode ID: 6b284fe02d542a2ce75dd6ef7befe24c2a921d87d8afc18bd5ca5d95d158839b
                                                                          • Instruction ID: 02acb70657b7ce33846d5257c67c8b078a4d2101f609615c76177b8a4c57a85b
                                                                          • Opcode Fuzzy Hash: 6b284fe02d542a2ce75dd6ef7befe24c2a921d87d8afc18bd5ca5d95d158839b
                                                                          • Instruction Fuzzy Hash: 17014F73614B4082EB668F61F4543A973E0FB5CB88F4C4629AB9D0A7A8DF7CC658C744
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AddressLibraryLoadProc
                                                                          • String ID: SHCreateItemFromIDList$shell32.dll
                                                                          • API String ID: 2574300362-1230108373
                                                                          • Opcode ID: b134420dda41a678cf4efad9540bf980d1ee860ab89cf5841b3a577b61b047f8
                                                                          • Instruction ID: 6ecaa34bf034c5b73901124b93beb4e4cad3f1f82d00e2624006f4f16cdb6e34
                                                                          • Opcode Fuzzy Hash: b134420dda41a678cf4efad9540bf980d1ee860ab89cf5841b3a577b61b047f8
                                                                          • Instruction Fuzzy Hash: C5011D34612B4081FE46D717B8547D523A0BB5CFD1F489125AB5E0BB74EF39C5918784
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AddressLibraryLoadProc
                                                                          • String ID: SHCreateItemFromIDList$shell32.dll
                                                                          • API String ID: 2574300362-1230108373
                                                                          • Opcode ID: a91374056d8a68bab526b41000e1498591f4dbb3c24734d4698b5937bf57ea7d
                                                                          • Instruction ID: b8c87af924705db2950075d95956967bfee2869166edcb5ef87f549912d79088
                                                                          • Opcode Fuzzy Hash: a91374056d8a68bab526b41000e1498591f4dbb3c24734d4698b5937bf57ea7d
                                                                          • Instruction Fuzzy Hash: 220119B1606B8090EA46DB57B9843D962A1AB4CFD0F489025AF4D0BB79EF39C585C344
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AddressLibraryLoadProc
                                                                          • String ID: IUnknown_SetSite$SHLWAPI.DLL
                                                                          • API String ID: 2574300362-510016731
                                                                          • Opcode ID: 6064f585d60d4145410394664492ab82eb0897fb9772e554ece2b036209c83a3
                                                                          • Instruction ID: 4f7f00e34cd4cc156fd306960ba262de995f3fe2bfab1153746e0823def66540
                                                                          • Opcode Fuzzy Hash: 6064f585d60d4145410394664492ab82eb0897fb9772e554ece2b036209c83a3
                                                                          • Instruction Fuzzy Hash: 4AF0ECB1702F4580EE56CB57B8407E522A0EB9EFD0F5840299F1E07BB8EB38C584C201
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: BrushColorCreateSolid
                                                                          • String ID: $(
                                                                          • API String ID: 2798526982-1539405979
                                                                          • Opcode ID: 8bca26f666f68ddcab24edef733aa7cbd67f7eb763f99ad5e1c9ba8bd19d0f90
                                                                          • Instruction ID: cc96462c3d3a73b8de1c9c82f96d7f4ec678fd16d64f8ff339f61ba97182009a
                                                                          • Opcode Fuzzy Hash: 8bca26f666f68ddcab24edef733aa7cbd67f7eb763f99ad5e1c9ba8bd19d0f90
                                                                          • Instruction Fuzzy Hash: F0F06D7231478482EB229B22F5453DDB3A1F78CB84F844129EB8D077AADF3DC5448B00
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: ClassNameParentlstrcmp
                                                                          • String ID: #32770
                                                                          • API String ID: 3513268407-463685578
                                                                          • Opcode ID: 3ae7b716422dc3192f24f15b70690bc868262ec55aadb2eb93d50f21e9092d4c
                                                                          • Instruction ID: e288a9f42ec0ff8e3952b93c68f4a1e9c458a99ced97bda2198b7ac34596bf18
                                                                          • Opcode Fuzzy Hash: 3ae7b716422dc3192f24f15b70690bc868262ec55aadb2eb93d50f21e9092d4c
                                                                          • Instruction Fuzzy Hash: EFF03071321A45C6EB519B62E89539923A0F74CBC9F941029DB4E8F274DE39C508C740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AddressLibraryLoadProc
                                                                          • String ID: SetWindowTheme$UxTheme.dll
                                                                          • API String ID: 2574300362-2822173195
                                                                          • Opcode ID: 6e0da49aacfabf357029b364a9a1c58496de4a0e89ac07912c19dfa8c451e8b4
                                                                          • Instruction ID: 0731938fe58207dfb6702455b0e71ea80bed2a645dcd5936e3ac2dc96702abd7
                                                                          • Opcode Fuzzy Hash: 6e0da49aacfabf357029b364a9a1c58496de4a0e89ac07912c19dfa8c451e8b4
                                                                          • Instruction Fuzzy Hash: 13F01274711B8081EA5ADB53B99439673A0AB4DFD0F884465AE4E0BB78EF38C5858300
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Global$AddressFreeProcUnlock
                                                                          • String ID: GdipDisposeImage
                                                                          • API String ID: 1533353642-3565980357
                                                                          • Opcode ID: a4abbf6f368b430c10a21c962181fb2737ca6e8b6dafcfd9994dcd65e6a59665
                                                                          • Instruction ID: d88b59f72e536f6f0b794206abc0cba7b427f7b5d53eb3b9d58d43c7f53d9297
                                                                          • Opcode Fuzzy Hash: a4abbf6f368b430c10a21c962181fb2737ca6e8b6dafcfd9994dcd65e6a59665
                                                                          • Instruction Fuzzy Hash: D3F0F47521264085FF569FB2D45536C2360EB9CF84F0D44258F090F264CF39C894C394
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: AddressLibraryLoadProc
                                                                          • String ID: SetProcessDPIAware$user32.dll
                                                                          • API String ID: 2574300362-1137607222
                                                                          • Opcode ID: 5b6d96cb6dbb1e847212dc029c4e773adc48d9993dbcc8fe46d1e707afd9163d
                                                                          • Instruction ID: 493432112d8da6590dd3b1c40e2d49a572422a9c4a2a5c2a3ae0f7300becff1c
                                                                          • Opcode Fuzzy Hash: 5b6d96cb6dbb1e847212dc029c4e773adc48d9993dbcc8fe46d1e707afd9163d
                                                                          • Instruction Fuzzy Hash: 34E0EE30303B0090FE5B9B63AC603A922A0AF0DB94F88082C8B0D173B0EF39CA448280
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1c4be9195cc77cef775c8262ad6f01d72f4586bf9be56751ae816e588f1db10a
                                                                          • Instruction ID: 8b70a3cb79fed4f23f4ea39d58610363a57c493864a3569b9f248fe61172f74f
                                                                          • Opcode Fuzzy Hash: 1c4be9195cc77cef775c8262ad6f01d72f4586bf9be56751ae816e588f1db10a
                                                                          • Instruction Fuzzy Hash: 45719E7130554055FA66EB63A8203EA6252AB9CFC4F48442AFF4E4BBF6EE78C945D700
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 51ceb622f80d42db67fe6a6f522834c050ab0093bd0d86a59864c8b844b44a3a
                                                                          • Instruction ID: e724c0a393fb44e7d7fe32b0fe0895aa892e40907ff70938ef366399635737c4
                                                                          • Opcode Fuzzy Hash: 51ceb622f80d42db67fe6a6f522834c050ab0093bd0d86a59864c8b844b44a3a
                                                                          • Instruction Fuzzy Hash: 57518036314B4192EB66AF26E4507AE63A0F78DBD5F444229FB4A4FBA4DF3DC5048B40
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: ClientRect$AcceleratorCreateParentTable
                                                                          • String ID:
                                                                          • API String ID: 2716292469-0
                                                                          • Opcode ID: dde6dacba9a0fd88c2da3e85faeaa71228a4c03b5a5a80f5f4903a9e7cbb60fb
                                                                          • Instruction ID: e9e3a129fd05a8c3afb600424b66cc8f3f5fc5f14f7970f0e15b79112e3d724d
                                                                          • Opcode Fuzzy Hash: dde6dacba9a0fd88c2da3e85faeaa71228a4c03b5a5a80f5f4903a9e7cbb60fb
                                                                          • Instruction Fuzzy Hash: 94412C32204E4582DB62CF26E59079DB3A1F788BD4F494112EB9A8BB74DF7AC485C740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend
                                                                          • String ID:
                                                                          • API String ID: 3850602802-0
                                                                          • Opcode ID: e9c618750f7e9578091f6e8aa6e7481c5c0fc8e068f3fb0e563ea0cbc207b183
                                                                          • Instruction ID: 4d5a6ef5ac5062a46ac362863f6712f742d6aee19744449d42b04f9158f65dc6
                                                                          • Opcode Fuzzy Hash: e9c618750f7e9578091f6e8aa6e7481c5c0fc8e068f3fb0e563ea0cbc207b183
                                                                          • Instruction Fuzzy Hash: B3313C32214B9586EB65CF62E800BCAB3A5F789F94F588026EF8D07B58CF39C545CB40
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: LoadStringlstrlen
                                                                          • String ID:
                                                                          • API String ID: 1897449643-0
                                                                          • Opcode ID: 457bd7444d0fc5994a8c104cdb6e2962a47c23aba82ab7f79dffde6ede849265
                                                                          • Instruction ID: 3cd70586c1396cff09d75043366134b9b1ed1679a98ee94d3190c10c9813ca6e
                                                                          • Opcode Fuzzy Hash: 457bd7444d0fc5994a8c104cdb6e2962a47c23aba82ab7f79dffde6ede849265
                                                                          • Instruction Fuzzy Hash: 4131717230568045EB22EB27F8983EA62A0F7CCBC8F454135EF8E87765DA38C445C780
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: bac78f750ec2e47ba6344a709ca526592b7416773e67249dee86739aa590f930
                                                                          • Instruction ID: 7c83a08e8cf7d5c6799400a3feae95c4bb6c90063c94fd271dd9d7610a84688e
                                                                          • Opcode Fuzzy Hash: bac78f750ec2e47ba6344a709ca526592b7416773e67249dee86739aa590f930
                                                                          • Instruction Fuzzy Hash: 0B213C32340B4182EA559F57E8407AD66F0AB8CFC0F888025AF4E8F364DE3AD9558301
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: ColorRect$ClientInflateLibraryLoad
                                                                          • String ID:
                                                                          • API String ID: 2668497441-0
                                                                          • Opcode ID: ee54cd4c1953a957bb43c1b937c2af624417fde18b992d8604e50a31b5b21dc2
                                                                          • Instruction ID: 621d7bfdc53ed731dfeb870418368c788bc9be0a4d45be09091ebdda6881bc4a
                                                                          • Opcode Fuzzy Hash: ee54cd4c1953a957bb43c1b937c2af624417fde18b992d8604e50a31b5b21dc2
                                                                          • Instruction Fuzzy Hash: 273193322186C087E711E779E49039EB7A0F7C9760F500226F7D6879F9DA7DC9458B50
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Window
                                                                          • String ID:
                                                                          • API String ID: 2353593579-0
                                                                          • Opcode ID: 98d8c97723451eee5fa419887b154b15311763850bf29c52930ce66418f04811
                                                                          • Instruction ID: 76e228422efc14ab171354e0e710eb4dd20a536a494ed9ee1e2266c35080bb6e
                                                                          • Opcode Fuzzy Hash: 98d8c97723451eee5fa419887b154b15311763850bf29c52930ce66418f04811
                                                                          • Instruction Fuzzy Hash: 72317F726146408BE761CF26E094BAEBBA0F7C8BA5F040125EB8947A68CB7CC549CF40
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend
                                                                          • String ID:
                                                                          • API String ID: 3850602802-0
                                                                          • Opcode ID: 02ee0a031452a712dcc5a9b6ccb9cc4f5df80136606332f29e6b9056247e12a8
                                                                          • Instruction ID: f4b5b43e1dbcac641fd52aed1dc90abb487d34aedc2016f7dd9dbe00a17d074d
                                                                          • Opcode Fuzzy Hash: 02ee0a031452a712dcc5a9b6ccb9cc4f5df80136606332f29e6b9056247e12a8
                                                                          • Instruction Fuzzy Hash: 64214FB6304A5182E761CF23E8847DA7360F78CF84F5881219B898BB65CF39C986C740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: lstrlen$TextWindowlstrcpy
                                                                          • String ID:
                                                                          • API String ID: 3464547807-0
                                                                          • Opcode ID: db62b39b4671f13d4572fde29e556102d66c5e290e4090359d6da12b4e4a19fc
                                                                          • Instruction ID: c0fc1cc7a5d8f3d75b9a2797b5c5bd133a69d83c8b481480aec860af552f8b6a
                                                                          • Opcode Fuzzy Hash: db62b39b4671f13d4572fde29e556102d66c5e290e4090359d6da12b4e4a19fc
                                                                          • Instruction Fuzzy Hash: A1112B71205A4081EA25DB26B9543A96761FB8CFE5F044724AFAA0B7F9DF39C442C740
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Window$Long$MessageSend$CreateErrorFolderLastLocationParentSpecial
                                                                          • String ID:
                                                                          • API String ID: 127071798-0
                                                                          • Opcode ID: 31d0594e58dac9dbcf91257bd07bd6adf73933fdf4610d401216bfd29f03893a
                                                                          • Instruction ID: e840238b4ca7c3278d7244374dd0ad3c6c885b7f1ffa2557ae340cb135501bd2
                                                                          • Opcode Fuzzy Hash: 31d0594e58dac9dbcf91257bd07bd6adf73933fdf4610d401216bfd29f03893a
                                                                          • Instruction Fuzzy Hash: 6C017125310A5082E7619B37E840B9DA261EBCDBE4F584215EF9987BB9DF35C8408A50
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend
                                                                          • String ID:
                                                                          • API String ID: 3850602802-0
                                                                          • Opcode ID: c7720ca7e7c40b996d3996fa9c523e65bfa02980a4f1ce7d30cdc8fcfbe39b0b
                                                                          • Instruction ID: 1753b21ec4ce3c16ece94459741227543a9f819e30e0fd13699a7feb37fece1f
                                                                          • Opcode Fuzzy Hash: c7720ca7e7c40b996d3996fa9c523e65bfa02980a4f1ce7d30cdc8fcfbe39b0b
                                                                          • Instruction Fuzzy Hash: 75014032308A8482EB618B66F45479AA360E78CFD8F188011AF8D47B68DE79C585DB10
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: Global$AllocLockSizeUnlock
                                                                          • String ID:
                                                                          • API String ID: 2086698462-0
                                                                          • Opcode ID: 09c52875e877b2a5fc08a8396cdfbcce9c071e6894155dc83de6b17818f59550
                                                                          • Instruction ID: d4e86e2ec7734a2390b9ac896b665349f28d54d72912de68fa70092b4f6f7785
                                                                          • Opcode Fuzzy Hash: 09c52875e877b2a5fc08a8396cdfbcce9c071e6894155dc83de6b17818f59550
                                                                          • Instruction Fuzzy Hash: C3F0F475705B9485DA459B63B94439A67A1F78DFD0F4C8434EF4A4BB29DE3CC0418740
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: lstrlen$ByteCharMultiWide
                                                                          • String ID: 0$Edit Path ;)
                                                                          • API String ID: 477651035-1818000224
                                                                          • Opcode ID: 8f265c33bc38ae585d8ce734efa95eedfd7aa536a2d69f8a7b000e511b4f5191
                                                                          • Instruction ID: 92e8f7f46945e047ba99f33e5a88af4d362af239cfe9d9597c6b8eead95aa8c0
                                                                          • Opcode Fuzzy Hash: 8f265c33bc38ae585d8ce734efa95eedfd7aa536a2d69f8a7b000e511b4f5191
                                                                          • Instruction Fuzzy Hash: E7515271204A4081EA52DB2AE4943EA7361FB89BF4F544316BB7D476F6DF78C841C740
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: FindFocusWindow
                                                                          • String ID: DirectUIHWND
                                                                          • API String ID: 3177014434-3768200426
                                                                          • Opcode ID: af27027bf0b43742ae8a5b907855fffb2ff0bb26dd53e08ee966ba0d9613169e
                                                                          • Instruction ID: a4c3607e550bbc57b8f385f4c7907111bbb0e25a870caa10011de1781df032b7
                                                                          • Opcode Fuzzy Hash: af27027bf0b43742ae8a5b907855fffb2ff0bb26dd53e08ee966ba0d9613169e
                                                                          • Instruction Fuzzy Hash: C1310AB2314A4082EB15CF26E44439EB3A0F78DFD4F654922EB5D97AB4DF79C8848701
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend
                                                                          • String ID: 0
                                                                          • API String ID: 3850602802-4108050209
                                                                          • Opcode ID: 2cd662d7ebf6fac9ccfca7c5517019c1845b6673797ba0c1b39958fbc234c6cb
                                                                          • Instruction ID: 0edbeefc919d7124638846e930830738506a7f8c3ec3b61a7e0fdb640a844e4a
                                                                          • Opcode Fuzzy Hash: 2cd662d7ebf6fac9ccfca7c5517019c1845b6673797ba0c1b39958fbc234c6cb
                                                                          • Instruction Fuzzy Hash: 9F113A722096C486E722CB52E4543DAB7A1E7DDB99F484115EB880BB99CB7DC545CF00
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000015.00000002.2140630984.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                          • Associated: 00000015.00000002.2140606165.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140885980.0000000140156000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140939655.00000001401A9000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140966121.00000001401C7000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          • Associated: 00000015.00000002.2140996434.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_21_2_140000000_MLE_Config_beta.jbxd
                                                                          Similarity
                                                                          • API ID: lstrlen
                                                                          • String ID:
                                                                          • API String ID: 1659193697-0
                                                                          • Opcode ID: 2c91adfc4207df4da6370e711a4044172966fa88e970d98e7d5bd1eec2555210
                                                                          • Instruction ID: 831c3a05420aad9251ac649fad6c53a27428b546b4ada271ac814e6292017296
                                                                          • Opcode Fuzzy Hash: 2c91adfc4207df4da6370e711a4044172966fa88e970d98e7d5bd1eec2555210
                                                                          • Instruction Fuzzy Hash: 88619172301A449ADE26DF67E9443E9A7A5F78CBC8F488521AB4A8B7B5DE3DC045C700