Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Analysis ID:1502165
MD5:fe41ba6e49587e644575cc3e63bbec57
SHA1:b26bf2f22af8fbf59c84df1295c179e6ce9010dd
SHA256:671d2ffc833e605aa7061ce6c43b83a180957ec3c004856fe837f00b7a0b78a1
Tags:exe
Infos:

Detection

Score:36
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Multi AV Scanner detection for submitted file
Adds / modifies Windows certificates
Binary contains a suspicious time stamp
Checks for available system drives (often done to infect USB drives)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • msiexec.exe (PID: 7392 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7472 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 0E4E2BFC58A5D03AC826880BF5326FF0 C MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeVirustotal: Detection: 22%Perma Link
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeReversingLabs: Detection: 18%
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: wininet.pdb source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2073361025.000000000541B000.00000004.00000020.00020000.00000000.sdmp, shi55E.tmp.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\ExternalUICleaner.pdb source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmp, SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmp, ExternalUICleaner.dll.0.dr, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\ShortcutFlags.pdb source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmp, SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmp, ?? 02 - ??.x64.msi.0.dr, ShortcutFlags.dll.0.dr, ?? 02 - ??.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\ExternalUICleaner.pdb3 source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmp, SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmp, ExternalUICleaner.dll.0.dr, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\ShortcutFlags.pdbA source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmp, SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmp, ?? 02 - ??.x64.msi.0.dr, ShortcutFlags.dll.0.dr, ?? 02 - ??.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\Prereq.pdb source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmp, SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmp, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.dr
Source: Binary string: wininet.pdbUGP source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2073361025.000000000541B000.00000004.00000020.00020000.00000000.sdmp, shi55E.tmp.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\lzmaextractor.pdb source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmp, SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmp, lzmaextractor.dll.0.dr, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmp, SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmp, MSI92E.tmp.0.dr, MSIB14.tmp.0.dr, MSI880.tmp.0.dr, ?? 02 - ??.x64.msi.0.dr, MSI850.tmp.0.dr, MSI772.tmp.0.dr, MSI870.tmp.0.dr, MSI7F0.tmp.0.dr, ?? 02 - ??.msi.0.dr, MSIB53.tmp.0.dr, MSI8A1.tmp.0.dr, MSI82F.tmp.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\stubs\x86\ExternalUi.pdb source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile opened: c:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FA9830 FindFirstFileW,GetLastError,FindClose,0_2_00FA9830
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EA2290 FindClose,PathIsUNCW,FindFirstFileW,GetFullPathNameW,GetFullPathNameW,FindClose,SetLastError,_wcsrchr,_wcsrchr,PathIsUNCW,0_2_00EA2290
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FA8ED0 _wcsrchr,FindFirstFileW,FindFirstFileW,FindFirstFileW,FindClose,FindClose,0_2_00FA8ED0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FB7A10 FindFirstFileW,FindClose,FindClose,0_2_00FB7A10
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000000.2056387638.00000000010E9000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: FlashWindowExFlashWindowGetPackagePathhttp://www.google.comhttp://www.yahoo.comtin9999.tmphttp://www.example.comTEST.partGET "filenameattachment=123POSTcharsetDLDISO-8859-1US-ASCIIutf-8utf-16FTP Server*/*AdvancedInstallerLocal Network ServerIf-Modified-Since: %s equals www.yahoo.com (Yahoo)
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeString found in binary or memory: UFlashWindowExFlashWindowGetPackagePathhttp://www.google.comhttp://www.yahoo.comtin9999.tmphttp://www.example.comTEST.partGET "filenameattachment=123POSTcharsetDLDISO-8859-1US-ASCIIutf-8utf-16FTP Server*/*AdvancedInstallerLocal Network ServerIf-Modified-Since: %s equals www.yahoo.com (Yahoo)
Source: shi55E.tmp.0.drString found in binary or memory: http://.css
Source: shi55E.tmp.0.drString found in binary or memory: http://.jpg
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3318512606.0000000000C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrus
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3318512606.0000000000C7A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3318512606.0000000000C7A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssur
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3318512606.0000000000C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA25
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: shi55E.tmp.0.drString found in binary or memory: http://html4/loose.dtd
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drString found in binary or memory: http://ocsp.comodoca.com0
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drString found in binary or memory: http://ocsp.sectigo.com0
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drString found in binary or memory: http://ocsp.sectigo.com00
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drString found in binary or memory: https://sectigo.com/CPS0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00F87CD0 SendMessageW,GetParent,GetParent,GetWindowRect,GetParent,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,MapWindowPoints,FillRect,DeleteDC,SendMessageW,SendMessageW,SendMessageW,0_2_00F87CD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00F664F0 GetSystemDirectoryW,LoadLibraryExW,NtdllDefWindowProc_W,GetSysColor,0_2_00F664F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FEF850 NtdllDefWindowProc_W,0_2_00FEF850
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EA3E40 KillTimer,GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,DeleteCriticalSection,0_2_00EA3E40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EA00C0 IsWindow,GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,0_2_00EA00C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00E96670 SysFreeString,GetWindowLongW,GetWindowLongW,GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,GetWindowLongW,GetWindowTextLengthW,GetWindowTextW,SetWindowTextW,GlobalAlloc,GlobalLock,GlobalUnlock,SetWindowLongW,SysFreeString,NtdllDefWindowProc_W,SysFreeString,0_2_00E96670
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00E96CD0 NtdllDefWindowProc_W,GetSysColor,0_2_00E96CD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00E98C40 GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,DestroyWindow,0_2_00E98C40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EB6FE0 NtdllDefWindowProc_W,0_2_00EB6FE0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00F47370 NtdllDefWindowProc_W,0_2_00F47370
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00E99360 NtdllDefWindowProc_W,0_2_00E99360
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EA9430 NtdllDefWindowProc_W,0_2_00EA9430
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EF7760 GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,0_2_00EF7760
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00E99920 NtdllDefWindowProc_W,0_2_00E99920
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00E95F50 GetWindowLongW,GetWindowLongW,GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,GetWindowLongW,GetWindowTextLengthW,GetWindowTextW,SetWindowTextW,GlobalAlloc,GlobalLock,GlobalUnlock,SetWindowLongW,NtdllDefWindowProc_W,0_2_00E95F50
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00E9FF50 NtdllDefWindowProc_W,0_2_00E9FF50
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FE81600_2_00FE8160
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00F884600_2_00F88460
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FFCE100_2_00FFCE10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FC36C00_2_00FC36C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FB18500_2_00FB1850
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EA22900_2_00EA2290
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00E876200_2_00E87620
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EA05000_2_00EA0500
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EB86300_2_00EB8630
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EAA8200_2_00EAA820
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EBCBB00_2_00EBCBB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EB0C800_2_00EB0C80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_0106CD700_2_0106CD70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EFADA00_2_00EFADA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_01002F400_2_01002F40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EACE410_2_00EACE41
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_0107511A0_2_0107511A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00E830000_2_00E83000
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_0106539E0_2_0106539E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EAF4100_2_00EAF410
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_0106572C0_2_0106572C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FAF6D00_2_00FAF6D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EB97100_2_00EB9710
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EA9AD00_2_00EA9AD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FBBA700_2_00FBBA70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_01079B990_2_01079B99
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EA5CE00_2_00EA5CE0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00E85C820_2_00E85C82
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_0107FF840_2_0107FF84
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EA9FF00_2_00EA9FF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: String function: 00E88DB0 appears 226 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: String function: 00E88300 appears 59 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: String function: 00E8A830 appears 52 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: String function: 00E8A2A0 appears 52 times
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2091463542.0000000003EC7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmpBinary or memory string: OriginalFilenamelzmaextractor.dllF vs SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmpBinary or memory string: OriginalFilenameShortcutFlags.dllF vs SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmpBinary or memory string: OriginalFilenamePrereq.dllF vs SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmpBinary or memory string: OriginalFilenameExternalUICleaner.dllF vs SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3319283327.0000000003E10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2073361025.000000000541B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewininet.dllD vs SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelzmaextractor.dllF vs SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameShortcutFlags.dllF vs SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePrereq.dllF vs SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameExternalUICleaner.dllF vs SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3319283327.0000000003EC7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileNameMicrosoft Outlook vs SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2088123615.0000000003E8A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeBinary or memory string: OriginalFileNameMicrosoft Outlook vs SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: shi55E.tmp.0.drBinary string: \Device\NameResTrk\RecordNrtCloneOpenPacket
Source: classification engineClassification label: sus36.winEXE@4/90@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FACA20 FormatMessageW,GetLastError,0_2_00FACA20
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FDBC30 GetDiskFreeSpaceExW,0_2_00FDBC30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00E8A160 LoadResource,LockResource,SizeofResource,0_2_00E8A160
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Outlook 24.9Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile created: C:\Users\user\AppData\Local\Temp\shi55E.tmpJump to behavior
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeVirustotal: Detection: 22%
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeReversingLabs: Detection: 18%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 0E4E2BFC58A5D03AC826880BF5326FF0 C
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 0E4E2BFC58A5D03AC826880BF5326FF0 CJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: msi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: davhlpr.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: lpk.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: msihnd.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: msisip.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.immersive.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic file information: File size 12568744 > 1048576
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x267200
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: wininet.pdb source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2073361025.000000000541B000.00000004.00000020.00020000.00000000.sdmp, shi55E.tmp.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\ExternalUICleaner.pdb source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmp, SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmp, ExternalUICleaner.dll.0.dr, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\ShortcutFlags.pdb source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmp, SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmp, ?? 02 - ??.x64.msi.0.dr, ShortcutFlags.dll.0.dr, ?? 02 - ??.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\ExternalUICleaner.pdb3 source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmp, SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmp, ExternalUICleaner.dll.0.dr, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\ShortcutFlags.pdbA source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmp, SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmp, ?? 02 - ??.x64.msi.0.dr, ShortcutFlags.dll.0.dr, ?? 02 - ??.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\Prereq.pdb source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmp, SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmp, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.dr
Source: Binary string: wininet.pdbUGP source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2073361025.000000000541B000.00000004.00000020.00020000.00000000.sdmp, shi55E.tmp.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\lzmaextractor.pdb source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmp, SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmp, lzmaextractor.dll.0.dr, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000002.3320173705.0000000006390000.00000002.00000001.00040000.00000025.sdmp, SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, 00000000.00000003.2066854089.0000000005410000.00000004.00001000.00020000.00000000.sdmp, MSI92E.tmp.0.dr, MSIB14.tmp.0.dr, MSI880.tmp.0.dr, ?? 02 - ??.x64.msi.0.dr, MSI850.tmp.0.dr, MSI772.tmp.0.dr, MSI870.tmp.0.dr, MSI7F0.tmp.0.dr, ?? 02 - ??.msi.0.dr, MSIB53.tmp.0.dr, MSI8A1.tmp.0.dr, MSI82F.tmp.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\stubs\x86\ExternalUi.pdb source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: shi55E.tmp.0.drStatic PE information: 0xC7FEC470 [Wed Apr 29 05:06:56 2076 UTC]
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FBE810 SHGetFolderPathW,GetSystemDirectoryW,GetWindowsDirectoryW,GetWindowsDirectoryW,GetModuleFileNameW,SHGetSpecialFolderLocation,__Init_thread_footer,LoadLibraryW,GetProcAddress,SHGetPathFromIDListW,SHGetMalloc,0_2_00FBE810
Source: shi55E.tmp.0.drStatic PE information: section name: .wpp_sf
Source: shi55E.tmp.0.drStatic PE information: section name: .didat
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00F88D70 push ecx; mov dword ptr [esp], 3F800000h0_2_00F88EA6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EAC63B push ds; ret 0_2_00EAC63F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00E9D310 push ecx; mov dword ptr [esp], ecx0_2_00E9D311
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_0105D68A push ecx; ret 0_2_0105D69D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile created: C:\Users\user\AppData\Local\Temp\MSI870.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile created: C:\Users\user\AppData\Local\Temp\MSI7F0.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile created: C:\Users\user\AppData\Local\Temp\MSIB14.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile created: C:\Users\user\AppData\Local\Temp\shi55E.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile created: C:\Users\user\AppData\Local\Temp\MSI82F.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile created: C:\Users\user\AppData\Local\Temp\MSIB53.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile created: C:\Users\user\AppData\Local\Temp\MSI850.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile created: C:\Users\user\AppData\Local\Temp\MSI772.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile created: C:\Users\user\AppData\Local\Temp\MSI880.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile created: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\lzmaextractor.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile created: C:\Users\user\AppData\Local\Temp\MSI92E.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile created: C:\Users\user\AppData\Local\Temp\MSI8A1.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile created: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\ExternalUICleaner.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile created: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\ShortcutFlags.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI870.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI7F0.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIB14.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\shi55E.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI82F.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIB53.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI850.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI772.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI880.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\lzmaextractor.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI92E.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI8A1.tmpJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\ShortcutFlags.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\ExternalUICleaner.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile Volume queried: C:\Users\user\AppData\Roaming\Microsoft FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile Volume queried: C:\Users\user\AppData\Roaming\Microsoft\Outlook 24.9\install\550CEA2 FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile Volume queried: C:\Users\user\AppData\Roaming\Microsoft\Outlook 24.9\install\550CEA2 FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FA9830 FindFirstFileW,GetLastError,FindClose,0_2_00FA9830
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EA2290 FindClose,PathIsUNCW,FindFirstFileW,GetFullPathNameW,GetFullPathNameW,FindClose,SetLastError,_wcsrchr,_wcsrchr,PathIsUNCW,0_2_00EA2290
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FA8ED0 _wcsrchr,FindFirstFileW,FindFirstFileW,FindFirstFileW,FindClose,FindClose,0_2_00FA8ED0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FB7A10 FindFirstFileW,FindClose,FindClose,0_2_00FB7A10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_01059F12 VirtualQuery,GetSystemInfo,0_2_01059F12
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_0105C3A3 IsDebuggerPresent,OutputDebugStringW,0_2_0105C3A3
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FDD630 CreateFileW,GetLastError,OutputDebugStringW,OutputDebugStringW,SetFilePointer,FlushFileBuffers,WriteFile,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,OutputDebugStringW,WriteFile,WriteFile,FlushFileBuffers,FlushFileBuffers,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,0_2_00FDD630
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FBE810 SHGetFolderPathW,GetSystemDirectoryW,GetWindowsDirectoryW,GetWindowsDirectoryW,GetModuleFileNameW,SHGetSpecialFolderLocation,__Init_thread_footer,LoadLibraryW,GetProcAddress,SHGetPathFromIDListW,SHGetMalloc,0_2_00FBE810
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_0106835A mov ecx, dword ptr fs:[00000030h]0_2_0106835A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_0105C6B6 mov esi, dword ptr fs:[00000030h]0_2_0105C6B6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_01076E5B mov eax, dword ptr fs:[00000030h]0_2_01076E5B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_01076E9F mov eax, dword ptr fs:[00000030h]0_2_01076E9F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_0105C722 GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,0_2_0105C722
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EBC5D0 __set_se_translator,SetUnhandledExceptionFilter,0_2_00EBC5D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00EBEF30 __set_se_translator,SetUnhandledExceptionFilter,0_2_00EBEF30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_0105D242 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0105D242
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_01061DF3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_01061DF3
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FA4D70 GetCurrentProcess,OpenProcessToken,GetLastError,GetTokenInformation,GetTokenInformation,GetLastError,GetTokenInformation,AllocateAndInitializeSid,EqualSid,FreeSid,GetLastError,FindCloseChangeNotification,0_2_00FA4D70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: GetLocaleInfoW,GetLocaleInfoW,0_2_00FD34F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\sys_close_down.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\sys_close_hot.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\sys_close_normal.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\sys_close_inactive.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\sys_min_down.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\sys_min_hot.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\sys_min_hot.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\sys_min_normal.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\sys_min_inactive.png VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_top_left.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_top_left_inactive.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_top_mid.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_top_mid_inactive.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_caption.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_caption_inactive.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_top_right.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_top_right_inactive.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_left.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_left_inactive.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_right.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_right_inactive.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_bottom_left.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_bottom_left_inactive.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_bottom_mid.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_bottom_mid_inactive.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_bottom_right.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\frame_bottom_right_inactive.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\background VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\PrepareDlgProgress.gif VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\PrepareDlgProgress.gif VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\applogoicon.bmp VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\background VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\backbutton VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\nextcancelbuttons VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\checkbox VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\metroinstallbutton VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\nextcancelbuttons VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\browsebutton VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeQueries volume information: C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\applogoicon.bmp VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FE9830 CreateNamedPipeW,CreateFileW,0_2_00FE9830
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_0105C37D GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,0_2_0105C37D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00FE8160 GetUserNameW,GetUserNameW,GetLastError,GetUserNameW,GetEnvironmentVariableW,GetEnvironmentVariableW,RegCloseKey,RegCloseKey,RegCloseKey,RegCloseKey,RegCloseKey,RegCloseKey,0_2_00FE8160
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeCode function: 0_2_00E87620 GetVersionExW,GetVersionExW,GetVersionExW,IsProcessorFeaturePresent,0_2_00E87620
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 BlobJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
1
Native API
1
DLL Side-Loading
2
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Screen Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory1
Query Registry
Remote Desktop Protocol1
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Process Injection
Security Account Manager3
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS11
Peripheral Device Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets1
Account Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Timestomp
Cached Domain Credentials1
System Owner/User Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync2
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem27
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe23%VirustotalBrowse
SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe18%ReversingLabsWin32.Trojan.Generic
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\ExternalUICleaner.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\ExternalUICleaner.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\ShortcutFlags.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\ShortcutFlags.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\lzmaextractor.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\lzmaextractor.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\MSI772.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI772.tmp1%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\MSI7F0.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI7F0.tmp1%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\MSI82F.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI82F.tmp1%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\MSI850.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI850.tmp1%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\MSI870.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI870.tmp1%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\MSI880.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI880.tmp1%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\MSI8A1.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI8A1.tmp1%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\MSI92E.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI92E.tmp1%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\MSIB14.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSIB53.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\shi55E.tmp0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl00%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl00%URL Reputationsafe
https://sectigo.com/CPS00%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#0%URL Reputationsafe
http://html4/loose.dtd0%Avira URL Cloudsafe
http://ocsp.sectigo.com000%Avira URL Cloudsafe
http://.css0%Avira URL Cloudsafe
http://.jpg0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
http://html4/loose.dtdshi55E.tmp.0.drfalse
  • Avira URL Cloud: safe
unknown
http://ocsp.sectigo.com00SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drfalse
  • Avira URL Cloud: safe
unknown
https://sectigo.com/CPS0SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drfalse
  • URL Reputation: safe
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drfalse
  • URL Reputation: safe
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drfalse
  • URL Reputation: safe
unknown
http://ocsp.sectigo.com0SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drfalse
  • URL Reputation: safe
unknown
http://.cssshi55E.tmp.0.drfalse
  • Avira URL Cloud: safe
unknown
http://.jpgshi55E.tmp.0.drfalse
  • Avira URL Cloud: safe
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe, ?? 02 - ??.x64.msi.0.dr, ?? 02 - ??.msi.0.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1502165
Start date and time:2024-08-31 11:26:08 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 50s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
Detection:SUS
Classification:sus36.winEXE@4/90@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\ShortcutFlags.dllTypora#U5b89#U88c5#U52a9#U624b.exeGet hashmaliciousUnknownBrowse
    C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7284\lzmaextractor.dllSetup.exeGet hashmaliciousUnknownBrowse
      Setup.exeGet hashmaliciousUnknownBrowse
        Typora#U5b89#U88c5#U52a9#U624b.exeGet hashmaliciousUnknownBrowse
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):195392
          Entropy (8bit):6.695068025054652
          Encrypted:false
          SSDEEP:3072:ZYioJUAoM8hWgOme/Nxe4mPS0TUTn0QOInIXcVjjjjOAg0FuDuoBE5Yc8RnSXpEe:esOJePGn0QfQAOs5dOnSx
          MD5:DCF3B737C0ED8AFEBEC05A56320B382F
          SHA1:F533F91855E8C7B52C6DE9DAE8F94E73574D8513
          SHA-256:F1C8BD9FE3639A4142139E2B3AABB1E00CFEDCCC9A65FFF64ABF8339BB68C770
          SHA-512:47E3627D5E73F87657A6F392D9D21CFE3D934C1D908947C2B8F9B84848BCA84AC07F58BB3E3ADCEDB07A41219D094AD72B43A1D02D4C72CD9466F19CAF755281
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 0%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.f.p...p...p......}.............f......a......g...... ......a...p......i...e...i...q...i...q...p..q...i...q...Richp...........................PE..L....>.d.........."!...$...........................................................<.....@.....................................x.......................@=..........0|..p....................|......p{..@............................................text...?........................... ..`.rdata..............................@..@.data...d...........................@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
          Category:dropped
          Size (bytes):15086
          Entropy (8bit):2.9169468593135157
          Encrypted:false
          SSDEEP:96:+f+OFx/DgstjfDaf///////aorGbaX8PSccl1q12xfnW1orsKc:+WqDgOQ///////aoZsP+/qAVnWursKc
          MD5:1E80DE80CEFEE55D7CFDA0DF2EDCF3B2
          SHA1:6E567D732354BBB21F9A57BBB72730C497F35380
          SHA-256:4E64F4E40D8CBFF082B37186C831AF4B49E3131C62C00A0CF53E0A6E7E24AC2B
          SHA-512:5EFEA023B18FFD5B87A19837BA2C72C179B55B7C3071B773A032C63D7268DBE25E2902AE8B111AD83A4F005346B378C7A75033ADAEE90805BCB4FEC2822E54C0
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview:......00.... ..%..6... .... ......%........ .h....6..(...0...`..... ......%............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:GIF image data, version 89a, 83 x 28
          Category:dropped
          Size (bytes):28562
          Entropy (8bit):7.936340842987423
          Encrypted:false
          SSDEEP:768:K0CzfMvOre2lMu2CN4PolP8RfW4HB/glb:K09s1ZFC48RfpHB/ub
          MD5:EC1CEDB4691C438162AC62E58DDC6B76
          SHA1:FB35E429BAD1577F51391ABE13FD402E8251A968
          SHA-256:FD488ABBDC8FEE0339B679324332A3AF29DB00F782D635E2A6593A4140A60EC6
          SHA-512:1CFE104262958F48EF677251ED3704D22CA6A7F8230119A789492867BA762720AE7023C9CBB194DE9C6305BAB92C1D511311DD251CCA37147CB1B4B3376E25A2
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview:GIF89aS......Mv+].>^.=a.'m.6l.:n.9p.;p.<r.>`.Aj.Ml.Pm.Lo.Pt.Wt.Xv.Zy.\}.bw.Jx.V~._|.U..\w.Ey.J{.N{.I|.K}.M~.L..d..?..\..S..Y..^..[..Q..U..X..Z..^..b..i..d..h..g..i..r..a..h..h..j..b..h..r..w..k..u..z..s..]..^..@..P..Q..Q..T..R..U.._..`..g..h..h..m..j..l..p..r..|..r..t..u..x..`..d..a..e..e..i..b..c..j..z..|..z..|..s..y..|..o..q..t..y..w..z..|..........................................................................................................................................................................................................................................................................................................................................................................!..NETSCAPE2.0.....!..Built with GIF Movie Gear 4.0.!.......,....S..........H......)\..?..#J.H.?~.....G..1>.H.d.~...c....0]..w._?.8s..x...p.I.J.h.l...9R'.t..H.J.j.O...d....`....R~N+:.W..#...# ..(....k..b.....
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 121 x 14, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):174
          Entropy (8bit):5.644637812134814
          Encrypted:false
          SSDEEP:3:yionv//thPl8xtjt30zCdi42/uDlhlbm9F5jEshwmJ5ehFn93so9+C9pcpNDTn8z:6v/lhPwCzki7/6TWEAwmJ5eh/3F9ppca
          MD5:0C18AF08390365ED36C605F34273C4A5
          SHA1:BBBB19BC789DBA1AD031C1D4E9FF644096AC11F6
          SHA-256:1AE6B5ECCEA17A126B5EDEB49B8469013B4BCB022110DBD9E35B365BE088FA1E
          SHA-512:1B69DB94DFA3929D4651EA98E65D0495FBE7B72DA15364E88BA13BD1C4547AA81673DD9DEC34E5ED7915805A8C938B1BC8BDE55DCEF2F8FFFA4B5DFB0241CC35
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview:.PNG........IHDR...y...........0....bKGD.I.j./B1......pHYs.................tIME.....7 .......;IDATX...1.. .... .Q'\...X...-k..,..............&c2&c2...k...vU.....IEND.B`.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):308544
          Entropy (8bit):6.622912138664146
          Encrypted:false
          SSDEEP:6144:s4SCl/r6e1QUKPsvlXeR4A5LjG8RwXAOD1cLXrT:NSIjb1QUKUvEAFCLXrT
          MD5:57EF123E2AB9D1A9E9E838604C6864DF
          SHA1:59853816B99F6C0CBE9CE6A782CDBF9A4303135C
          SHA-256:B71BFE7AAF0361C4BA3695461D13D5004924AA39ECD14EF6EBA71DB9058307C0
          SHA-512:B785992C72E59E7F68CC4BC7F78B4D8D08D81F843E7B613D0C811FA29C49F5E9B4A393BBE2A9394D5740760121BC45987DAD79CC357A9F93FD5D08AA43633D0F
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 0%, Browse
          Joe Sandbox View:
          • Filename: Typora#U5b89#U88c5#U52a9#U624b.exe, Detection: malicious, Browse
          Reputation:low
          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........l..G...G...G......J...........s..V....s..P....s.........^......F......V...G......^r..[...^r..F...^r;.F...G.S.F...^r..F...RichG...........................PE..L....>.d.........."!...$.....l.......Y.......0............................................@..........................@.......A.......p..x............x..@=.......*......p........................... ...@............0...............................text............................... ..`.rdata..~....0......................@..@.data........P.......8..............@....rsrc...x....p.......F..............@..@.reloc...*.......,...L..............@..B........................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
          Category:dropped
          Size (bytes):15086
          Entropy (8bit):2.7901346596966383
          Encrypted:false
          SSDEEP:192:+n5lkX/1//AJffffPTb6ylHJxnSfFN5pM2C:+5lkX/K
          MD5:FD64F54DB4CBF736A6FC0D7049F5991E
          SHA1:24D42FB471AAA7BCD54D7CCB36480F5ADD9B31D4
          SHA-256:C269353D19D50E2688DB102FEF8226CA492DB17133043D7EB5420EE8542D571C
          SHA-512:EC622AFAB084016F144864967A41D647E813282CB058F0F11E203865C0C175BA182E325A6D5164580FF00757C8475B61DE89CCC8E892E1B030E51B03AD4EAFB4
          Malicious:false
          Preview:......00.... ..%..6... .... ......%........ .h....6..(...0...`..... ......%............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 60 x 60 x 32, cbSize 14454, bits offset 54
          Category:dropped
          Size (bytes):14454
          Entropy (8bit):5.53892242994168
          Encrypted:false
          SSDEEP:384:XFpFA0xSMcZ69dzg+s4wCFC0DXtUsCUOQOxmOHO2oODgI:qj69dz4lArDCUOQOxmOHOxOt
          MD5:703A4005BC83375D5A586F6BF1032CD6
          SHA1:4D70E222EDAEE32C0748972B8261DE0FDD893367
          SHA-256:1506D8D54FF3974E30AEA8B9BA3B912F02CBE77389A6ECEA5155E420FB2B348F
          SHA-512:4F0A2AAAC7ED3E3A9FB90A134F201061EF7CB84C7DED042896DCF1A732F1E48AFA337DA9275B787DCC997DEFC6D8BFFF20F4F726B186C5433A2A743DEE68B6E7
          Malicious:false
          Preview:BMv8......6...(...<...<..... ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 624 x 37, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):405
          Entropy (8bit):6.157306800217306
          Encrypted:false
          SSDEEP:12:6v/7TvPdE/6TJW9/F7gqhIpS24OLvc6+aBN:yvu/6c2IEoaBN
          MD5:76E5BDD88CEEB272820CD597F7556FC6
          SHA1:9089831330D067ADE6D8EE6A4C7C4728ED1AC558
          SHA-256:52D4ECF8625C8E606C31370544F7A31F126581350628FD7CAEFE51BCCAAC1626
          SHA-512:BDF4236E57DC53F81CF20BE5194DE4B45337DBEC50A1C54EF5710B384404BD4F33E7D200605BDD4A9A21DC5C7AB8F1A2889C8352E7F8F023AAE9617AB1E79481
          Malicious:false
          Preview:.PNG........IHDR...p...%.............bKGD.......C......pHYs.................tIME.....4.aZuo..."IDATx......0..Q+nP.......%#..:B.......*...^..7sJ.^...H.c.fd.-.#@.u_WV.Zg...i.&......C..0G>./...mi.|..........d.p.......*Y...F...............8.........@....8.........@... ....p..............p...8.........@... .............. ....p...8.........@....8...........".8.!_m........B.:...H....`b^.3).B..>....IEND.B`.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:HTML document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1929
          Entropy (8bit):5.123149054536631
          Encrypted:false
          SSDEEP:24:74+4M+i+hxfeK9tle19Eley93FVXllzhRMOzJuHqyxYqxmATdVsnoObAaby2v:XmVnTywvsA1hDV
          MD5:3DEC9F3886A7D180B1DA7A72541DBF81
          SHA1:07F3BA034BE78970A86D055DAED59BF7D87F8D21
          SHA-256:FB1C5DF8785650B20612B61A66ECBDA5E1ED323D6C8AC45B2EBCCBE9193779F8
          SHA-512:0250B81A2795FCAC69E3F2C95BDFF406F01FF207E81BEAD96B2739F28E26DD2D97D82CCCBFBD92B7141B1EABD2310DB048618FEF1CC5261FDFF212D19BB910BF
          Malicious:false
          Preview:<Button.. xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation".. xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml".. xmlns:d="http://schemas.microsoft.com/expression/blend/2008".. xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006".. mc:Ignorable="d">.. <Button.Resources>.. <SolidColorBrush x:Key="ButtonBorderBrushPointerOver" Color="[AiWinUIBtnBorderPointerOver]" />.. <SolidColorBrush x:Key="ButtonForegroundPointerOver" Color="[AiWinUIBtnForegroundPointerOver]" />.. <SolidColorBrush x:Key="ButtonBackgroundPointerOver" Color="[AiWinUIBtnBackgroundPointerOver]" Opacity="[AiWinUIBtnBackgroundOpacityPointerOver]" />.... <SolidColorBrush x:Key="ButtonBorderBrushPressed" Color="[AiWinUIBtnBorderPressed]" />.. <SolidColorBrush x:Key="ButtonForegroundPressed" Color="[AiWinUIBtnForegroundPressed]" />.. <SolidColorBrush x:Key="ButtonBackgroundPressed" Color="[AiWinUIBtnBackgroundPressed]" Opacity="[AiWinUIBtnBackgroundOpacityPressed]"
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 5 x 5 x 32, image size 100, resolution 3780 x 3780 px/m, cbSize 154, bits offset 54
          Category:dropped
          Size (bytes):154
          Entropy (8bit):1.5313141850262846
          Encrypted:false
          SSDEEP:3:5l/gkrFXZRH:5l/gsH
          MD5:8FD875CDC559AD66E0A94C64FDB762C3
          SHA1:79111743F1EF8DA31688F1644F9568A42FBD3ED5
          SHA-256:FE7C2D4C244139591B0B716A410A1D8AF38084CDC560A2BEB265BDB8578E4EB3
          SHA-512:0985A7456BD94E21D62428368C8E52EF7021FE78966DD967B96ECBBF05542ABBA4F8C85EF3D56BC0F5F9500E0D0828D4B54FEAEEF9768F85FF754CA8A1B5AF3B
          Malicious:false
          Preview:BM........6...(............. .....d.......................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 5 x 5 x 32, image size 100, resolution 3780 x 3780 px/m, cbSize 154, bits offset 54
          Category:dropped
          Size (bytes):154
          Entropy (8bit):1.5313141850262846
          Encrypted:false
          SSDEEP:3:5l/gkrFXZRH:5l/gsH
          MD5:8FD875CDC559AD66E0A94C64FDB762C3
          SHA1:79111743F1EF8DA31688F1644F9568A42FBD3ED5
          SHA-256:FE7C2D4C244139591B0B716A410A1D8AF38084CDC560A2BEB265BDB8578E4EB3
          SHA-512:0985A7456BD94E21D62428368C8E52EF7021FE78966DD967B96ECBBF05542ABBA4F8C85EF3D56BC0F5F9500E0D0828D4B54FEAEEF9768F85FF754CA8A1B5AF3B
          Malicious:false
          Preview:BM........6...(............. .....d.......................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 5 x 5 x 32, image size 100, resolution 3780 x 3780 px/m, cbSize 154, bits offset 54
          Category:dropped
          Size (bytes):154
          Entropy (8bit):1.5313141850262846
          Encrypted:false
          SSDEEP:3:5l/gkrFXZRH:5l/gsH
          MD5:8FD875CDC559AD66E0A94C64FDB762C3
          SHA1:79111743F1EF8DA31688F1644F9568A42FBD3ED5
          SHA-256:FE7C2D4C244139591B0B716A410A1D8AF38084CDC560A2BEB265BDB8578E4EB3
          SHA-512:0985A7456BD94E21D62428368C8E52EF7021FE78966DD967B96ECBBF05542ABBA4F8C85EF3D56BC0F5F9500E0D0828D4B54FEAEEF9768F85FF754CA8A1B5AF3B
          Malicious:false
          Preview:BM........6...(............. .....d.......................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 168 x 26, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):254
          Entropy (8bit):6.406651140144335
          Encrypted:false
          SSDEEP:6:6v/lhPJ/6TVUv2MT19UTLF/eYhhvpPHgFc8l56bp:6v/7R/6T+d5q/FWgvFAnM
          MD5:1894F43A854B0F3466870E25601D2B3C
          SHA1:48140DD46BE41E079CDBA4B4D9795FE3BCC1991C
          SHA-256:04885AFDFCF1C5E5DBEAB7E827BE79D34F46E403061C87C98572EDC3247AEC6E
          SHA-512:BB53C8A51A54B32A676D820DF577EC24E26A08CB9B7C7FF52CC9D8A5BECF78BB63DF89E510DD99468B67C7E52077F4EE5B9A8A4E88F071A622DF4D68EB57AF34
          Malicious:false
          Preview:.PNG........IHDR.............#I......pHYs.................tIME.....&..@......IDATx...A..1.@.)Y.$.@...,.J.. ...8... A.r..f .{..i..SZkS$z./..{..|..7DD.ZK.a..p..W...o.+".{..w.n._.g....c.E. P....."P.(....@.(....@A.....@A. P.......a^...&.........IEND.B`.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:HTML document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1929
          Entropy (8bit):5.123149054536631
          Encrypted:false
          SSDEEP:24:74+4M+i+hxfeK9tle19Eley93FVXllzhRMOzJuHqyxYqxmATdVsnoObAaby2v:XmVnTywvsA1hDV
          MD5:3DEC9F3886A7D180B1DA7A72541DBF81
          SHA1:07F3BA034BE78970A86D055DAED59BF7D87F8D21
          SHA-256:FB1C5DF8785650B20612B61A66ECBDA5E1ED323D6C8AC45B2EBCCBE9193779F8
          SHA-512:0250B81A2795FCAC69E3F2C95BDFF406F01FF207E81BEAD96B2739F28E26DD2D97D82CCCBFBD92B7141B1EABD2310DB048618FEF1CC5261FDFF212D19BB910BF
          Malicious:false
          Preview:<Button.. xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation".. xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml".. xmlns:d="http://schemas.microsoft.com/expression/blend/2008".. xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006".. mc:Ignorable="d">.. <Button.Resources>.. <SolidColorBrush x:Key="ButtonBorderBrushPointerOver" Color="[AiWinUIBtnBorderPointerOver]" />.. <SolidColorBrush x:Key="ButtonForegroundPointerOver" Color="[AiWinUIBtnForegroundPointerOver]" />.. <SolidColorBrush x:Key="ButtonBackgroundPointerOver" Color="[AiWinUIBtnBackgroundPointerOver]" Opacity="[AiWinUIBtnBackgroundOpacityPointerOver]" />.... <SolidColorBrush x:Key="ButtonBorderBrushPressed" Color="[AiWinUIBtnBorderPressed]" />.. <SolidColorBrush x:Key="ButtonForegroundPressed" Color="[AiWinUIBtnForegroundPressed]" />.. <SolidColorBrush x:Key="ButtonBackgroundPressed" Color="[AiWinUIBtnBackgroundPressed]" Opacity="[AiWinUIBtnBackgroundOpacityPressed]"
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 192 x 16, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):1698
          Entropy (8bit):7.186970828780648
          Encrypted:false
          SSDEEP:24:Q1he91Wwh82lYSKwaNXVAT3ouyJ3Vvl3aCGMTiil/+pjrPQeHQraCrewDeLz48W:uqQvnL9OIJ3XNhbl/+pPN6ewDeLzM
          MD5:3E3E58663F11BB7C462334A4DE8EDB28
          SHA1:131243A1A515CCCD7410C18135B8D9C2DA476C3E
          SHA-256:4D2750F090DA3101849AE21E4C49F50BB4A46FC4D355A9327D49C31A0A128369
          SHA-512:3B4A5F9A3480D95E25AF6E5E3C02A2A179DE6200615D1BA8779407CE7D85FAD70EDA9F4A065AE1550A621720C422A4A393D3B965A9380394B00EBD299851D147
          Malicious:false
          Preview:.PNG........IHDR.............@.p(....tEXtSoftware.Adobe ImageReadyq.e<...fiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:911915E74D5EE31181168862711AAC09" xmpMM:DocumentID="xmp.did:EC45525BDA8111E3B79C98DEE81083F3" xmpMM:InstanceID="xmp.iid:EC45525ADA8111E3B79C98DEE81083F3" xmp:CreatorTool="Adobe Photoshop CS6 (Windows)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:39803F417FDAE311A51EEE8397849EC8" stRef:documentID="xmp.did:911915E74D5EE31181168862711AAC09"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..lT....IDATx..[h.`..O...I.U.....PD.N..>......
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 192 x 16, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):875
          Entropy (8bit):7.6194543884351615
          Encrypted:false
          SSDEEP:24:as/6+PkiN+d+yOTQKxqI2e3laV9GBPtkeJzSW7fQ:9/6WFAdGTsIFG9GvkwC
          MD5:0CFACDA19675F077EB5239CA48E5D504
          SHA1:5DAC2D1D8861882068392ACA184A338AD47C0EA9
          SHA-256:1FAEF4B13A5BAC41413C58E60636E506141B6F6470E1EC011C8F127A2A81237C
          SHA-512:E8075ED12073CBD68FCB45D31B7791003618790A9C8EF70FBE56062D41C28849D3CF26BBD4443DADF5277552060510F7282D08EDB163A68660D567479C58DF89
          Malicious:false
          Preview:.PNG........IHDR.............@.p(....bKGD..............pHYs.................tIME..........S....IDATh.._HSQ..?.fH...,.....G\`....=$!.8.7...."+.|......!.......)$....d.HE.C.m=..@j..\.=..........s.;PTQ.X../..H9e......;.oo....eY../..x....:.C..g.u..|.....H7..._.<..o.4...U$;.n.F.w.h7..K.._H>h.*...?.e..[.eYZ..R.&.....R.._.....>..l2.7.L...f].....*.n.;.~..../.o....8.$......M=.$....O...yN.?M4.[.\... ....>.N...}..~..L........T[.y\.n...>.|U8FKf.\K........?.r.........8.P.....,.%3v._)U..j....|.BK.~n.R...<....c...........o.^|....f.?.j/.&..M..x...v.....?...y......?.\..R.@4..B$.._.~ny?.....J...*....\[...H...u04...kj........,....<7!.^..-.d.QF.(..+V=..h.'....r..-.V.c..kV.]O..NS..rDJ9....G.1&.8..M.@.....~ny....D...^;.S...".T....,/[m...2bY.@....!D.R....B|5.n..........O.\.dI)...!"&......ps..K~!.78|.M.._....s....UTQE...... .$..i.....IEND.B`.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 32 x 16, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):331
          Entropy (8bit):6.835858603064233
          Encrypted:false
          SSDEEP:6:6v/lhPQROC19s/6TPFj54nVJIeZHkDMx7a/X8KNZ+lkjXG+YU7Mup:6v/7442s/6T9F4npzxmjNZHPJ
          MD5:837F6712D8EEDB376613B63CA8DE1871
          SHA1:5211C58FD1FC9B6B62482F012DCAFBBD1A3F8A78
          SHA-256:24C47DC6A785D3EF2FC33EC6EE50814E0EFE01612A7EB681D0502DA4AA61D2E8
          SHA-512:CB747DBA5E23821CC25A7C8884E0ED0CAE3BBB3E4A8E1CDB8A1630FCFDADFA553122D5D671439E0439A522C4F7430AD4757ECFF2BEB74598E16E923DD3C6DE26
          Malicious:false
          Preview:.PNG........IHDR... .........w.}Y....bKGD..............pHYs.................tIME...............IDATH...1JCA.../1..AH...({...".2.BZ...X)......X.X{..V.f#!<...g._.;3;..3...^H..&....o..f|..~WR...}.A.=\c..M.......M.~..|H._.@H.!9_.,.9...............9z...=..S.......<._%..........WY.....I.^...r...oa..{....c.K.I7e.Q].....IEND.B`.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:MS Windows icon resource - 3 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
          Category:dropped
          Size (bytes):2862
          Entropy (8bit):3.160430651939096
          Encrypted:false
          SSDEEP:48:QFFZ+f+zd+kHeNTM9/+Xz++++++++YWWS0i6I:QFFEw4Xc+D++++++++ypi9
          MD5:983358CE03817F1CA404BEFBE1E4D96A
          SHA1:75CE6CE80606BBB052DD35351ED95435892BAF8D
          SHA-256:7F0121322785C107BFDFE343E49F06C604C719BAFF849D07B6E099675D173961
          SHA-512:BDEE6E81A9C15AC23684C9F654D11CC0DB683774367401AA2C240D57751534B1E5A179FE4042286402B6030467DB82EEDBF0586C427FAA9B29BD5EF74B807F3E
          Malicious:false
          Preview:..............(...6...........h...^......... .h.......(....... .........................................................................................................................................................wv....."""""o.."""""o..www""......"/.....""......"/......r.........................?...........................................?......(....... ..................................................."..... .". .6.-.9.;.<.;.D.3.,...4...9...O.,.Q.$.M.2.S.:.\.1.U.$._.1.F.G.I.A.`.@.w.q...|...q...{.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:MS Windows icon resource - 2 icons, 48x48, 8 bits/pixel, 48x48, 32 bits/pixel
          Category:dropped
          Size (bytes):13430
          Entropy (8bit):5.905156325236297
          Encrypted:false
          SSDEEP:192:t22z2QAQFSD6izYCBReXWhB/zCSk/ovVE7j5m3Ut3MyPpEseVl0cDiCQ+fXT:I2z/FSeW/RsWh9Ctovig3UXmxYc+W/T
          MD5:244DF84C545247A478BEF4A1BBC1399D
          SHA1:C69ED79145BB40BA18A92996B0A242585AFE315E
          SHA-256:520E5248975B3B8E6C5D574D57080F901C88FE59D4DFF6A89FAB524FB51FE606
          SHA-512:BB2739344B369E5FCCB72B8762E30C38A2AC8EC949BDC8CB56619F526E3954ED5AE159D6BE4BAC2E0C10C4BC2F14820102A2D409AD17BB5A9BBD77E34441CF69
          Malicious:false
          Preview:......00..........&...00.... ..%......(...0...`...................................r?..uA..yF..~J..~M..uL..yL..}S..gE .jJ'.{S$.qfZ.~vl..L...N...P...U...Q...T...Y...Z...V...Y...S...[...Y...\...g...`...f...q...j...s...s...j...q...v...x...z...{...\#..]"..])..a)..e$..k$..j#..f+..m,..q"..e>..h8..f1..i3..o3..m;..q6..n%..v$..u"..{"..w...v).../..y$..z4..oN..qJ..uF..z^..zS..|G...R..tg..yf...m.......&...1...=...2...<...;...:.....+..-..3..3..;..;...I...I...G...I...R...S...R...[..._...[...Z...a...k...w...x...|...~...d...c...i...`...m...b...a...d...d...j...l...k...s...v...z..G..A..[..F..H..U..Q..[..\..L..X...e..i..d..i..r..v..s..|..{..z..x..h..u...i...x.....++..;;..BB..TT..cc..uu.................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:MS Windows icon resource - 5 icons, 48x48, 8 bits/pixel, 32x32, 8 bits/pixel
          Category:dropped
          Size (bytes):21086
          Entropy (8bit):6.009410626000926
          Encrypted:false
          SSDEEP:384:52z/FYOKTR0q/irJKH2Wh9CtovihgGIqxYc+W/azzz3gx4n3V:5AF5QH2WXCto7GzYc+pzzzQx4n3V
          MD5:4E1EDBE834AAF76D9D1DAEC3DC08947E
          SHA1:218AD194CB40DF778EAFAEDA68F8A44BE25B94C1
          SHA-256:E5F4F6B5E24D6F7E2605ADD8E247DC0326F00C26725D315679C1C6FCE8A90C97
          SHA-512:4CF41E7080DF1E8606FBACC3B2F87C9416ED43FA55A2D938A1149124253486084B679BC7992CE8494DD0E22B91CD5AAA1FDD19800F5DE4F73B64A0A2BA3FCC84
          Malicious:false
          Preview:......00..........V... ..............00.... ..%...... .... .....N=........ .h....M..(...0...`...................................r?..uA..yF..~J..~M..uL..yL..}S..gE .jJ'.{S$.qfZ.~vl..L...N...P...U...Q...T...Y...Z...V...Y...S...[...Y...\...g...`...f...q...j...s...s...j...q...v...x...z...{...\#..]"..])..a)..e$..k$..j#..f+..m,..q"..e>..h8..f1..i3..o3..m;..q6..n%..v$..u"..{"..w...v).../..y$..z4..oN..qJ..uF..z^..zS..|G...R..tg..yf...m.......&...1...=...2...<...;...:.....+..-..3..3..;..;...I...I...G...I...R...S...R...[..._...[...Z...a...k...w...x...|...~...d...c...i...`...m...b...a...d...d...j...l...k...s...v...z..G..A..[..F..H..U..Q..[..\..L..X...e..i..d..i..r..v..s..|..{..z..x..h..u...i...x.....++..;;..BB..TT..cc..uu.................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 50 x 69, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):944
          Entropy (8bit):7.717032696982044
          Encrypted:false
          SSDEEP:24:+q21KwlITydoVviPN4y7YDEiW+S95Ad913skEd+Ay:+q2kwhdXYIiW+WmtlHH
          MD5:31195023E14947842507A077D8B85102
          SHA1:ED9560DEB43A9BE1D1304E26BF59334C6B48A1BA
          SHA-256:A33DA148DBBD208168F6D4C713E3DC1B5AD7F9DA7CDF4FEA39410171AF2919DA
          SHA-512:767D1DA52CEF8DB39E5DE5C4EB8E7F4565A5872F5F3587F681CCAB88A947A749B275EFBC501702C43EDFDBC1BEDD51558D4F53DEA0A59CBDB07626EB7667FDC7
          Malicious:false
          Preview:.PNG........IHDR...2...E.............tEXtSoftware.Adobe ImageReadyq.e<...RIDATx...d.q....q....5.q\"J.D.....f.K)..R..f..,..SD..1F.cD.E)EvDL...7..=...w......{......?....."..k.!..&...@.....9.2..3Y]Y.n.."T.2~.l... a.6.>......8. &..P.....)#7.N..t..m..@c.0dd/4......h....:.a..4.-J.>C.8..u...*;.<..q|.5..z...d....Z....%Z.z.@...s..t...PW.@.Ci..9../.8...-. ...2..~..C...1,%.>..H.z....e yfD.........W.".w9.6.$..g...u..9.RK~.%;...,Uv.^f5..M.@.7^[X.*...C#RK.6.$...N.......zE.2}.1[...X..h...%7.2...vY.q.X%....s~.tJ.(.......K.2J+{.b..3..QLKO..[...!>./3.N...^...,].t.,....a.A.E..v.bX*.T..P..bYz\...9..w.....Rn.nA%.+.' fK.9..sPD... n.G.k.Q..i_...6~H..Q.b.2ja...[...I.......gN......Eb#...m..2bL.......q? U.%G.Xj...'k.N...T7.V ...x.S..x.W.z).-..i..%Z./.@rR...'<*.;....2u.... ....V.G........s..*....iv..,.Z8B..S.7.;*=Z.....U..{..*.d.......Z.N\1-..?.U...SH322......A....3..@...Q .D.(...@...Q .$..W......96.....IEND.B`.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
          Category:dropped
          Size (bytes):66
          Entropy (8bit):2.1225886730475874
          Encrypted:false
          SSDEEP:3:6tlllAlul0lpKolOToln:6XoluKpKolOToln
          MD5:0E1AB770F8D8F8768B66E7DE087087C9
          SHA1:36AD69F719F035D0C040DB6D611611552A387B41
          SHA-256:3E57878D7E1C0D2FE4DB1DD47B803A363188114520FF5D7A4F50FAB47C0EE992
          SHA-512:2C5A627FBA9CE1B35397D1DC4AE7B6954BD7B39A402689F3C12F2DC314CA5133F553DA0411CAD0A6D556F1787F2B2FCE585F76D4B73BB2CFF98732AAF808FDC1
          Malicious:false
          Preview:BMB.......6...(.......................................+vM.+vM.+vM.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
          Category:dropped
          Size (bytes):66
          Entropy (8bit):2.1225886730475874
          Encrypted:false
          SSDEEP:3:6tlllAlul0lpKolOToln:6XoluKpKolOToln
          MD5:0E1AB770F8D8F8768B66E7DE087087C9
          SHA1:36AD69F719F035D0C040DB6D611611552A387B41
          SHA-256:3E57878D7E1C0D2FE4DB1DD47B803A363188114520FF5D7A4F50FAB47C0EE992
          SHA-512:2C5A627FBA9CE1B35397D1DC4AE7B6954BD7B39A402689F3C12F2DC314CA5133F553DA0411CAD0A6D556F1787F2B2FCE585F76D4B73BB2CFF98732AAF808FDC1
          Malicious:false
          Preview:BMB.......6...(.......................................+vM.+vM.+vM.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 3 x 1 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
          Category:dropped
          Size (bytes):66
          Entropy (8bit):2.1225886730475874
          Encrypted:false
          SSDEEP:3:6tlllCllflFlpt/n:6Xqlttp1
          MD5:F623CB070F63ADADF31212D6564805B9
          SHA1:D1C283EEBA4B784CD731CE5179B0B44D9D8874CB
          SHA-256:E4AB79B964317D20D8E15D8723CADCA3691878520CFE498EB62674FD8E4A3DC2
          SHA-512:1836786F6A5EB61DC179135B136EC014C7EA0FB3C87E1C96349B31B91884A55044B12C292623A52B7B20346CF6EE21FEF06CFF28411BB3C4FE76E14EE1580E66
          Malicious:false
          Preview:BMB.......6...(.......................................+vM+vM+vM...
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 3 x 1 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
          Category:dropped
          Size (bytes):66
          Entropy (8bit):2.1225886730475874
          Encrypted:false
          SSDEEP:3:6tlllCllflFlpt/n:6Xqlttp1
          MD5:F623CB070F63ADADF31212D6564805B9
          SHA1:D1C283EEBA4B784CD731CE5179B0B44D9D8874CB
          SHA-256:E4AB79B964317D20D8E15D8723CADCA3691878520CFE498EB62674FD8E4A3DC2
          SHA-512:1836786F6A5EB61DC179135B136EC014C7EA0FB3C87E1C96349B31B91884A55044B12C292623A52B7B20346CF6EE21FEF06CFF28411BB3C4FE76E14EE1580E66
          Malicious:false
          Preview:BMB.......6...(.......................................+vM+vM+vM...
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
          Category:dropped
          Size (bytes):66
          Entropy (8bit):2.1225886730475874
          Encrypted:false
          SSDEEP:3:6tlllAlul0lpKolOToln:6XoluKpKolOToln
          MD5:0E1AB770F8D8F8768B66E7DE087087C9
          SHA1:36AD69F719F035D0C040DB6D611611552A387B41
          SHA-256:3E57878D7E1C0D2FE4DB1DD47B803A363188114520FF5D7A4F50FAB47C0EE992
          SHA-512:2C5A627FBA9CE1B35397D1DC4AE7B6954BD7B39A402689F3C12F2DC314CA5133F553DA0411CAD0A6D556F1787F2B2FCE585F76D4B73BB2CFF98732AAF808FDC1
          Malicious:false
          Preview:BMB.......6...(.......................................+vM.+vM.+vM.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
          Category:dropped
          Size (bytes):66
          Entropy (8bit):2.1225886730475874
          Encrypted:false
          SSDEEP:3:6tlllAlul0lpKolOToln:6XoluKpKolOToln
          MD5:0E1AB770F8D8F8768B66E7DE087087C9
          SHA1:36AD69F719F035D0C040DB6D611611552A387B41
          SHA-256:3E57878D7E1C0D2FE4DB1DD47B803A363188114520FF5D7A4F50FAB47C0EE992
          SHA-512:2C5A627FBA9CE1B35397D1DC4AE7B6954BD7B39A402689F3C12F2DC314CA5133F553DA0411CAD0A6D556F1787F2B2FCE585F76D4B73BB2CFF98732AAF808FDC1
          Malicious:false
          Preview:BMB.......6...(.......................................+vM.+vM.+vM.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 1 x 38 x 24, image size 152, resolution 3778 x 3778 px/m, cbSize 206, bits offset 54
          Category:dropped
          Size (bytes):206
          Entropy (8bit):2.4607204463285153
          Encrypted:false
          SSDEEP:3:mlllSlLlll8l9lZJYv+++++++++++++++++++++++++++++++++++a:m/olRc5W1
          MD5:D4A94F93002037CA552D4478C8C701ED
          SHA1:3B3974BCD813A88EAE8D24BB3BA7B30C08CA26BB
          SHA-256:6328E3B060D86158D6A22085013C97CC8857B284A65673C4A367B9190A876A6A
          SHA-512:06BCCB7066BA3B9F09FDFE1B23CEAB28E169C664D5D462044F57103214F2B72ED49FEAB41311C2960501924D26DC0BA74D9A79B52DE91666A36A639195916CCC
          Malicious:false
          Preview:BM........6...(.......&...............................+vM.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 1 x 38 x 24, image size 152, resolution 3778 x 3778 px/m, cbSize 206, bits offset 54
          Category:dropped
          Size (bytes):206
          Entropy (8bit):2.4607204463285153
          Encrypted:false
          SSDEEP:3:mlllSlLlll8l9lZJYv+++++++++++++++++++++++++++++++++++a:m/olRc5W1
          MD5:D4A94F93002037CA552D4478C8C701ED
          SHA1:3B3974BCD813A88EAE8D24BB3BA7B30C08CA26BB
          SHA-256:6328E3B060D86158D6A22085013C97CC8857B284A65673C4A367B9190A876A6A
          SHA-512:06BCCB7066BA3B9F09FDFE1B23CEAB28E169C664D5D462044F57103214F2B72ED49FEAB41311C2960501924D26DC0BA74D9A79B52DE91666A36A639195916CCC
          Malicious:false
          Preview:BM........6...(.......&...............................+vM.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.P.}.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
          Category:dropped
          Size (bytes):66
          Entropy (8bit):2.1225886730475874
          Encrypted:false
          SSDEEP:3:6tlllAlul0lpKolOToln:6XoluKpKolOToln
          MD5:0E1AB770F8D8F8768B66E7DE087087C9
          SHA1:36AD69F719F035D0C040DB6D611611552A387B41
          SHA-256:3E57878D7E1C0D2FE4DB1DD47B803A363188114520FF5D7A4F50FAB47C0EE992
          SHA-512:2C5A627FBA9CE1B35397D1DC4AE7B6954BD7B39A402689F3C12F2DC314CA5133F553DA0411CAD0A6D556F1787F2B2FCE585F76D4B73BB2CFF98732AAF808FDC1
          Malicious:false
          Preview:BMB.......6...(.......................................+vM.+vM.+vM.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
          Category:dropped
          Size (bytes):66
          Entropy (8bit):2.1225886730475874
          Encrypted:false
          SSDEEP:3:6tlllAlul0lpKolOToln:6XoluKpKolOToln
          MD5:0E1AB770F8D8F8768B66E7DE087087C9
          SHA1:36AD69F719F035D0C040DB6D611611552A387B41
          SHA-256:3E57878D7E1C0D2FE4DB1DD47B803A363188114520FF5D7A4F50FAB47C0EE992
          SHA-512:2C5A627FBA9CE1B35397D1DC4AE7B6954BD7B39A402689F3C12F2DC314CA5133F553DA0411CAD0A6D556F1787F2B2FCE585F76D4B73BB2CFF98732AAF808FDC1
          Malicious:false
          Preview:BMB.......6...(.......................................+vM.+vM.+vM.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
          Category:dropped
          Size (bytes):66
          Entropy (8bit):2.1225886730475874
          Encrypted:false
          SSDEEP:3:6tlllAlul0lpKolOToln:6XoluKpKolOToln
          MD5:0E1AB770F8D8F8768B66E7DE087087C9
          SHA1:36AD69F719F035D0C040DB6D611611552A387B41
          SHA-256:3E57878D7E1C0D2FE4DB1DD47B803A363188114520FF5D7A4F50FAB47C0EE992
          SHA-512:2C5A627FBA9CE1B35397D1DC4AE7B6954BD7B39A402689F3C12F2DC314CA5133F553DA0411CAD0A6D556F1787F2B2FCE585F76D4B73BB2CFF98732AAF808FDC1
          Malicious:false
          Preview:BMB.......6...(.......................................+vM.+vM.+vM.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
          Category:dropped
          Size (bytes):66
          Entropy (8bit):2.1225886730475874
          Encrypted:false
          SSDEEP:3:6tlllAlul0lpKolOToln:6XoluKpKolOToln
          MD5:0E1AB770F8D8F8768B66E7DE087087C9
          SHA1:36AD69F719F035D0C040DB6D611611552A387B41
          SHA-256:3E57878D7E1C0D2FE4DB1DD47B803A363188114520FF5D7A4F50FAB47C0EE992
          SHA-512:2C5A627FBA9CE1B35397D1DC4AE7B6954BD7B39A402689F3C12F2DC314CA5133F553DA0411CAD0A6D556F1787F2B2FCE585F76D4B73BB2CFF98732AAF808FDC1
          Malicious:false
          Preview:BMB.......6...(.......................................+vM.+vM.+vM.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 1 x 25 x 24, image size 100, resolution 2835 x 2835 px/m, cbSize 154, bits offset 54
          Category:dropped
          Size (bytes):154
          Entropy (8bit):2.3845907614270176
          Encrypted:false
          SSDEEP:3:9l0lslFlKufKolOTolOTolOTolOTolOTolOTolOTolOTolOTolOTolOTolOTolOc:9l0WtKIKolOTolOTolOTolOTolOTolOU
          MD5:C07E50413D643B1119EB4FF5F9F8A6CF
          SHA1:4DCBF7BB589CF2D34C0FAA112728412CAE9755EB
          SHA-256:A7D431D251AF68B816CB7E94E05B2201F24EBCE1CCC01A39FCD5C0EFCC0D03C4
          SHA-512:50CD65AFE7D5820F301855A283223949C62E4AAE0D9FCE6FEB53AF5F90A1E547BAE4F6400F7B25391B53B8C3621B15175EA1A462D813475D2551983DB0AF124D
          Malicious:false
          Preview:BM........6...(...................d...................+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 1 x 25 x 24, image size 100, resolution 2835 x 2835 px/m, cbSize 154, bits offset 54
          Category:dropped
          Size (bytes):154
          Entropy (8bit):2.3845907614270176
          Encrypted:false
          SSDEEP:3:9l0lslFlKufKolOTolOTolOTolOTolOTolOTolOTolOTolOTolOTolOTolOTolOc:9l0WtKIKolOTolOTolOTolOTolOTolOU
          MD5:C07E50413D643B1119EB4FF5F9F8A6CF
          SHA1:4DCBF7BB589CF2D34C0FAA112728412CAE9755EB
          SHA-256:A7D431D251AF68B816CB7E94E05B2201F24EBCE1CCC01A39FCD5C0EFCC0D03C4
          SHA-512:50CD65AFE7D5820F301855A283223949C62E4AAE0D9FCE6FEB53AF5F90A1E547BAE4F6400F7B25391B53B8C3621B15175EA1A462D813475D2551983DB0AF124D
          Malicious:false
          Preview:BM........6...(...................d...................+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 3 x 1 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
          Category:dropped
          Size (bytes):66
          Entropy (8bit):2.1225886730475874
          Encrypted:false
          SSDEEP:3:6tlllCllflFlpt/n:6Xqlttp1
          MD5:F623CB070F63ADADF31212D6564805B9
          SHA1:D1C283EEBA4B784CD731CE5179B0B44D9D8874CB
          SHA-256:E4AB79B964317D20D8E15D8723CADCA3691878520CFE498EB62674FD8E4A3DC2
          SHA-512:1836786F6A5EB61DC179135B136EC014C7EA0FB3C87E1C96349B31B91884A55044B12C292623A52B7B20346CF6EE21FEF06CFF28411BB3C4FE76E14EE1580E66
          Malicious:false
          Preview:BMB.......6...(.......................................+vM+vM+vM...
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 3 x 1 x 24, image size 12, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
          Category:dropped
          Size (bytes):66
          Entropy (8bit):2.1225886730475874
          Encrypted:false
          SSDEEP:3:6tlllCllflFlpt/n:6Xqlttp1
          MD5:F623CB070F63ADADF31212D6564805B9
          SHA1:D1C283EEBA4B784CD731CE5179B0B44D9D8874CB
          SHA-256:E4AB79B964317D20D8E15D8723CADCA3691878520CFE498EB62674FD8E4A3DC2
          SHA-512:1836786F6A5EB61DC179135B136EC014C7EA0FB3C87E1C96349B31B91884A55044B12C292623A52B7B20346CF6EE21FEF06CFF28411BB3C4FE76E14EE1580E66
          Malicious:false
          Preview:BMB.......6...(.......................................+vM+vM+vM...
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 1 x 25 x 24, image size 100, resolution 2835 x 2835 px/m, cbSize 154, bits offset 54
          Category:dropped
          Size (bytes):154
          Entropy (8bit):2.3845907614270176
          Encrypted:false
          SSDEEP:3:9l0lslFlKufKolOTolOTolOTolOTolOTolOTolOTolOTolOTolOTolOTolOTolOc:9l0WtKIKolOTolOTolOTolOTolOTolOU
          MD5:C07E50413D643B1119EB4FF5F9F8A6CF
          SHA1:4DCBF7BB589CF2D34C0FAA112728412CAE9755EB
          SHA-256:A7D431D251AF68B816CB7E94E05B2201F24EBCE1CCC01A39FCD5C0EFCC0D03C4
          SHA-512:50CD65AFE7D5820F301855A283223949C62E4AAE0D9FCE6FEB53AF5F90A1E547BAE4F6400F7B25391B53B8C3621B15175EA1A462D813475D2551983DB0AF124D
          Malicious:false
          Preview:BM........6...(...................d...................+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PC bitmap, Windows 3.x format, 1 x 25 x 24, image size 100, resolution 2835 x 2835 px/m, cbSize 154, bits offset 54
          Category:dropped
          Size (bytes):154
          Entropy (8bit):2.3845907614270176
          Encrypted:false
          SSDEEP:3:9l0lslFlKufKolOTolOTolOTolOTolOTolOTolOTolOTolOTolOTolOTolOTolOc:9l0WtKIKolOTolOTolOTolOTolOTolOU
          MD5:C07E50413D643B1119EB4FF5F9F8A6CF
          SHA1:4DCBF7BB589CF2D34C0FAA112728412CAE9755EB
          SHA-256:A7D431D251AF68B816CB7E94E05B2201F24EBCE1CCC01A39FCD5C0EFCC0D03C4
          SHA-512:50CD65AFE7D5820F301855A283223949C62E4AAE0D9FCE6FEB53AF5F90A1E547BAE4F6400F7B25391B53B8C3621B15175EA1A462D813475D2551983DB0AF124D
          Malicious:false
          Preview:BM........6...(...................d...................+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.+vM.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 50 x 69, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):1319
          Entropy (8bit):7.766981650205824
          Encrypted:false
          SSDEEP:24:EJgutniqBakLEgagTMk3iumwrf/zIk5Lt8ltpSSwTLDnGelU5ZwJ6pJaG6yskL+i:EpR7E7gTinwrXsALitpfELDnBuwpi
          MD5:BC228A4708AC1A09144181F26B40E1CC
          SHA1:EAF977266DAF59B4ACFCEF52CC402EBB8543F2CD
          SHA-256:0E58AD0D0024F92E37C74EE53F9021B375DFDD5EBD712AE11FEADD3B0EC04003
          SHA-512:5972C8491DC0BD868AD5B20567F2A361CF8AEB041B48E4F23AB8B834DFFF786A65A842DF4A1071752DEE73C6BA85293FE19EABA4FA7181EB9203A22CC054E312
          Malicious:false
          Preview:.PNG........IHDR...2...E.............tEXtSoftware.Adobe ImageReadyq.e<....IDATx..ZkH.Q...!.....V ..0.#.X06.^.J.d$J.....E..C.$1.$I0%qIzH.$.+..!.,A..A....;....;.;.uG...........N.......M"....G.#.....({.n.}.XB...=..!B..#.H...i.t.&D.m.K.....J......|n..AB....H6.2.:.2..X.).<..!...dv......O#.....>RM.E...P.......e U.klz7.=f|.L.b[.Ox....i..B...,3.f.1B.f.g..0.....S.1.~.;B..(...g....0A...!..\$<.#w..;.0...D/|.%|.._"..9;a.I....................+3......H. |.l."|J.L$....<"..%.......2.@.3.-]..v...........'.D..;....<c.~5..<..'%RO($..>.&La@.p..'..!....8o".....wC.......o.Tu.4`4{...J...8?./......W...~...HJv$..+...q(......I%.vF. .q..@y~.P...T.0.k.N[eZ..N.ID.....P..;. N\?.....Z.<.1P.....q.uh.5..U.P.......L$ .[dD.].J..I....uW.E....-2%.HM.5{.E.e..M...ED~.o....O..".sd....ms......(..D."..(&.D.r..)M.."rX.].&....6.I,...`=.o.9..rN..ZX.i.H...Jw)...G..TK.Qa..`.?...ID....R."]...6)..*Q.0+a.N7...@s..EHN..iV..H.q.0kDD..G.4"...3.zE.,Kh.p/...n....o.r....v..L.g....B.7...M..
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:MS Windows icon resource - 5 icons, 48x48, 16 colors, 4 bits/pixel, 48x48, 8 bits/pixel
          Category:dropped
          Size (bytes):17630
          Entropy (8bit):5.501776622442267
          Encrypted:false
          SSDEEP:384:24aEatlaz2HHHHHTHHHHHHBV310W5iehFhvY71eU748YuN6FfEoJJz5R31kpH8:2/D5HHHHHTHHHHHHBrk1
          MD5:488C247C4D7482E34D4576C44CEE79E0
          SHA1:92444B9622079CD8EB4C1D0C0E10E3E2DD8B4AD4
          SHA-256:EB276449EB326A407CE055001607F212FFCAEF01B5F849BB50A606BD9CD177A6
          SHA-512:E978672B01A2C5CD5C83DCBDC77CC80A60CA4A99283C30C7624E9DE49168BDD6686A5E6FDD913ED0A0E008D6D0D999129B3F25947A84DF7654ACD6C39906B6CA
          Malicious:false
          Preview:......00......h...V...00......................h...f...00.... ..%............ .h...v@..(...0...`.......................................................................................................................................p.......................0......................33.....................3333...................s33337..................333333p.......wwwwwwwww33333337........wwwwwwwss3333337p............ww#333333332............ws33333333330...........w333333333333p..........33333333333337..........;.............p.......................p........."""+......."""pp...........+...........pFffffffffff+.......f...pfffffffffff+.......fp..pfffffffffff+.......fp..pfffffffffff+.......fp..pfffffffffff(.......fp..pfffffffffff(.......fp..pfffffffffff(.......fp..pfffffffffff(.......fp..pfffffffffff/.......fp..p..fffffffffb"""""""fp..p...vffffffffffffffffp..px....fffffffffffffffp..pwx....ffffffffffffffp..pww.....fffffffffffffp..pwww.....ffffffffffffp..pwwww.....fffffffffffp..pwwwwx.....fffffff
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:MS Windows icon resource - 3 icons, 48x48, 16 colors, 4 bits/pixel, 48x48, 8 bits/pixel
          Category:dropped
          Size (bytes):15086
          Entropy (8bit):5.2402145994884695
          Encrypted:false
          SSDEEP:384:SCUNtR8LMbgM5U/YHeCtovi5yg8xYuYMp:S5RiMbHN+CtoJgkYuP
          MD5:BFBE8F838AFC6156CF2362E81F713A52
          SHA1:73A87A86C6F039E7B9D2EED0BDF7E6B1D78029BE
          SHA-256:251099323513EA86DD5BC2C0BF8503AA364DB7B40B214C288FCC1A76A97B6D88
          SHA-512:CFFAAD785AF37E35D8825058F93939EBB3CCE18D5C7BDF2ACF0543D530BCD34A443ED6B9352D1F0DF90F41DFE118B03B8F92D63143521C87138D92F2F1D6F1EB
          Malicious:false
          Preview:......00......h...6...00..............00.... ..%..F...(...0...`.........................................................................................................................................................wwxwp..........xFg....wwx..............hffffgwwx..............vhffffffg...............fhffffff................fhfffffg................fhfffff.................fhfffff.................fhffffg.................fhffffo.................fhffffo.................fhffff..................fhffff.......x..........fhffff......ff..........fhffff......ff..........fhffff......vg..........fhffff.......x..........fhffff..................fhffff..................fhffffh.................fhff.fg.................fhff..f.................fhff..w.................fhff..w................fhff.w................fhfg....w...............fhfx.....x......p.......fhg.......x....v`.......fhgx.......wwfff`.......fhgx..........ff`.......fhfx..........ff`.......fhfw..........ff`.......fhgw..........vf`.......fh
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):22848
          Entropy (8bit):6.8705781741307765
          Encrypted:false
          SSDEEP:384:iOw0cxp5wbrBgrjrI/ehLI/ehDvZYLX2Ip4kR4qjdAA1m5wMPhzmubmm+ccP:iOAxMVTacaDRYT2Ip484qxf1mlZxbWP
          MD5:9D67E3BE4D83160D24FEE65F6E1868E5
          SHA1:9AED13C010F24C6888DA91D883A1A31AC45E029A
          SHA-256:4FC58D819A4BC75CB8170192E34FDB17E31C38831A7230ED0E03A30EB38CCF9D
          SHA-512:73AF8E17FA6C949FFB0861118A10B362DEA4A236B60912497E8F97C75CC8EBE3CDDBC8018A4E8CF24B539DA6122790FDB081CF4B68C59197EC579E13191372EB
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 0%, Browse
          Joe Sandbox View:
          • Filename: Setup.exe, Detection: malicious, Browse
          • Filename: Setup.exe, Detection: malicious, Browse
          • Filename: Typora#U5b89#U88c5#U52a9#U624b.exe, Detection: malicious, Browse
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........u9X..jX..jX..j...kW..jX..jh..jA..k]..jA..kY..jA..jY..jX..jY..jA..kY..jRichX..j........................PE..L...>>.d.........."!...$............@........ ...............................`......n.....@.........................P".......$.......@..h...............@=...P..\....!..p............................................ ..X............................text...)........................... ..`.rdata..X.... ......................@..@.data........0......................@....rsrc...h....@......................@..@.reloc..\....P......................@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 624 x 37, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):405
          Entropy (8bit):6.133825874280697
          Encrypted:false
          SSDEEP:12:6v/7TvPdE/6TDOH9/F7gqhIpS24OLvc6+aBN:yvu/6HOd2IEoaBN
          MD5:5FBC69A793959AFB968D1B5292BE3B09
          SHA1:375889283A20C675A844E5A9A38E4FEB55F55D05
          SHA-256:53A1486B8A86C60FBDCB74057D2F9606749CDAF3C845EDE40F48D869AC553D23
          SHA-512:1451CE6CE864821B6F3D6072C6B557A04C802C5C1D715EC3723F4CC3958EA35306B8A9BED8B025CCE5F2F62BB7CD1D2070C43F2A63AACCDEE29061DFB753CFD4
          Malicious:false
          Preview:.PNG........IHDR...p...%.............bKGD.......C......pHYs.................tIME.....4 ...`..."IDATx......0..Q+nP.......%#..:B.......*...^..7sJ.^...H.c.fd.-.#@.u_WV.Zg...i.&......C..0G>./...mi.|..........d.p.......*Y...F...............8.........@....8.........@... ....p..............p...8.........@... .............. ....p...8.........@....8...........".8.!_m........B.:...H....`b^.3).B..>....IEND.B`.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:HTML document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1929
          Entropy (8bit):5.123149054536631
          Encrypted:false
          SSDEEP:24:74+4M+i+hxfeK9tle19Eley93FVXllzhRMOzJuHqyxYqxmATdVsnoObAaby2v:XmVnTywvsA1hDV
          MD5:3DEC9F3886A7D180B1DA7A72541DBF81
          SHA1:07F3BA034BE78970A86D055DAED59BF7D87F8D21
          SHA-256:FB1C5DF8785650B20612B61A66ECBDA5E1ED323D6C8AC45B2EBCCBE9193779F8
          SHA-512:0250B81A2795FCAC69E3F2C95BDFF406F01FF207E81BEAD96B2739F28E26DD2D97D82CCCBFBD92B7141B1EABD2310DB048618FEF1CC5261FDFF212D19BB910BF
          Malicious:false
          Preview:<Button.. xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation".. xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml".. xmlns:d="http://schemas.microsoft.com/expression/blend/2008".. xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006".. mc:Ignorable="d">.. <Button.Resources>.. <SolidColorBrush x:Key="ButtonBorderBrushPointerOver" Color="[AiWinUIBtnBorderPointerOver]" />.. <SolidColorBrush x:Key="ButtonForegroundPointerOver" Color="[AiWinUIBtnForegroundPointerOver]" />.. <SolidColorBrush x:Key="ButtonBackgroundPointerOver" Color="[AiWinUIBtnBackgroundPointerOver]" Opacity="[AiWinUIBtnBackgroundOpacityPointerOver]" />.... <SolidColorBrush x:Key="ButtonBorderBrushPressed" Color="[AiWinUIBtnBorderPressed]" />.. <SolidColorBrush x:Key="ButtonForegroundPressed" Color="[AiWinUIBtnForegroundPressed]" />.. <SolidColorBrush x:Key="ButtonBackgroundPressed" Color="[AiWinUIBtnBackgroundPressed]" Opacity="[AiWinUIBtnBackgroundOpacityPressed]"
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 1020 x 54, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):557
          Entropy (8bit):5.391845348790761
          Encrypted:false
          SSDEEP:12:6v/7ePdE/6T8Kp1zbm81RI76k6N0VtBG6WtEkiVtEp0VtEp0VtBGVtBG7NrFP7:Lu/6hp1zDROqSVvG6WviV9V9VvGVvG7r
          MD5:2D014FEFB6A22313E7E14A8DAF31CE28
          SHA1:FE1B72BBE1DAA3A0D7874DE20E8290D34015DCEC
          SHA-256:F47AC424ED22EFEB451214CD21B5096563BCBC4356BA0060278082410BB6D149
          SHA-512:73254F3A3B46D1BB0C4B29066DD3C35DAD4FCF79E4A62E503EA22EBB69ADBBEE7263CB92FDB3445DEDFE7D1FD51FAF8F57EF55ACEE7B086B1FB40AB073A4D3C4
          Malicious:false
          Preview:.PNG........IHDR.......6.....z:......bKGD.......C......pHYs.................tIME...../.........IDATx.....@..Q0.. ......S.....:.+..l..8..`k..P..N.?./.n.1...E0.........&..........?........M.R.......N..:...L_S....h\...y.T.m."..?.<..S.O....7.......?....~...@...........................~...@............... .M.....................?... ....@......................?....~...@......................?....~...@...........................~...@...........................~...@............... ..............r4....`...d].[...M..),..?....~...`.>..'....j....IEND.B`.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:HTML document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1844
          Entropy (8bit):5.118899204184053
          Encrypted:false
          SSDEEP:24:74+4M+i+hxfeK9gle19xley9F0FV+TlkKcm7zJGHqXxYqh+LTmTdEsnTOSi7ny2v:XmVnTj9r8C63
          MD5:6F0634CFDE72142DBB19339F4E16E86B
          SHA1:F2968128419E991AD75747BAE3726693A819A8F5
          SHA-256:0A33AB5090939B16C5BED367CA7F99B297C215714BAA1CA1B5F649B48FDC6D0B
          SHA-512:B833E1F64EC38633FBAAFEE6B3623F69604311F2ED60A2286F9EFE4FBD04FB25776771E7C5863F7D6B687360160CF25711CA92FE38AD270ED27588CBDAA8E3D0
          Malicious:false
          Preview:<Button.. xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation".. xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml".. xmlns:d="http://schemas.microsoft.com/expression/blend/2008".. xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006".. mc:Ignorable="d">.. <Button.Resources>.. <SolidColorBrush x:Key="ButtonBorderBrushPointerOver" Color="[AiWinUIBtnInstallBorderPointerOver]" />.. <SolidColorBrush x:Key="ButtonForegroundPointerOver" Color="[AiWinUIBtnInstallForegroundPointerOver]" />.. <SolidColorBrush x:Key="ButtonBackgroundPointerOver" Color="[AiWinUIBtnInstallBackgroundPointerOver]" Opacity="[AiWinUIBtnInstallBackgroundOpacityPointerOver]"/>.... <SolidColorBrush x:Key="ButtonBorderBrushPressed" Color="[AiWinUIBtnInstallBorderPressed]" />.. <SolidColorBrush x:Key="ButtonForegroundPressed" Color="[AiWinUIBtnInstallForegroundPressed]" />.. <SolidColorBrush x:Key="ButtonBackgroundPressed" Color="[AiWinUIBtnInstallBackgroundPressed]
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 732 x 163, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):4840
          Entropy (8bit):7.69588834543415
          Encrypted:false
          SSDEEP:96:6S4ZBm8mdYmTTkhr9v52/7siC+LdeH6CTt+dW2dUvIPQGdfo/Wl+:6S4rhr94bLLmtkW7A4MfHk
          MD5:B658F03E1A5D49E3CA9E1D82415BB2B2
          SHA1:240CFC24BB16FFF60F1B560D2CC1CCB4AE20846D
          SHA-256:99E0E600F2C201A631621B758B4F5B5E8BAE319DF9025426F31C91F6481236AB
          SHA-512:0579A5D74447662DC20AF2374313C07B25B0BD6A16BFFF47ED3736ED709C84D5063AB8B347B04FD8D3EC04853457255FFAD2B191E7879B42F79BBE8B2ADCE707
          Malicious:false
          Preview:.PNG........IHDR..............B.T....bKGD..............pHYs.................tIME.......xR.....uIDATx...{l........[[J.).(Z<.PH..,.Ak0...T...#aH.4...v...... ..Aa..$......[/..B.ii.B...........,K.M6................I........lyp..s....3..o........?...{......K...$aXc.YI..../..xD.dT.D\.%..\..>.......n..z.`...v......n..}.^.....*..S,.S"I..d.v\....nP.d..I^.v&..z.......sH..(...w<.H.W....%".'b.....-W>.x2.]..].g..."(CZ[Z....;..\.;..G...l...tC:q......QE.}.KD..G.MF...nOr.W.d@..s|.$............(..H<.W,.S<.S4.U,.........I..&|..1..|.....i......~*.....J(.L(...3...L...........l..|E.'.............p.....n.....n.........P.....P......7...@.....@.....(.................p.....n.....n.........P.......p.....n.....n.........P.....P......7...@.....@.....(.................p.....n.....n.........P.....P......7.....7...@.....(.....(...........p.....p.....n...............P......7.....7...@.....(.....(.................p.....n.....n.........P.....P......7...@.....@.....(.................p.....n....
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:ASCII text, with very long lines (373), with CRLF line terminators
          Category:dropped
          Size (bytes):1280
          Entropy (8bit):5.449752594903355
          Encrypted:false
          SSDEEP:24:m4+4hD+kwur9RJrKTAtjBg9mqErMmMg8/bF19PkOy90kOTvK96kLWbf:8+KYfJAAtjQ5Ew7Jd85vW
          MD5:22BD7066191663A7AC473C022992BA83
          SHA1:80EA48D654C38A778A40CC722C3DD5AFCF1E2AD4
          SHA-256:79CF8899E16F8AC8D2BB7280C109458130C9758083B265EDF4AA57B2AD2C86BA
          SHA-512:E497440F5170D4C6D35BB901B418F5D91E2F09875CFEA7D0427532DBDBFFC655018AA010ADE1A479AFC0307B42DB057AA0D654699A088AF6FFEC146E9C22C1AA
          Malicious:false
          Preview:<Button xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation" xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml" Foreground="[AiWinUIBtnRunForegroundNormal]" Background="[AiWinUIBtnRunBackgroundNormal]" Width="253" Height="879" HorizontalContentAlignment="Left" VerticalContentAlignment="Bottom" Margin="61,32,0,0" VerticalAlignment="Top" Padding="0,0,0,0">...<Button.ContentTemplate>....<DataTemplate>.. <PathIcon Margin="0,0,0,0" Width="68" Height="68" Data="m60.738 29.1a5.646 5.646 0 0 1 0 9.8l-44.796 25.992c-3.661 2.126-8.68-.303-8.68-4.9l0-51.983c0-4.597 5.02-7.026 8.68-4.9l44.796 25.992z" />.. </DataTemplate>...</Button.ContentTemplate>...<Button.Resources>....<ResourceDictionary>.....<SolidColorBrush x:Key="ButtonForegroundPointerOver" Color="[AiWinUIBtnRunForegroundPointerOver]"/>.....<SolidColorBrush x:Key="ButtonBackgroundPointerOver" Color="[AiWinUIBtnRunBackgroundPointerOver]"/>.....<SolidColorBrush x:Key="ButtonForegroundPressed" Color="[AiWinUIBt
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 732 x 163, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):1978
          Entropy (8bit):7.063174654571579
          Encrypted:false
          SSDEEP:48:6/6Wh+u5OAP3m4/m4xY/mkcmEYw6mWNq6mm4xExmsTzCR0hy:6SW/5Okhz5xYw6pqffE/Tfhy
          MD5:2899F8A97894149A40A64E05DF96EAC9
          SHA1:418A418271A5F6C00FB59A875F6F98732255CB8A
          SHA-256:31B423DB1159272EF49887453F2EF3F3C5D59EB312BAAC6E47A5C465D47A53C0
          SHA-512:663D99A08C69CBFF610280424A86531DB734BC41F39A7D8E339D37DBB68C45518F552596AE32BA093965A4699A4ABD6C3BA67D2E04C441A12BF5A70BA9E7AA06
          Malicious:false
          Preview:.PNG........IHDR..............B.T....bKGD..............pHYs.................tIME..... ' .-....GIDATx....k.W..........Ab-$... ...9..(...E/^.!."..)./....JB!D.P.-.dw...D...:.}3... nv..2.}7;a._n}]..7..e.Z..GY..,....Z\....{x..u...$......6........s.>...F..r..1.G.....,.....'"+."...>6.-b.n..4(.i..n...F..W..W..}..tpw#...r...Z{e)....T}.aqy..5....X......_Q.w#..;....e...._0N..[_3.-...f..w0>...?7d....m{Wp.2..{Q._...2b.*b840).t".........@.....Y....w.....H....W..q{.....#..|.4.......9....?....pt2{.*..O....S............................... ...@p........7...n..@p............n...... ..............!............... ...@p........7...n..@p............n...... .............7.. ...@p........7...n..@p............n...... .............7.. ...@p........7...n..@p............n...... .............7.. ...@p........7...n................n...... .............7.. ...@p........7...n................V..6.w*.....J...S.?...KTo}...../..DX..y.?.XpGD\.~w..>.}..$..Gc?...K.,q..........X..y.?..\R.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:ASCII text, with very long lines (383), with CRLF line terminators
          Category:dropped
          Size (bytes):1416
          Entropy (8bit):5.259459132521691
          Encrypted:false
          SSDEEP:24:m4+4hD+mbur9RJrKA53KFGPJwE33pwCTH8/bF19ekOy9RkOo6K9rkLWbf:8+KPfJXKSOmuCgd9mqW
          MD5:0BB7D21BCB4565FF5FDF581B1DAA4219
          SHA1:152E568118137E04E626973975F43734FE816302
          SHA-256:3C4F55D5F3736CF3402A97B626E998AEEB25D7EB10BFC326A64602B71706119A
          SHA-512:56EFE54E5ED6BC01764139B8C736AAD328CC286FBFDD190D0999E053D13457AD982F8A0C6F97A0E5D0454E8F61C938C632ABF949101EC0A53C3EFFD42AC1BCA3
          Malicious:false
          Preview:<Button xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation" xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml" Foreground="[AiWinUIBtnViewReadmeForegroundNormal]" Background="[AiWinUIBtnModifyBackgroundNormal]" Width="253" Height="879" HorizontalContentAlignment="Left" VerticalContentAlignment="Bottom" Margin="61,32,0,0" VerticalAlignment="Top" Padding="0,0,0,0">...<Button.ContentTemplate>....<DataTemplate>.....<TextBlock x:Name="Ico" FontFamily="Courier New" VerticalAlignment="Bottom" FontSize="100" FontWeight="Bold" >.. <TextBlock.RenderTransform>.. <CompositeTransform TranslateY="25"/>.. </TextBlock.RenderTransform>.. <Run Text="&#x00B1;"/>.. </TextBlock>....</DataTemplate>...</Button.ContentTemplate>...<Button.Resources>....<ResourceDictionary>.....<SolidColorBrush x:Key="ButtonForegroundPointerOver" Color="[AiWinUIBtnModifyForegroundPointerOver]"/>.....<SolidColorBrush x:Key="ButtonBackgroundPointe
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 624 x 37, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):405
          Entropy (8bit):6.14062806564406
          Encrypted:false
          SSDEEP:12:6v/7TvPdE/6T59/F7gqhIpS24OLvc6+aBN:yvu/6T2IEoaBN
          MD5:69AE8E816A1CC20D5AE0021CF3539399
          SHA1:998B8394109A0BB59C2EE216548BD56BFF5F66C5
          SHA-256:8D9AA1DDF1B98A6FAC56D878FC1BEE87BF6EEEFD291FC849E3EFC5242BC19016
          SHA-512:3A38E28AEDC2DD99B6ECB0784F67077B6ED8502060BB57E841263C3510D87CC106596C1D809C2EDC75B4E00105C98408AA64F41C871DE0E8CFFB30B56864609F
          Malicious:false
          Preview:.PNG........IHDR...p...%.............bKGD.......C......pHYs.................tIME.....4+N5....."IDATx......0..Q+nP.......%#..:B.......*...^..7sJ.^...H.c.fd.-.#@.u_WV.Zg...i.&......C..0G>./...mi.|..........d.p.......*Y...F...............8.........@....8.........@... ....p..............p...8.........@... .............. ....p...8.........@....8...........".8.!_m........B.:...H....`b^.3).B..>....IEND.B`.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:HTML document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1929
          Entropy (8bit):5.123149054536631
          Encrypted:false
          SSDEEP:24:74+4M+i+hxfeK9tle19Eley93FVXllzhRMOzJuHqyxYqxmATdVsnoObAaby2v:XmVnTywvsA1hDV
          MD5:3DEC9F3886A7D180B1DA7A72541DBF81
          SHA1:07F3BA034BE78970A86D055DAED59BF7D87F8D21
          SHA-256:FB1C5DF8785650B20612B61A66ECBDA5E1ED323D6C8AC45B2EBCCBE9193779F8
          SHA-512:0250B81A2795FCAC69E3F2C95BDFF406F01FF207E81BEAD96B2739F28E26DD2D97D82CCCBFBD92B7141B1EABD2310DB048618FEF1CC5261FDFF212D19BB910BF
          Malicious:false
          Preview:<Button.. xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation".. xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml".. xmlns:d="http://schemas.microsoft.com/expression/blend/2008".. xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006".. mc:Ignorable="d">.. <Button.Resources>.. <SolidColorBrush x:Key="ButtonBorderBrushPointerOver" Color="[AiWinUIBtnBorderPointerOver]" />.. <SolidColorBrush x:Key="ButtonForegroundPointerOver" Color="[AiWinUIBtnForegroundPointerOver]" />.. <SolidColorBrush x:Key="ButtonBackgroundPointerOver" Color="[AiWinUIBtnBackgroundPointerOver]" Opacity="[AiWinUIBtnBackgroundOpacityPointerOver]" />.... <SolidColorBrush x:Key="ButtonBorderBrushPressed" Color="[AiWinUIBtnBorderPressed]" />.. <SolidColorBrush x:Key="ButtonForegroundPressed" Color="[AiWinUIBtnForegroundPressed]" />.. <SolidColorBrush x:Key="ButtonBackgroundPressed" Color="[AiWinUIBtnBackgroundPressed]" Opacity="[AiWinUIBtnBackgroundOpacityPressed]"
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:MS Windows icon resource - 3 icons, 48x48, 8 bits/pixel, 48x48, 32 bits/pixel
          Category:dropped
          Size (bytes):14574
          Entropy (8bit):5.314402751771045
          Encrypted:false
          SSDEEP:192:H9R53Ya0k3f6VfxJWSDL/jh7JRSdWpOWR9b0p6Bekh7SZVzzz+zwhYbhUY:dRSaJP6VJTDZlRSoxD0p6IkalAztUY
          MD5:1791161295A8385E85B82A8C60B47A5C
          SHA1:8A715DA629DB0151D537E0E909E3C1141FCA6A23
          SHA-256:AFEF25522F3973F2BE6059B021C6AC62359A2FDEE782471EAC130394BD4F5B28
          SHA-512:B04D580240CBDE64B8F57ACA1BA7C0777988C8BDF6FCAAAEEB5142E3DAF9CF2E64A8DC2E4EE3A1BA69621330360B2548B1E46BD546D36187DF7803FA50052860
          Malicious:false
          Preview:......00..........6...00.... ..%............ .h....4..(...0...`...................................KKK._\U.[[[.lll.rrr.vvv.zzz.}}}..vW...[.....0..7..9..>...Y...U...X...Z...b...h...p...{...b...a...d...b..B..G..@..E..L..T..E..K..L..Q..V..[..Y..n..a..b..e..l..i...r...u...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 222 x 37, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):638
          Entropy (8bit):7.41372113191638
          Encrypted:false
          SSDEEP:12:6v/7YrFsiiSkaq1RPa7EADxzWSwsAsjw7ke0PoFEvqDtY5qe4Ov184z9:ZFxin1upDVHAsske0PPCDS5sOiU
          MD5:ED2E083C6FF38CD0A63E2503FCCE051F
          SHA1:02C054517979CBE833C1048FB7ED578666F4240C
          SHA-256:BB37EBAF70AEE9ED478BFE1DD300C262014CCB29DB225F034F2C9D5B7EAB150F
          SHA-512:C483EE4303436C512F2DE230EA6BBD634B546D7754ECE532FAB820257FB7B3B76B9A9FDF5B365188FBF1B9E7688FD8DFBF33EF812683942E3BD4B6B9A23AAE6E
          Malicious:false
          Preview:.PNG........IHDR.......%.....-2Wm....tEXtSoftware.Adobe ImageReadyq.e<... IDATx..m.P..M...)Se.*6....@.U&..&.0...Pe....A.... ..x.....>..Y....^.y..^Y.....HO.&..x.Q0XO}...sE|b..&0XOw............x....&..G;....^O.x..3...M.zF..}p.4x.d.I.\..s...-..i.[..'.&....7..=.F...t...u.h....tL7.z.....ty.=.l..&..O.......h2..z..5....rw..j.Ss....d.;......1........N.Q.|;B.Q.,..5.....]4...N./.L~.....\.O.....\4)z.s=q9. .4.@...r.w".NU.>..I.;....+.L...........&E....5.X...x.....x]..A2u.Er....I....a3.T. ..wDM..5.W...8..Mh..M..X...r.......r.........Q.....y<.....4...).........D.....h<....r@.......|;..........m..qO......IEND.B`.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:HTML document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1711
          Entropy (8bit):5.099246065486414
          Encrypted:false
          SSDEEP:24:74+4M+i+hxfB5TOPK9Mle19PBPley9YgQB5GJiHqrBNxYqgTd8snwBAOSQy2v:XmVnZVOEfp7O0GoZR
          MD5:134BD85D740996455BC747605B6AF1A2
          SHA1:C20F6329FAD2A43B60D14C0E3BFF29CE79AA6B01
          SHA-256:3D68FEC559563414476D6FE03EF16AA5E580969AA8C2AD81166343F38204A411
          SHA-512:449B542006A2F0E180AA6E07009C3F7FB8F1C6C67038E940A57CA063431C202BB23531396D97DC8110DBBBDAB121DF07C232B881B164D016F2CAB33D4627DB4E
          Malicious:false
          Preview:<Button.. xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation".. xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml".. xmlns:d="http://schemas.microsoft.com/expression/blend/2008".. xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006".. mc:Ignorable="d">.. <Button.ContentTemplate>.. <DataTemplate>.. <FontIcon Glyph="&#xE749;" FontSize="25" />.. </DataTemplate>.. </Button.ContentTemplate>.. <Button.Resources>.. <SolidColorBrush x:Key="ButtonBorderBrushPointerOver" Color="[AiWinUIBtnPrintBorderPointerOver]" />.. <SolidColorBrush x:Key="ButtonForegroundPointerOver" Color="[AiWinUIBtnPrintForegroundPointerOver]" />.. <SolidColorBrush x:Key="ButtonBackgroundPointerOver" Color="Transparent" />.... <SolidColorBrush x:Key="ButtonBorderBrushPressed" Color="[AiWinUIBtnPrintBorderPressed]" />.. <SolidColorBrush x:Key="ButtonForegroundPressed" Color="[AiWinUIBtnPrintForegroundPressed]" />.. <SolidColorBrush x:Key="ButtonBackgro
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:MS Windows icon resource - 2 icons, 32x32, 8 bits/pixel, 32x32, 32 bits/pixel
          Category:dropped
          Size (bytes):6518
          Entropy (8bit):5.116636834496781
          Encrypted:false
          SSDEEP:192:BwNqZ+HxIbqiMhQ8iRG8ERC136363636K:BqqZGRiRPCC0
          MD5:BDC280616F9670F41C57C16BF08E8387
          SHA1:48F574183BB500CD1808BAC20A25CFC82C05E482
          SHA-256:6E5C2E9E923569F943E9F8A86EE5023034B3DB1F6434118A0D95F429F90FFBE7
          SHA-512:EC3E5C0E6306773A3700889C2B19D6DD8EFF54F73C1BF3C7CF239807FA1B512DDE7E30D486FCD78130090125A21E2401EB0E8B7667C992863CF7FD52B11CA2C7
          Malicious:false
          Preview:...... ..........&... .... .........(... ...@...................................FEE.JJJ.MLL._UL.RQQ.ZZY.]]\.``_.uk^.}kZ.baa.mml.qhh.tkk.rnn.zoh.ypp.|tt.~~}..q^..ta..wd..zn..{h..~l.......p...t...y...}...}...{...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 732 x 163, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):9188
          Entropy (8bit):7.831163704382977
          Encrypted:false
          SSDEEP:192:6Sx+ikzxjBEnNn5OE5WbrQ2FJL2ysmwJ/XLjw31BsEaMheI:1H456bj5WbRvxwVGbaTI
          MD5:E3D6677249C131A7B7D9E054C8534B9F
          SHA1:912234BC82273B453EFEFA809B177658B09F42C6
          SHA-256:F62D9CA362C314B51438CE3960E5DF0ACEE0CDB0C2557B94905C790B3240A2FE
          SHA-512:F29FA900E0ECF25C5C39A982390A2B1B2D124DE1D8A9D814314282E3B62D175BF2FC7ECF13ACCFE50A50CD6EC9FE4993FCF4A6627B26B9DFD6F1D7BEB1FC441F
          Malicious:false
          Preview:.PNG........IHDR..............B.T....bKGD..............pHYs.................tIME.....(#.ic... .IDATx...y|.......f.l3.m&.....Q@...DD....[.z......s=..i{{..>z.......Z.T.7v...7De..d&.Y.Lf....Q...d.y=..!a2.....=Kf,[~.....l.....}~..=_.`.dn.....ug.....?8...3...$..4.[..;...$i.I.T,.N..J%RR2.4k.[.X$Y.2l.,v.......vn.......6..T...R.x:..).M(......4.nZ.-.X...v..JI....`.d........V..p.....Y,.O(.M(......$..;.n.U.T:-.b1...f..........r..h.,.z.c..Q.s...6..|....;.....G....b....R..[.y2,.......)..G>..........[.p.dR.d..s".N'.J7......t.#..a...V)..F..n_...=i?S.s5.i).N7=M.J7..{..s.J.2Z..3.....4..'....n.... s(...........p.....p.....n...............P......7.....7...@.....(.....(...........p.....p.....n......M....P......7.....7...@.....(.....(...........p.....p.....n...............P......7.....7...@.....(.....(.................p.....n.....n.........P.....P......7...@.....@.....(.................p.....n.....n...............P......7.....7...@.....(.....(...........p.....p.....n...............P.....
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:ASCII text, with very long lines (379), with CRLF line terminators
          Category:dropped
          Size (bytes):1403
          Entropy (8bit):5.471062774039721
          Encrypted:false
          SSDEEP:24:m4+4hD+rZur9RJrKGKBj8C+dycScmUjH8/bF19gkOy9bkOmMK9RkLWbf:8+KEfJv6wFfcdnYsW
          MD5:09B52F0751DBFDAD9692E26CAFB502D4
          SHA1:CEA5CB8DE826B3E51365C79BAF7D98B98DF1C315
          SHA-256:1AFE980E62BEF1454DF195952E1B665D263F6E0BEF39077863B387AB0061688F
          SHA-512:87269A5C740A102C52C55EBECE0D76F54892EA9861EE1442B1941997DEE7496D390226B61E28F18808DD501C03F988E2B8B450EA6448D201481C3980C475DD52
          Malicious:false
          Preview:<Button xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation" xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml" Foreground="[AiWinUIBtnRemoveForegroundNormal]" Background="[AiWinUIBtnRemoveBackgroundNormal]" Width="253" Height="879" HorizontalContentAlignment="Left" VerticalContentAlignment="Bottom" Margin="61,32,0,0" VerticalAlignment="Top" Padding="0,0,0,0">...<Button.ContentTemplate>....<DataTemplate>.....<PathIcon Margin="5,0,0,5" Width="60" Height="60" Data="M4.83 4.83a3.753 3.753 0 0 1 5.306 0L30 24.694l19.863-19.863a3.753 3.753 0 1 1 5.306 5.306L35.307 30l19.863 19.863a3.753 3.753 0 0 1-5.306 5.306L30 35.307l-19.863 19.863a3.753 3.753 0 0 1-5.306-5.306L24.694 30 4.83 10.137a3.753 3.753 0 0 1 0-5.306z" />....</DataTemplate>...</Button.ContentTemplate>...<Button.Resources>....<ResourceDictionary>.....<SolidColorBrush x:Key="ButtonForegroundPointerOver" Color="[AiWinUIBtnRemoveForegroundPointerOver]"/>.....<SolidColorBrush x:Key="ButtonBackgroundPointerOver" Color=
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:MS Windows icon resource - 5 icons, 48x48, 16 colors, 4 bits/pixel, 48x48, 8 bits/pixel
          Category:dropped
          Size (bytes):21598
          Entropy (8bit):3.72201218194023
          Encrypted:false
          SSDEEP:192:1zCObveDreVlref52+II4jq3ckJTgPfipj0gLlRqiNgF5IGD0pMb/Z:1z1veDreVX+wjqqq/LlVN1GIpW/Z
          MD5:299AA97601873786E924B17223257D14
          SHA1:E2F7DBBD7B59D69F4499029E40D3C6F559B5F632
          SHA-256:DBA117A25F8AFE1A3AACA4AE830D7A6BA982FDA3D543FD438515AB788643E4AE
          SHA-512:15AF787E74D4AF5896B73979C81DE93B3DB97B407322A929061583EA9F77609D0DB61C54CF69A2A522F4D635A0931A804FE1EC036FEF5544E3101C520AAEEC1C
          Malicious:false
          Preview:......00......h...V...00.............. ..........f...00.... ..%...... .... ......C..(...0...`....................................................................................................................................................p.....................y.......................y..p....................y......................wy................p.....wy................p.....wy......................ww...p...........w......ww...p...................wy......................wy.............yp.......ww......................wwy..p........y..........ww..p...................ww............p..........wy......................ww..p...................wwy......................ww.........p............wwy.p....................ww......................wwy.p....p...............ww.wy...................wwy......................wy....p.................y.......................y............................p.................q.....p.......................w......................y.p..............q.....ww.w..
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 732 x 163, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):13276
          Entropy (8bit):7.922698779496922
          Encrypted:false
          SSDEEP:192:6SIQUbbuGOo9iMhQff7IdMbE8cph2ORT/W4ua95qH9MkVhPZwto+Qr2YlS:1IQ+19iMhyzI9phNCo5qH9MkVkvXYo
          MD5:B4B49297B66D52CCCD06E6A4B534537C
          SHA1:023C2D63C5E0F233B251840ED496CE87895EADC7
          SHA-256:E7BCDFA48C8B759511C262C548D8999924E120EA114AEEAAC6049ACFAF1B1813
          SHA-512:8A96F141CFEBF2541BD459CD6A785214D3F10B9D45B995EFD8D3763497898422ED2E7138D79CF5FC2F45BCD4E9C455D23371906173B5F88AD00254848FDB7236
          Malicious:false
          Preview:.PNG........IHDR..............B.T....bKGD..............pHYs.................tIME.....+8N!.... .IDATx...ip..}'.o?Ww?O.. n.....x..H.4u:N...x.....T.x."U....rMy...J...3J..;.d..EQ.. .....g.../@.H..@.$..O..(..<O.......s......7.7..............._.C{.~.....s...q..D...H.`)..X...^...OlB*.B2.F:.A&.A&....t:....Q.I. J".}.....p...y..VQ.M.!.L!.O!.O#...t..^... . ...3..w.......a......S#"b.M..d".d<.d".Tr..f..R.n@...Rf....RG%?.Ud.}..B.....e.#.k.5.>...,.Fg/..B.Ne.N..J..J.....+s@.IO.].tH..~(DD+.....wc.]@2..L.N...}.7...-.@.:.H...HD...>.....P..L......E.+xV.2.~.%s$"Z.u..y5...84......b.MDDDD........7.......&""""b.MDDDD........p.......&""""b.MDDDDDl.......p.......&"""""6.DDDDDl.......p.......n"""""6.DDDDDl..........&""""b.MDDDDDl.......p.......&"""""6.DDDDDl.......p.......n"""""6.DDDDDl........7......n"""""6.DDDDD........7......n"""""b.MDDDD........p.......&""""b.MDDDDDl.......p.......&"""""6.DDDDDl.......p.......n"""""6.DDDDDl........7......n"""""6.DDDDD........7.......&""""b.MDDDD........
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:ASCII text, with very long lines (584), with CRLF line terminators
          Category:dropped
          Size (bytes):1676
          Entropy (8bit):5.329204164329776
          Encrypted:false
          SSDEEP:24:m4+4hD+weur9RJrKG10Qtnk2u+0DdFLRYwDzm+7Pr54E1GQH8/bF19bkOy9IkOh5:8+K0fJv1T22u+0D6cP5oQcdAXbW
          MD5:85676272B990DD8A7DE94D8C003235DF
          SHA1:9CE544231BAAB4FE263E976647CDDF28039A4811
          SHA-256:0191FF0112785B0FC6343DABF3AE268BABF28218771B068AC31D84C39F86BE43
          SHA-512:B8A2195BD09EFAA67A4DAA3E9F187B92B8342A31A42AF178D0928261030CB1A05D0024830055A298ABC759B911F8FD73A02247A229CDC7AA6785F114E5CD8E55
          Malicious:false
          Preview:<Button xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation" xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml" Foreground="[AiWinUIBtnRepairForegroundNormal]" Background="[AiWinUIBtnRepairBackgroundNormal]" Width="253" Height="879" HorizontalContentAlignment="Left" VerticalContentAlignment="Bottom" Margin="61,32,0,0" VerticalAlignment="Top" Padding="0,0,0,0">...<Button.ContentTemplate>....<DataTemplate>.....<PathIcon Margin="5,0,0,5" Width="64" Height="64" Data="F1 M10 9l8 8c2 2 2 5 0 7s-5 2-7 0L3 17C0 22 1 28 6 33s11 5 16 3l23 23c2 2 5 2 7 0s2-5 0-7l-23-23c2-5 1-12-3-16S15 7 10 9zM43 29c1-1 1-1 1-1 1-1 2-1 3 0 0 0 1 0 1 1 1 1 2 3 1 5 0 0 1 1 1 1 1 1 3 3 4 4 0 0 0 0 0 0 0 0 0 0 1 0l7-7 2-2c0 0 0-1 0-1-1-1-1-1-2-2-1-1-1-1-2-2 0 0 0 0-1 0 0 0-2 0-2 0l0 0c-2 0-2-1-2-2l0 0c0 0 0-1 0-1 0 0 0-1-1-1-2-2-5-5-7-7-1-1-2-2-4-3-3-2-6-2-10-2-2 0-3 1-5 1-1 0-1 2 0 2 2 0 3 1 5 1 3 2 5 5 5 8 0 2-1 3-1 5l-2 2-6 5c-5 5-16 15-22 20-1 1-2 3-2 5 0 3 2 5 5 5 2 0 3-1 5-2 5-5 15-16 20-21l5-5
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:MS Windows icon resource - 4 icons, 48x48, 8 bits/pixel, 32x32, 8 bits/pixel
          Category:dropped
          Size (bytes):19942
          Entropy (8bit):6.307028314098947
          Encrypted:false
          SSDEEP:384:jLGJlpUiY4vIiR59ypEf4Bloa81URvkKTtSYX9tYuYMRzOcyRM4VG9j2RW4XljaG:jglp6DSwEQBlosmKLPYuzzOnRVGZUW4p
          MD5:2ED3D45BC22B79DB09136513AED402DD
          SHA1:8B2324CBFF902B85E349D61E46D9F88170B6BEDE
          SHA-256:4A8FA6335720D3E4F464AF244364923E741605B8AD3E1E28411F494E95EC11E4
          SHA-512:3AE91AE1FF3F460D5677C1AE636C0A0E5525AD2B88DE635FC57D48B5FE78747D3B7DD7683597DA9AC344F1E8884B10124C8DC3DE54E1581921AAC8734F3947F3
          Malicious:false
          Preview:......00..........F... ..............00.... ..%...... .... .....>=..(...0...`...................................r?..uA..yF..~J..yL..}S..hG#.{S$.OOO.QQQ.ZWQ.\\].b]R.ca].qgR.qfZ.^_`.abb.njb.mml.snc.~vl.uus.}}}..L...N...P...U...Q...T...Y...Z...V...Y...S...[...Y...\...g...`...f...j...s...s...j...q...v...z...{...\#..]"..])..a)..i%..e>..h8..f1..i3..o3..m;..q6..n%..w#..y$..z4..oN..sG..yF..xR..z^..zS..|G...R..tg..yf...m..~z.......&...;...9.....+..-..3..3..;..;...X...I...I...G...L...R...S...V...R...[..._...[...Z...i...a...k...w...~...x...|...~...e...`...m...b...a...d...d...j...l...k...y...v...v...}...}..G..A..[..F..H..Q..[..[..\..L..X...e..i..e..g..u..z..s..r..s..{..z..h..u...i...a...x...t...{.................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 432 x 72, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):18599
          Entropy (8bit):7.975539117303291
          Encrypted:false
          SSDEEP:384:QYH+4q/3TBCC3cjOdHpCsjN9AIh7/shbdQ+zgMalqcxbbDb6q:QYc47jOddoakpQhM9cZ/bH
          MD5:F5A120B564FC7823D1C269B7A6E70473
          SHA1:1B85466C12F83B7872214F787390614DF50EADDB
          SHA-256:C178ED81DE4AA8B049EFCF0670C10CF2043A51C6BE1144EE95D09C1C2AFD6087
          SHA-512:96D285759F8A8C5D17D7CAC4EF224995DFA09554A3687C7F34E63651888C98A9C60095CD1A71C82030781FF6E7D58B7D49068BD9F53126FF7B775579D3368ACE
          Malicious:false
          Preview:.PNG........IHDR.......H.............tEXtSoftware.Adobe ImageReadyq.e<..HIIDATx..}.`T.....L..B.!..( ".V..j)j.g....^-O[......w..Z..k....^Q.P+...o!!...d....?...77..@2.Ir...L.$s8......X.d..k...p..5...U...\..].t...|>$.M>.Vy.6$.!......]C..C>7M......c...1......F.qP\...cR./.........A).]6.....KC.......`.R>.RQ.......~}H...?.`..+q...x.A.WH.qx..l\V_.gU......6/.l.-.D..;.;.-.D.-.|....|......O.........l5>x.._.....tO..p...3!]......3.\.4._?...V.X..).D...X..0aB.~....#...`..?.}.OH.. ..#.l..t.?>...A.....\...{M>.....g.s......<{.o....|.b..HmH>C.5$.#...x.........j.?.%.|..Q...."Q#h..2?d...........=...v...6~.7.......~.h.D@}).o.~m...)....=k...~..sF..f.9.......%.R.D.....ES.IX.A.. ..M.:.o.}...rB.....o.$...../.~.=.E....v..?q..]?..(a.e...~...u..3N.I..a...a.a..[....5....p.....M...z....\<..(.....N.:L.7+..._.......ll..'.0a..'.|..}-Z..rH:,=....wr.`.?/.}.1..@......6.=..U.?.$...3.C..2..<w.W..9...`G...;k.....e7..y..Ai....._.9.,....Q..0L8*..F...Yi..>.w...z..?..s.M>h`s/<.R4..
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):254
          Entropy (8bit):6.374356044068655
          Encrypted:false
          SSDEEP:6:6v/lhPQiCtldE/6TDbnTcjoSs2ABAzciMnot17S/FpXuI/RTup:6v/7oiidE/6TzcjoL4zrw1d5uI/e
          MD5:E0040A9DBB89F5A5A1B2C2C34BD52A52
          SHA1:E85D76A72041C8775F3E810273EF4F7E85035D32
          SHA-256:D817AE7A97229DF819521483CE4018A05B1EAB6930A877CB30F4E2BC79A4D42A
          SHA-512:DBB2A6EE6A51D8B3CC327BF5624410471DFEDC9EE4E9A53963881C7AF2326CE1BF036D3C4D6ED35F226E654FCE905A1AE982A5E79A4921CFD553E427EDDF4197
          Malicious:false
          Preview:.PNG........IHDR..............T<.....bKGD.......C......pHYs.................tIME......5.}a.....IDATH...Q.. .....P...z-....aE[.....C..aj"I.. I.......p.LR.S....].3...._Jy...iT....,..6"....."....D......u.W'.f.ns/J...9.......9.....P.=...0....IEND.B`.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):290
          Entropy (8bit):6.630524120534146
          Encrypted:false
          SSDEEP:6:6v/lhPQiCtldE/6TDAgFyoDgMkryphJ9ipZnpv14qlaWSNHRaPl/jp:6v/7oiidE/6Th/DgMsyp4pZnpvWq4ZI7
          MD5:089ED99675E574A5CEBBA2C5E395AB1E
          SHA1:B4BB865A7ECFFD8F6F2551D7D5C23AC6F9F3345F
          SHA-256:C1EC4222CF1B3AFAF5A160914C6DDB82794236D350683D9A282C9BC4541D1315
          SHA-512:F579BD9598F5616D20F9D6CC74D7D900415127FE5629574D76D24BADFA65104DFB5EA57574D584D8B9D10A93F4D76C5DD29B0803535CF6B5BC54A1EE1CC694DD
          Malicious:false
          Preview:.PNG........IHDR..............T<.....bKGD.......C......pHYs.................tIME.......}1/p....IDATH..... .....Y.!.Y.!.......$.x.EJ....PO...@-......k.'......s..=..V.?....4.....*.Z...[.@...v.V.P9y.s)3....6.....}...#".!.3._....J.Pk...Q.....P|-.$~M.f>....@5.#...hC....i....IEND.B`.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):225
          Entropy (8bit):6.103157225599965
          Encrypted:false
          SSDEEP:6:6v/lhPQiCtldE/6TBm/KQVqnrj6afHDxgsxDTDGp:6v/7oiidE/6TBxQYnKavDxDk
          MD5:8BA33E929EB0C016036968B6F137C5FA
          SHA1:B563D786BDDD6F1C30924DA25B71891696346E15
          SHA-256:BBCAC1632131B21D40C80FF9E14156D36366D2E7BB05EED584E9D448497152D5
          SHA-512:BA3A70757BD0DB308E689A56E2F359C4356C5A7DD9E2831F4162EA04381D4BBDBEF6335D97A2C55F588C7172E1C2EBF7A3BD481D30871F05E61EEA17246A958E
          Malicious:false
          Preview:.PNG........IHDR..............T<.....bKGD.......C......pHYs.................tIME.....28.......nIDATH.c`...`..8.H."??...b.6mb.%..,.b].q.F8....8.....?2..z..[BS.`...........~...Rl>.....'.R...../I.`........f.W......IEND.B`.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):225
          Entropy (8bit):6.103157225599965
          Encrypted:false
          SSDEEP:6:6v/lhPQiCtldE/6TBm/KQVqnrj6afHDxgsxDTDGp:6v/7oiidE/6TBxQYnKavDxDk
          MD5:8BA33E929EB0C016036968B6F137C5FA
          SHA1:B563D786BDDD6F1C30924DA25B71891696346E15
          SHA-256:BBCAC1632131B21D40C80FF9E14156D36366D2E7BB05EED584E9D448497152D5
          SHA-512:BA3A70757BD0DB308E689A56E2F359C4356C5A7DD9E2831F4162EA04381D4BBDBEF6335D97A2C55F588C7172E1C2EBF7A3BD481D30871F05E61EEA17246A958E
          Malicious:false
          Preview:.PNG........IHDR..............T<.....bKGD.......C......pHYs.................tIME.....28.......nIDATH.c`...`..8.H."??...b.6mb.%..,.b].q.F8....8.....?2..z..[BS.`...........~...Rl>.....'.R...../I.`........f.W......IEND.B`.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):219
          Entropy (8bit):6.15818596694562
          Encrypted:false
          SSDEEP:6:6v/lhPQiCtldE/6TDvvkriNhQ9+Xm9i8p:6v/7oiidE/6T7kriLQ9+29iu
          MD5:38375B1DD82D4BA1A3A8C12EEF4ADED6
          SHA1:DB968D4A666C0401ACBD2CF0535F8EF80316ECC9
          SHA-256:EAED9874836DAE7EA6C5D6BF914EBD34263880D745AD61D24D215767A4E355CF
          SHA-512:BB27752D979AFC1E6EE835DBD1A952800CB5A013C14EC70ABF213021A3532865F29888A95832A716FC557F9807F04504DA16D17D44B16A38EB513A020E079B2C
          Malicious:false
          Preview:.PNG........IHDR..............T<.....bKGD.......C......pHYs.................tIME.......|.EG...hIDATH......0..@Su.,......Y.%......w.S..1..`^.Xk....|0..............9..tw....vC.$+}....dy..qiK.....C..&.#.XD......IEND.B`.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):181
          Entropy (8bit):5.630088987541043
          Encrypted:false
          SSDEEP:3:yionv//thPlhltB2iCtlWatP2/uDlhlbpsPtjt/shkxTka9zNdDPEykUhOgSousz:6v/lhPQiCtldE/6TD8/shk5RNdVkUhdT
          MD5:9F400CA36F8629670FACD21639CDDC0D
          SHA1:00CC682A8332269B01DB832DB29CBED20E932558
          SHA-256:6D13E15F83B06A9758833E2CF47310479F7AB834EA06B310FEFB3BA859F1FCCC
          SHA-512:A84E4BAD25E401331A5B90F0D31C30E62A43B064289E89D3946B2DC06669C7543B6A9B49D8E28208A3644B684529AEA765078FB281F4EF1FFB6CA4254446FCA1
          Malicious:false
          Preview:.PNG........IHDR..............T<.....bKGD.......C......pHYs.................tIME......*.......BIDATH.c......:..(-F'.^11...Z8j....Z8.-d!.j!B..5-....Q.G-..`.wC.....G.N......IEND.B`.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):175
          Entropy (8bit):5.599077557708541
          Encrypted:false
          SSDEEP:3:yionv//thPlhltB2iCtlWatP2/uDlhlbrsjQwTHm7ZJ403Gl6hnXGhoQyeB1p:6v/lhPQiCtldE/6TBsjvT0J4OGghc/p
          MD5:A2C4802002BB61994FAABDA60334A695
          SHA1:0A2B6B0CEB09425080C5BA4B9CBDEF533CF69EBA
          SHA-256:A3B59DBC5A39D551455FF838E71B5820560CA3484C6411B9D69DF33D8113619C
          SHA-512:34E130EDC650C3DE6020F2D2B5DC1404B7AEE0105EB7E315C15C5AA61398D174377E9B6A2AECC55F79F54C04812B8745C6739A201539E291538979E6B024DA31
          Malicious:false
          Preview:.PNG........IHDR..............T<.....bKGD.......C......pHYs.................tIME.....03.q.I...<IDATH.....0..A..K0-K.....Q..~.......PROMU..AI..c........[.....(.e....IEND.B`.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):238
          Entropy (8bit):6.297913308756489
          Encrypted:false
          SSDEEP:6:6v/lhPQiCtldE/6TBHchRTZr4wt3IN0ZhTp:6v/7oiidE/6TBHchR9rU0F
          MD5:516172D0EBF941237CEF32FCEE8CDF43
          SHA1:6BEE117996C16C7413BE876DFC15978D14813091
          SHA-256:56E64EAF6349ECE08005E6F7299DE413ED00112D53518215D90690BE2B2A4F1A
          SHA-512:46477A58AA7E9EEAE29E1C1D826BF045422709B7C8F428985C617B366012C58121D4404523A75EFE77FC6D8E061A6BB209743D0A2AF81545898F51C8855728EC
          Malicious:false
          Preview:.PNG........IHDR..............T<.....bKGD.......C......pHYs.................tIME...../...8{...{IDATH..K.. .E........p/."..A.................w...3o...a~..Y...C.j..fv".f.>...U...Wkm..;.... ..SJ.C..$...H..~.OD2......3(.W.d..w....IEND.B`.
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PNG image data, 732 x 163, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):2979
          Entropy (8bit):7.447666176115625
          Encrypted:false
          SSDEEP:48:6/6E+6q1+9tMh8C+kjF0LDF2/agXHs2AHyDCX1XYuxNyuit:6SE9Chj+k8J2STHhNYUgt
          MD5:42622C4464EB34FDF6CD60909084D6D7
          SHA1:DE60493F4136C2FFA6B6790EA18284314C462669
          SHA-256:A23023C1667B85617BE637DB6A7FAE5C84992DE3F3A034D7644BCEFD6E75D328
          SHA-512:3F1C69080C6E1F5FEB11B2BC750023F592D6E02A515825642314228042935D868A257D204E6A8451688E1EAAF0D53DF15BBC79A84442B2AD0281155F39E48BCC
          Malicious:false
          Preview:.PNG........IHDR..............B.T....bKGD..............pHYs.................tIME.....#..M.....0IDATx...k.\e...g..Z%.@....T(...E...rK.&U....DcbB......1$....J..b.Hk.Di...]X.nK.K..,..&rq.3...evg.li.....~_v..w.f.g.....).r..Y..;.l....W?Q8..7...}..-..~....n..L.)EDL.6.L.......q...J......YV.,KMP.*..(.JQLJQL.D.8%.z..6b.n.u.h..M{.T.1T}7*.w#M....E..wS..H..tD5.R1_.o_...&p.w..-.T0k..7.X5-G..nT...jZ.4.D.UML3..B1.l(....H.In..:.D..7.x.$.1w4Z.Xw0N.?.@.N..}......3pW.=.].J...g.....$...P..F5........s+....6.e...C.....!W.M|..iDZ(F.0..L..hv.sk.g..m.w.Y..e...4..,.G.R....O...GJL...L......n............n............n............n............n............n....M....... p....7...... p....7...... p....7...... p....7...... p....7...... p....7............7............7............7............7............7............7.. p........7.. p........7.. p........7.. p........7.. p........7.. p........... p........... p........... p........... p........... p.......L......b..7M.q..K.X....l.c|-Y..X....
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:ASCII text, with very long lines (387), with CRLF line terminators
          Category:dropped
          Size (bytes):1196
          Entropy (8bit):5.309056977458643
          Encrypted:false
          SSDEEP:24:m4+4hD+m4ur9RJrKCg8/bF19pkOy9OkOTlK9YkLWbf:8+KQfJtJdWhRW
          MD5:5480AF870DB76DBE15D1D1B0C6EC6550
          SHA1:6240E8A285903506484420667E87752B9AFB35FE
          SHA-256:4D2180ED426F960CF8968FBA251DA9D1D7BD76F4D5A3C2339EAEA28FC764B76A
          SHA-512:1174C8CF80B8C15DB61E79565C3A58B2768793D0586BAA5968754C44B9E8AFFCEEE37C22BD7B5859CDA65C22705713B5747625C6B7A9E758270FF2BA60F4F036
          Malicious:false
          Preview:<Button xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation" xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml" Foreground="[AiWinUIBtnViewReadmeForegroundNormal]" Background="[AiWinUIBtnViewReadmeBackgroundNormal]" Width="253" Height="879" HorizontalContentAlignment="Left" VerticalContentAlignment="Bottom" Margin="61,32,0,0" VerticalAlignment="Top" Padding="0,0,0,0">...<Button.ContentTemplate>....<DataTemplate>.. <FontIcon Glyph="&#xE736;" FontSize="70" Margin="5,0,0,0" />.. </DataTemplate>...</Button.ContentTemplate>...<Button.Resources>....<ResourceDictionary>.....<SolidColorBrush x:Key="ButtonForegroundPointerOver" Color="[AiWinUIBtnViewReadmeForegroundPointerOver]"/>.....<SolidColorBrush x:Key="ButtonBackgroundPointerOver" Color="[AiWinUIBtnViewReadmeBackgroundPointerOver]"/>.....<SolidColorBrush x:Key="ButtonForegroundPressed" Color="[AiWinUIBtnViewReadmeForegroundPressed]"/>.....<SolidColorBrush x:Key="ButtonBackgroundPressed" Color="[AiWinUIBtnV
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:MS Windows icon resource - 2 icons, 48x48, 8 bits/pixel, 48x48, 32 bits/pixel
          Category:dropped
          Size (bytes):13430
          Entropy (8bit):4.460762662440214
          Encrypted:false
          SSDEEP:96:5Z9z9ATOwu8FjK/kIiZHFzzzzzzzzzzzzzzzzzzzzzzzzzzz8ACroD3xgp9sFoe7:d9ATOCNIiZHy3eM9sFoe1es6jqOMH
          MD5:3446EB64A3A4639003C0F6941A3254C6
          SHA1:D51159EE40B02A5EDB9B115E78CC132D6E35E00B
          SHA-256:CEA275DBB399BB7BDBB747511CF0316C699221D82EA075D65E4F5688B5EB4831
          SHA-512:2E019E66BB2EE3055CE3D066CAE2494B2E7EBCB500D4D4F71D0955D3D11F91371977BE94DB453A2CF43680A9E46ECDF2A53CBFE106A744D27B60AB944C753027
          Malicious:false
          Preview:......00..........&...00.... ..%......(...0...`...................................1...3...9...?...@...B...C!..C#..E%..H&..I(..K"..K,..M,..P/..T-..S2..P1..V6..V7..Y1..X9..a:..O*(.W. ._7!.]=!.Z<$.W3..d=$.b:).`<5.^A).`@$.cD*.dD(.hA(.lC*.lD+.fH..hH,.qI..vR,.lL0.oH4.jN6.hE;.vM1.oP4.lP:.lR=.qR6.zQ4.|S4.~U5.}Z5.pR8.sT8.pT<.wX<.qNA.pVA.|V@.u[D.{]A.~\M.~`D.{`I.~bH.zaM..W6..c?..cF..fG..eH..fN..dL..jM..lJ..kL..eS..nQ..nY..sZ..rU..uT..rZ..wY..p]..yZ..{]..~^..va..wd..y`...b..{f..|i...j...o...o...o...r...q...t...~...f...f...i...h...j...m...i...l...n...p...p...~...r...t...v...}...x...|.......q...s...t...u...w...y...~...}...................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 400x300, components 3
          Category:dropped
          Size (bytes):1728
          Entropy (8bit):0.9300953826985205
          Encrypted:false
          SSDEEP:3:nSullBbs1lQQp/yEDpeknmRmm8dmM0+Et3/llE//WmskX8n:3ll7QzDkmm8dmM0R3/lly/Wmsj
          MD5:EB93C0ABAE8A7DE7AE6DC3755B12C802
          SHA1:5E288B9AD93663887681F577B8129DCD9B988062
          SHA-256:EDA260871BBA09273B71A165DC8B4F254B186046AB383722DC2D8803FA698725
          SHA-512:6B1A9C98A16DC19D417FE7B6DB6B4698036CACB6570816B063341F489B56CDC54769C07337488AA68FA8D9B39FDCCF04C7DFB4C8EBE536ACDF3FA7DE1464BC85
          Malicious:false
          Preview:......JFIF.....d.d......Ducky.......d......Adobe.d.................................................................................................................................................,...............K.....................................................................................?..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):602432
          Entropy (8bit):6.469756311917561
          Encrypted:false
          SSDEEP:6144:2aFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOl4mN9ysU5p/s8g73W:jYL9HXVW0xOA+KlZC4v65ps8g73W
          MD5:FE647318C4CC7F18012BDF5F8F96C468
          SHA1:82E516C4247CA5EAC3365BF80120D8A1F30E3042
          SHA-256:AEC9F4CB37604C67C69FC0FEE1DC630DB016E1471212006ED787DD9432158E69
          SHA-512:2AB40A563FA4AFE48BA74067653A244BDD53F9C04CD3764F29C5F80349F68B2126C6442E0A75FFB3C207F8C9267D4FAE7B407CA7D1D5E31D729B84B0EDEA817C
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 1%, Browse
          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u..u..u.n.v..u.n.p...u...q..u...v..u...p...u.n.q..u.n.s..u.n.t..u..t...u.|...u.u..u....u.....u.w..u.Rich..u.........................PE..L....=.d.........."!...$.>...........Y.......P...............................0......c.....@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):602432
          Entropy (8bit):6.469756311917561
          Encrypted:false
          SSDEEP:6144:2aFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOl4mN9ysU5p/s8g73W:jYL9HXVW0xOA+KlZC4v65ps8g73W
          MD5:FE647318C4CC7F18012BDF5F8F96C468
          SHA1:82E516C4247CA5EAC3365BF80120D8A1F30E3042
          SHA-256:AEC9F4CB37604C67C69FC0FEE1DC630DB016E1471212006ED787DD9432158E69
          SHA-512:2AB40A563FA4AFE48BA74067653A244BDD53F9C04CD3764F29C5F80349F68B2126C6442E0A75FFB3C207F8C9267D4FAE7B407CA7D1D5E31D729B84B0EDEA817C
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 1%, Browse
          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u..u..u.n.v..u.n.p...u...q..u...v..u...p...u.n.q..u.n.s..u.n.t..u..t...u.|...u.u..u....u.....u.w..u.Rich..u.........................PE..L....=.d.........."!...$.>...........Y.......P...............................0......c.....@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):602432
          Entropy (8bit):6.469756311917561
          Encrypted:false
          SSDEEP:6144:2aFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOl4mN9ysU5p/s8g73W:jYL9HXVW0xOA+KlZC4v65ps8g73W
          MD5:FE647318C4CC7F18012BDF5F8F96C468
          SHA1:82E516C4247CA5EAC3365BF80120D8A1F30E3042
          SHA-256:AEC9F4CB37604C67C69FC0FEE1DC630DB016E1471212006ED787DD9432158E69
          SHA-512:2AB40A563FA4AFE48BA74067653A244BDD53F9C04CD3764F29C5F80349F68B2126C6442E0A75FFB3C207F8C9267D4FAE7B407CA7D1D5E31D729B84B0EDEA817C
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 1%, Browse
          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u..u..u.n.v..u.n.p...u...q..u...v..u...p...u.n.q..u.n.s..u.n.t..u..t...u.|...u.u..u....u.....u.w..u.Rich..u.........................PE..L....=.d.........."!...$.>...........Y.......P...............................0......c.....@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):602432
          Entropy (8bit):6.469756311917561
          Encrypted:false
          SSDEEP:6144:2aFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOl4mN9ysU5p/s8g73W:jYL9HXVW0xOA+KlZC4v65ps8g73W
          MD5:FE647318C4CC7F18012BDF5F8F96C468
          SHA1:82E516C4247CA5EAC3365BF80120D8A1F30E3042
          SHA-256:AEC9F4CB37604C67C69FC0FEE1DC630DB016E1471212006ED787DD9432158E69
          SHA-512:2AB40A563FA4AFE48BA74067653A244BDD53F9C04CD3764F29C5F80349F68B2126C6442E0A75FFB3C207F8C9267D4FAE7B407CA7D1D5E31D729B84B0EDEA817C
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 1%, Browse
          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u..u..u.n.v..u.n.p...u...q..u...v..u...p...u.n.q..u.n.s..u.n.t..u..t...u.|...u.u..u....u.....u.w..u.Rich..u.........................PE..L....=.d.........."!...$.>...........Y.......P...............................0......c.....@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):602432
          Entropy (8bit):6.469756311917561
          Encrypted:false
          SSDEEP:6144:2aFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOl4mN9ysU5p/s8g73W:jYL9HXVW0xOA+KlZC4v65ps8g73W
          MD5:FE647318C4CC7F18012BDF5F8F96C468
          SHA1:82E516C4247CA5EAC3365BF80120D8A1F30E3042
          SHA-256:AEC9F4CB37604C67C69FC0FEE1DC630DB016E1471212006ED787DD9432158E69
          SHA-512:2AB40A563FA4AFE48BA74067653A244BDD53F9C04CD3764F29C5F80349F68B2126C6442E0A75FFB3C207F8C9267D4FAE7B407CA7D1D5E31D729B84B0EDEA817C
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 1%, Browse
          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u..u..u.n.v..u.n.p...u...q..u...v..u...p...u.n.q..u.n.s..u.n.t..u..t...u.|...u.u..u....u.....u.w..u.Rich..u.........................PE..L....=.d.........."!...$.>...........Y.......P...............................0......c.....@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):602432
          Entropy (8bit):6.469756311917561
          Encrypted:false
          SSDEEP:6144:2aFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOl4mN9ysU5p/s8g73W:jYL9HXVW0xOA+KlZC4v65ps8g73W
          MD5:FE647318C4CC7F18012BDF5F8F96C468
          SHA1:82E516C4247CA5EAC3365BF80120D8A1F30E3042
          SHA-256:AEC9F4CB37604C67C69FC0FEE1DC630DB016E1471212006ED787DD9432158E69
          SHA-512:2AB40A563FA4AFE48BA74067653A244BDD53F9C04CD3764F29C5F80349F68B2126C6442E0A75FFB3C207F8C9267D4FAE7B407CA7D1D5E31D729B84B0EDEA817C
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 1%, Browse
          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u..u..u.n.v..u.n.p...u...q..u...v..u...p...u.n.q..u.n.s..u.n.t..u..t...u.|...u.u..u....u.....u.w..u.Rich..u.........................PE..L....=.d.........."!...$.>...........Y.......P...............................0......c.....@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):602432
          Entropy (8bit):6.469756311917561
          Encrypted:false
          SSDEEP:6144:2aFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOl4mN9ysU5p/s8g73W:jYL9HXVW0xOA+KlZC4v65ps8g73W
          MD5:FE647318C4CC7F18012BDF5F8F96C468
          SHA1:82E516C4247CA5EAC3365BF80120D8A1F30E3042
          SHA-256:AEC9F4CB37604C67C69FC0FEE1DC630DB016E1471212006ED787DD9432158E69
          SHA-512:2AB40A563FA4AFE48BA74067653A244BDD53F9C04CD3764F29C5F80349F68B2126C6442E0A75FFB3C207F8C9267D4FAE7B407CA7D1D5E31D729B84B0EDEA817C
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 1%, Browse
          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u..u..u.n.v..u.n.p...u...q..u...v..u...p...u.n.q..u.n.s..u.n.t..u..t...u.|...u.u..u....u.....u.w..u.Rich..u.........................PE..L....=.d.........."!...$.>...........Y.......P...............................0......c.....@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):602432
          Entropy (8bit):6.469756311917561
          Encrypted:false
          SSDEEP:6144:2aFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOl4mN9ysU5p/s8g73W:jYL9HXVW0xOA+KlZC4v65ps8g73W
          MD5:FE647318C4CC7F18012BDF5F8F96C468
          SHA1:82E516C4247CA5EAC3365BF80120D8A1F30E3042
          SHA-256:AEC9F4CB37604C67C69FC0FEE1DC630DB016E1471212006ED787DD9432158E69
          SHA-512:2AB40A563FA4AFE48BA74067653A244BDD53F9C04CD3764F29C5F80349F68B2126C6442E0A75FFB3C207F8C9267D4FAE7B407CA7D1D5E31D729B84B0EDEA817C
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 1%, Browse
          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u..u..u.n.v..u.n.p...u...q..u...v..u...p...u.n.q..u.n.s..u.n.t..u..t...u.|...u.u..u....u.....u.w..u.Rich..u.........................PE..L....=.d.........."!...$.>...........Y.......P...............................0......c.....@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):602432
          Entropy (8bit):6.469756311917561
          Encrypted:false
          SSDEEP:6144:2aFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOl4mN9ysU5p/s8g73W:jYL9HXVW0xOA+KlZC4v65ps8g73W
          MD5:FE647318C4CC7F18012BDF5F8F96C468
          SHA1:82E516C4247CA5EAC3365BF80120D8A1F30E3042
          SHA-256:AEC9F4CB37604C67C69FC0FEE1DC630DB016E1471212006ED787DD9432158E69
          SHA-512:2AB40A563FA4AFE48BA74067653A244BDD53F9C04CD3764F29C5F80349F68B2126C6442E0A75FFB3C207F8C9267D4FAE7B407CA7D1D5E31D729B84B0EDEA817C
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u..u..u.n.v..u.n.p...u...q..u...v..u...p...u.n.q..u.n.s..u.n.t..u..t...u.|...u.u..u....u.....u.w..u.Rich..u.........................PE..L....=.d.........."!...$.>...........Y.......P...............................0......c.....@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):602432
          Entropy (8bit):6.469756311917561
          Encrypted:false
          SSDEEP:6144:2aFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOl4mN9ysU5p/s8g73W:jYL9HXVW0xOA+KlZC4v65ps8g73W
          MD5:FE647318C4CC7F18012BDF5F8F96C468
          SHA1:82E516C4247CA5EAC3365BF80120D8A1F30E3042
          SHA-256:AEC9F4CB37604C67C69FC0FEE1DC630DB016E1471212006ED787DD9432158E69
          SHA-512:2AB40A563FA4AFE48BA74067653A244BDD53F9C04CD3764F29C5F80349F68B2126C6442E0A75FFB3C207F8C9267D4FAE7B407CA7D1D5E31D729B84B0EDEA817C
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u..u..u.n.v..u.n.p...u...q..u...v..u...p...u.n.q..u.n.s..u.n.t..u..t...u.|...u.u..u....u.....u.w..u.Rich..u.........................PE..L....=.d.........."!...$.>...........Y.......P...............................0......c.....@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
          Category:dropped
          Size (bytes):5038592
          Entropy (8bit):6.043058205786219
          Encrypted:false
          SSDEEP:49152:vVkDvLSkqdbEsuV+ebMh8w+/H8pF/bmlEyGjWvcP1xQ+X7TqVAMPLfQyim8kznsY:2Ll+Mn0WHl9VA2ic/
          MD5:11F7419009AF2874C4B0E4505D185D79
          SHA1:451D8D0470CEDB268619BA1E7AE78ADAE0EBA692
          SHA-256:AC24CCE72F82C3EBBE9E7E9B80004163B9EED54D30467ECE6157EE4061BEAC95
          SHA-512:1EABBBFDF579A93BBB055B973AA3321FC8DC8DA1A36FDE2BA9A4D58E5751DC106A4A1BBC4AD1F425C082702D6FBB821AA1078BC5ADC6B2AD1B5CE12A68058805
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e.D!...!...!...(.V.C...5..."...5...&...5...)...!......5...:...5... ...5...R...5.:. ...5... ...Rich!...................PE..d...p............." .........D...............................................`M.....'.M...`A........................................@.H.L&....I......@K.H.....I..............@M.....`J:.p.......................(....%..............@.......$.H......................text...4B.......D.................. ..`.wpp_sf.....`.......H.............. ..`.rdata...L*......N*.................@..@.data...hD...PI......*I.............@....pdata........I......2I.............@..@.didat.......0K.......J.............@....rsrc...H....@K.......J.............@..@.reloc.......@M.. ....L.............@..B........................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 936, Revision Number: {D50A0C29-3B68-4483-AA7D-3507B07E5BB7}, Number of Words: 0, Subject: Outlook, Author: Microsoft, Name of Creating Application: Outlook, Template: ;2052, Comments: Outlook , Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Thu Jan 25 08:08:36 2024, Number of Pages: 200
          Category:dropped
          Size (bytes):2433536
          Entropy (8bit):6.638454503752706
          Encrypted:false
          SSDEEP:49152:Fq1HIG/bDPk+q4S5a8g73MURx1RK/957Wf63h0emOb5+:0Z3c+XoURx1RK/TGO
          MD5:59945D0BDEB087624ECDFF3B6592ED76
          SHA1:60DBECA78E011734612FE6919B8BF1BBE9091FA7
          SHA-256:D25CC95B1755CA7A21DA15A465C939B3E357616EEF22C7E09A04FC05A74F5656
          SHA-512:02642FD05FC84F79EDE53CAD5930AE6B490B94630D92886FE917B95B649B462855204B6E5C0C7E9CBC71AB3FCCAD798283DEAA9DD001DA357BDFA035C2E25BA9
          Malicious:false
          Preview:......................>...................&...................................l...............l.......................Q...R...S...T...U...V...W...X...Y.......................................................................x...........................................................................................................................................................................................................................................................................................................g...............'...:........................................................................................... ...!..."...#...$...%...&...2...3...)...*...+...,...-......./...0...1.......6...4...5...8...7...9...F...;...R...<...=...>...?...@...A...B...C...D...E...J...G...H...I...O...K...L...M...N...f...P...Q...h...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...K...N.......i...j...k...........n...o...p...q...r...s...t...u...v...w...x...y...z...
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 936, Revision Number: {04B12AD4-B137-456D-BCD0-722D8223EA45}, Number of Words: 0, Subject: Outlook, Author: Microsoft, Name of Creating Application: Outlook, Template: x64;2052, Comments: Outlook , Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Thu Jan 25 08:08:37 2024, Number of Pages: 200
          Category:dropped
          Size (bytes):2433024
          Entropy (8bit):6.639512398922904
          Encrypted:false
          SSDEEP:49152:dd2HIG/bDPk+q4S5a8g73MURx1RK/957Wf63h0eROb5+:qZ3c+XoURx1RK/TxO
          MD5:0CB7467432057A4152A5E3A3F27308B5
          SHA1:444DA66255FA1FD6FE485BF24AE472E41539DC80
          SHA-256:A066F1CF41AFBA2A1C4297450A617B5D5586DE1EA45A66BB57DC71B18F0323DC
          SHA-512:83818BAFD9281C66F26D550D445AA41B8E386B617E76F25F35F5E7BCA47DF589B50AA79844B7D5B7EE48B7EF5AF69D27362A6ABA9EA45B2F1A4F1A25DDE99219
          Malicious:false
          Preview:......................>...................&...................................l...............l.......................Q...R...S...T...U...V...W...X...Y.......................................................................w...........................................................................................................................................................................................................................................................................................................g...............'...:........................................................................................... ...!..."...#...$...%...&...2...3...)...*...+...,...-......./...0...1.......6...4...5...8...7...9...F...;...R...<...=...>...?...@...A...B...C...D...E...J...G...H...I...O...K...L...M...N...f...P...Q...h...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...K...M.......i...j...k...........n...o...p...q...r...s...t...u...v...w...x...y...z...
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File Type:data
          Category:dropped
          Size (bytes):26456992
          Entropy (8bit):0.0
          Encrypted:false
          SSDEEP:3::
          MD5:953C79C8C8EBAC4AFAB0B219C482AF37
          SHA1:E23E00D8A8FCA118757EEB7B7FC724C626D4A4EF
          SHA-256:2F48B4ABD5FF29932084433321F5258150214537010EB8FF1D6F26DAEC310BE2
          SHA-512:55C0A747EBD895100EDFBCB7B397ABE2530F41CC6CCC5C7142139F69D4257375D27FA66B2D2CFC0650CA587A28718284D8F4B8920C068849DD555CDCFF00EDD2
          Malicious:false
          Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):7.795045015846563
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          File size:12'568'744 bytes
          MD5:fe41ba6e49587e644575cc3e63bbec57
          SHA1:b26bf2f22af8fbf59c84df1295c179e6ce9010dd
          SHA256:671d2ffc833e605aa7061ce6c43b83a180957ec3c004856fe837f00b7a0b78a1
          SHA512:fd7539764aebdeeac77abbf1ecc69cbb199b36bc39d1042a57d6bb4bba2e4d0aa7f4c1a49928448fb38fe5d6c9b11f75280653b786cf9e06618ad7e8cd6ebe56
          SSDEEP:196608:nomHVY0A5XNBnj0gAlYsju9Jx6+klDpEkq+EkqMMTQzTWryuLJq4TcAbI0lWhsCJ:51YT1nA+B9VklD6rhDMMTQzBCQ4TtbL4
          TLSH:FDC60131760AC43BEA6201B02A2D9ADF55287F361BB164C7A3DC3E6E18B55C31736E17
          File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........."...L...L...L...O...L...I.g.L...J...L.x.H...L.x.O...L.x.I...L...H...L...M...L...K...L...M.5.L...E...L.......L.......L...N...L
          Icon Hash:0000000000000000
          Entrypoint:0x5dd680
          Entrypoint Section:.text
          Digitally signed:true
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x649BFB69 [Wed Jun 28 09:20:41 2023 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:21314122cd4542a6b9b297f52a87acbe
          Signature Valid:true
          Signature Issuer:CN=Sectigo Public Code Signing CA EV R36, O=Sectigo Limited, C=GB
          Signature Validation Error:The operation completed successfully
          Error Number:0
          Not Before, Not After
          • 01/12/2023 01:00:00 01/12/2026 00:59:59
          Subject Chain
          • CN="Wuhan Xinquan Network Technology Co., Ltd.", O="Wuhan Xinquan Network Technology Co., Ltd.", S=Hubei Sheng, C=CN, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=CN, SERIALNUMBER=91420106MAD0H2746N
          Version:3
          Thumbprint MD5:907D0F7C940AD322B6B7ACAFC5A6A966
          Thumbprint SHA-1:B9E40721E1CCB4D291ADBE87B7064A25492DD883
          Thumbprint SHA-256:8D7A10A79F77D6A60181CC18AD6DF6D140DBF45D2F2996B38B4782B76897CDFA
          Serial:612B4F15A480E07172E30E8C3986E585
          Instruction
          call 00007F76853A419Fh
          jmp 00007F76853A39DFh
          mov ecx, dword ptr [ebp-0Ch]
          mov dword ptr fs:[00000000h], ecx
          pop ecx
          pop edi
          pop edi
          pop esi
          pop ebx
          mov esp, ebp
          pop ebp
          push ecx
          ret
          mov ecx, dword ptr [ebp-10h]
          xor ecx, ebp
          call 00007F76853A3032h
          jmp 00007F76853A3B42h
          push eax
          push dword ptr fs:[00000000h]
          lea eax, dword ptr [esp+0Ch]
          sub esp, dword ptr [esp+0Ch]
          push ebx
          push esi
          push edi
          mov dword ptr [eax], ebp
          mov ebp, eax
          mov eax, dword ptr [006F8024h]
          xor eax, ebp
          push eax
          push dword ptr [ebp-04h]
          mov dword ptr [ebp-04h], FFFFFFFFh
          lea eax, dword ptr [ebp-0Ch]
          mov dword ptr fs:[00000000h], eax
          ret
          push eax
          push dword ptr fs:[00000000h]
          lea eax, dword ptr [esp+0Ch]
          sub esp, dword ptr [esp+0Ch]
          push ebx
          push esi
          push edi
          mov dword ptr [eax], ebp
          mov ebp, eax
          mov eax, dword ptr [006F8024h]
          xor eax, ebp
          push eax
          mov dword ptr [ebp-10h], eax
          push dword ptr [ebp-04h]
          mov dword ptr [ebp-04h], FFFFFFFFh
          lea eax, dword ptr [ebp-0Ch]
          mov dword ptr fs:[00000000h], eax
          ret
          push eax
          push dword ptr fs:[00000000h]
          lea eax, dword ptr [esp+0Ch]
          sub esp, dword ptr [esp+0Ch]
          push ebx
          push esi
          push edi
          mov dword ptr [eax], ebp
          mov ebp, eax
          mov eax, dword ptr [006F8024h]
          xor eax, ebp
          push eax
          mov dword ptr [ebp-10h], esp
          push dword ptr [ebp-04h]
          mov dword ptr [ebp-04h], FFFFFFFFh
          lea eax, dword ptr [ebp-0Ch]
          mov dword ptr fs:[00000000h], eax
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x2f6af40x28.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x3060000x268b0.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0xbf9b080x2da0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x32d0000x289b4.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x299dd00x70.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x299e400x18.rdata
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x26ad600x40.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x2690000x2ec.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x2f3e600x280.rdata
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x2671460x2672006cac8d1588a080830b52f21bb525e452unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x2690000x8ebfa0x8ec0045fa3832446dcd9690871301a1cbc035False0.3130609676007005data4.600804924708828IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x2f80000xd2200x3c00becc499adcd980ba70741cca33175eddFalse0.26588541666666665data4.791177624051412IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x3060000x268b00x26a0081affad27b81a3f0e40025c184c0059fFalse0.1552639563106796data5.8728594707925215IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x32d0000x289b40x28a00ed23f6d2dd1b38ddaab7384a2b0a9ca6False0.44384615384615383data6.513442265686413IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_BITMAP0x3068e00x13eDevice independent bitmap graphic, 32 x 16 x 4, image size 258, resolution 2834 x 2834 px/m, 5 important colorsChineseChina0.25471698113207547
          RT_BITMAP0x306a200x828Device independent bitmap graphic, 32 x 16 x 32, image size 0ChineseChina0.03017241379310345
          RT_BITMAP0x3072480x48a8Device independent bitmap graphic, 290 x 16 x 32, image size 0ChineseChina0.11881720430107527
          RT_BITMAP0x30baf00xa6aDevice independent bitmap graphic, 320 x 16 x 4, image size 2562, resolution 2834 x 2834 px/mChineseChina0.21680420105026257
          RT_BITMAP0x30c55c0x152Device independent bitmap graphic, 32 x 16 x 4, image size 258, resolution 2834 x 2834 px/m, 10 important colorsChineseChina0.5295857988165681
          RT_BITMAP0x30c6b00x828Device independent bitmap graphic, 32 x 16 x 32, image size 0ChineseChina0.4875478927203065
          RT_ICON0x30ced80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0, resolution 11811 x 11811 px/mChineseChina0.3041450165328295
          RT_ICON0x3111000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600ChineseChina0.08703319502074688
          RT_ICON0x3136a80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224ChineseChina0.16463414634146342
          RT_ICON0x3147500x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400ChineseChina0.18565573770491803
          RT_ICON0x3150d80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088ChineseChina0.3262411347517731
          RT_DIALOG0x3155400x84dataChineseChina0.75
          RT_DIALOG0x3155c40xb0dataChineseChina0.6988636363636364
          RT_DIALOG0x3156740x15cdataChineseChina0.5603448275862069
          RT_DIALOG0x3157d00xf0dataChineseChina0.6458333333333334
          RT_DIALOG0x3158c00x46dataChineseChina0.8571428571428571
          RT_STRING0x3159080xdedataChineseChina0.8558558558558559
          RT_STRING0x3159e80xe0dataChineseChina0.7008928571428571
          RT_STRING0x315ac80x3adataChineseChina0.7241379310344828
          RT_STRING0x315b040x6edataChineseChina0.4909090909090909
          RT_STRING0x315b740x182dataChineseChina0.727979274611399
          RT_STRING0x315cf80x25adataChineseChina0.7558139534883721
          RT_STRING0x315f540x240dataChineseChina0.5190972222222222
          RT_STRING0x3161940x7cdataChineseChina0.7661290322580645
          RT_STRING0x3162100x1c8dataChineseChina0.7850877192982456
          RT_STRING0x3163d80xd8dataChineseChina0.6712962962962963
          RT_STRING0x3164b00x86dataChineseChina0.9402985074626866
          RT_STRING0x3165380x146dataChineseChina0.5920245398773006
          RT_STRING0x3166800x30cdataChineseChina0.6051282051282051
          RT_STRING0x31698c0x2ecdataChineseChina0.6270053475935828
          RT_STRING0x316c780x11edataChineseChina0.7447552447552448
          RT_GROUP_ICON0x316d980x14dataChineseChina1.1
          RT_VERSION0x316dac0x2f8dataChineseChina0.4605263157894737
          RT_HTML0x3170a40x3835ASCII text, with very long lines (443), with CRLF line terminatorsChineseChina0.08298005420807561
          RT_HTML0x31a8dc0x12eaASCII text, with CRLF line terminatorsChineseChina0.18793886823626602
          RT_HTML0x31bbc80x50cbHTML document, ISO-8859 text, with very long lines (20366), with CRLF line terminatorsChineseChina0.11990523618430596
          RT_HTML0x320c940x4c2eHTML document, ISO-8859 text, with very long lines (15487), with CRLF line terminatorsChineseChina0.1352681776228079
          RT_HTML0x3258c40x534HTML document, ASCII text, with very long lines (1017), with CRLF line terminatorsChineseChina0.41516516516516516
          RT_HTML0x325df80xdc3HTML document, ASCII text, with very long lines (3250), with CRLF line terminatorsChineseChina0.24354243542435425
          RT_HTML0x326bbc0x1104HTML document, ASCII text, with very long lines (4083), with CRLF line terminatorsChineseChina0.21051423324150598
          RT_HTML0x327cc00x2050exported SGML document, ASCII text, with very long lines (659), with CRLF line terminatorsChineseChina0.13575918762088976
          RT_HTML0x329d100x238dHTML document, ASCII text, with very long lines (8812), with CRLF line terminatorsChineseChina0.15163168882540382
          RT_MANIFEST0x32c0a00x80fXML 1.0 document, ASCII text, with CRLF, LF line terminatorsChineseChina0.40814348036839554
          DLLImport
          KERNEL32.dllCreateFileW, CloseHandle, WriteFile, DeleteFileW, HeapDestroy, HeapSize, HeapReAlloc, HeapFree, HeapAlloc, GetProcessHeap, SizeofResource, LockResource, LoadResource, FindResourceW, FindResourceExW, CreateEventExW, WaitForSingleObject, CreateProcessW, GetLastError, GetExitCodeProcess, SetEvent, RemoveDirectoryW, GetProcAddress, GetModuleHandleW, GetWindowsDirectoryW, CreateDirectoryW, GetTempPathW, GetTempFileNameW, MoveFileW, EnterCriticalSection, LeaveCriticalSection, GetModuleFileNameW, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, GetCurrentThreadId, RaiseException, SetLastError, GlobalUnlock, GlobalLock, GlobalAlloc, MulDiv, lstrcmpW, CreateEventW, FindClose, FindFirstFileW, GetFullPathNameW, InitializeCriticalSection, lstrcpynW, CreateThread, LoadLibraryExW, GetCurrentProcess, Sleep, WideCharToMultiByte, GetDiskFreeSpaceExW, DecodePointer, GetExitCodeThread, GetCurrentProcessId, FreeLibrary, GetSystemDirectoryW, lstrlenW, VerifyVersionInfoW, VerSetConditionMask, lstrcmpiW, LoadLibraryW, GetDriveTypeW, CompareStringW, FindNextFileW, GetLogicalDriveStringsW, GetFileSize, GetFileAttributesW, GetShortPathNameW, GetFinalPathNameByHandleW, SetFileAttributesW, GetFileTime, CopyFileW, ReadFile, SetFilePointer, SetFileTime, SystemTimeToFileTime, MultiByteToWideChar, GetSystemInfo, WaitForMultipleObjects, GetVersionExW, VirtualProtect, VirtualQuery, LoadLibraryExA, GetStringTypeW, LocalFree, LocalAlloc, SetUnhandledExceptionFilter, FileTimeToSystemTime, GetEnvironmentVariableW, GetSystemTime, GetDateFormatW, GetTimeFormatW, GetLocaleInfoW, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, FormatMessageW, GetEnvironmentStringsW, InitializeCriticalSectionEx, LoadLibraryA, GetModuleFileNameA, GetCurrentThread, GetConsoleOutputCP, FlushFileBuffers, Wow64DisableWow64FsRedirection, Wow64RevertWow64FsRedirection, IsWow64Process, SetConsoleTextAttribute, GetStdHandle, GetConsoleScreenBufferInfo, OutputDebugStringW, GetTickCount, GetCommandLineW, SetCurrentDirectoryW, SetEndOfFile, EnumResourceLanguagesW, GetSystemDefaultLangID, GetUserDefaultLangID, GetLocalTime, ResetEvent, GlobalFree, GetPrivateProfileStringW, GetPrivateProfileSectionNamesW, WritePrivateProfileStringW, CreateNamedPipeW, ConnectNamedPipe, TerminateThread, CompareFileTime, CopyFileExW, OpenEventW, PeekNamedPipe, WaitForSingleObjectEx, QueryPerformanceCounter, QueryPerformanceFrequency, EncodePointer, LCMapStringEx, CompareStringEx, GetCPInfo, GetSystemTimeAsFileTime, IsDebuggerPresent, InitializeSListHead, InterlockedPopEntrySList, InterlockedPushEntrySList, FlushInstructionCache, IsProcessorFeaturePresent, VirtualAlloc, VirtualFree, UnhandledExceptionFilter, TerminateProcess, GetStartupInfoW, RtlUnwind, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, ExitThread, FreeLibraryAndExitThread, GetModuleHandleExW, ExitProcess, GetFileType, LCMapStringW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetTimeZoneInformation, GetConsoleMode, GetFileSizeEx, SetFilePointerEx, FindFirstFileExW, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, ReadConsoleW, WriteConsoleW, GetProcessAffinityMask, GetModuleHandleA, GlobalMemoryStatus, ReleaseSemaphore, CreateSemaphoreW
          Language of compilation systemCountry where language is spokenMap
          ChineseChina
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:05:27:00
          Start date:31/08/2024
          Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72635636.21001.25815.exe"
          Imagebase:0xe80000
          File size:12'568'744 bytes
          MD5 hash:FE41BA6E49587E644575CC3E63BBEC57
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:2
          Start time:05:27:01
          Start date:31/08/2024
          Path:C:\Windows\System32\msiexec.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\msiexec.exe /V
          Imagebase:0x7ff618720000
          File size:69'632 bytes
          MD5 hash:E5DA170027542E25EDE42FC54C929077
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          Target ID:3
          Start time:05:27:02
          Start date:31/08/2024
          Path:C:\Windows\SysWOW64\msiexec.exe
          Wow64 process (32bit):true
          Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 0E4E2BFC58A5D03AC826880BF5326FF0 C
          Imagebase:0x3a0000
          File size:59'904 bytes
          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          Reset < >

            Execution Graph

            Execution Coverage:5.7%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:24.4%
            Total number of Nodes:1173
            Total number of Limit Nodes:67
            execution_graph 55117 e99e81 55125 ea3d50 55117->55125 55119 e99f2c GetWindowLongW CallWindowProcW 55121 e99f60 GetWindowLongW 55119->55121 55123 e99f7b 55119->55123 55120 e99f16 CallWindowProcW 55120->55123 55122 e99f6d SetWindowLongW 55121->55122 55121->55123 55122->55123 55126 ea3d8d 55125->55126 55135 ea3da4 55125->55135 55127 ea3db7 55126->55127 55128 ea3d97 55126->55128 55129 ea3dbc BeginPaint 55127->55129 55127->55135 55136 ea4650 55128->55136 55156 ea4100 55129->55156 55133 e99f07 55133->55119 55133->55120 55133->55123 55149 105cb75 55135->55149 55137 ea4699 EnterCriticalSection 55136->55137 55138 ea468e InitializeCriticalSection 55136->55138 55168 1066f2b 55137->55168 55138->55137 55140 ea46ae 55141 ea46d5 55140->55141 55171 ea43c0 InitializeCriticalSection EnterCriticalSection 55140->55171 55142 ea46df KillTimer 55141->55142 55146 ea46f3 55141->55146 55144 ea4100 18 API calls 55142->55144 55148 ea46f1 55144->55148 55145 ea4100 18 API calls 55147 ea474d SetTimer 55145->55147 55146->55145 55147->55148 55148->55135 55150 105cb7d 55149->55150 55151 105cb7e IsProcessorFeaturePresent 55149->55151 55150->55133 55153 105d27f 55151->55153 55172 105d242 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 55153->55172 55155 105d362 55155->55133 55157 ea415c GetDC 55156->55157 55159 ea438d ReleaseDC 55157->55159 55160 ea4185 55157->55160 55162 105cb75 _ValidateLocalCookies 5 API calls 55159->55162 55173 ea1e40 CreateCompatibleDC CreateCompatibleBitmap SelectObject SetViewportOrgEx 55160->55173 55163 ea3df3 EndPaint 55162->55163 55163->55135 55164 ea4192 GetParent SendMessageW FillRect 55165 ea41d5 55164->55165 55174 ea1d90 BitBlt SelectObject DeleteObject DeleteDC 55165->55174 55167 ea438a 55167->55159 55169 1066f42 QueryPerformanceCounter 55168->55169 55170 1066f50 55168->55170 55169->55170 55170->55140 55171->55141 55172->55155 55173->55164 55174->55167 55175 e8abc0 55176 e8ac04 55175->55176 55177 e8abcc 55175->55177 55177->55176 55179 e8a9b0 55177->55179 55180 e8a9bd 55179->55180 55183 105e8fa 55180->55183 55182 e8a9ca RtlAllocateHeap 55182->55176 55184 105e914 55183->55184 55185 105e941 RaiseException 55183->55185 55184->55185 55185->55182 55186 f8e390 55187 f8e3c7 55186->55187 55193 f8e407 55186->55193 55194 105d07e EnterCriticalSection 55187->55194 55189 f8e3d1 55189->55193 55198 105cf35 41 API calls 55189->55198 55191 f8e3f3 55199 105d034 EnterCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 55191->55199 55197 105d092 55194->55197 55195 105d097 55195->55189 55197->55195 55200 105d106 SleepConditionVariableCS WaitForSingleObjectEx EnterCriticalSection 55197->55200 55198->55191 55199->55193 55200->55197 55201 f9da70 55202 f9dabb 55201->55202 55205 f9daa8 55201->55205 55209 f8d280 43 API calls 4 library calls 55202->55209 55204 f9dac5 55210 e88960 55204->55210 55207 105cb75 _ValidateLocalCookies 5 API calls 55205->55207 55208 f9db0a 55207->55208 55209->55204 55211 e8898d 55210->55211 55212 e889ae std::ios_base::_Ios_base_dtor 55210->55212 55211->55205 55211->55210 55211->55212 55214 1061fff 55211->55214 55212->55205 55219 1061f3b 38 API calls __cftof 55214->55219 55216 106200e 55220 106201c 11 API calls std::locale::_Setgloballocale 55216->55220 55218 106201b 55219->55216 55220->55218 55221 105a0cc 55247 1059e2a 55221->55247 55223 105a0dc 55224 105a139 55223->55224 55228 105a15d 55223->55228 55256 105a06a 6 API calls 3 library calls 55224->55256 55226 105a144 RaiseException 55242 105a332 55226->55242 55227 105a248 55232 105a304 55227->55232 55234 105a2a6 GetProcAddress 55227->55234 55228->55227 55229 105a1d5 LoadLibraryExA 55228->55229 55230 105a236 55228->55230 55228->55232 55229->55230 55231 105a1e8 GetLastError 55229->55231 55230->55227 55235 105a241 FreeLibrary 55230->55235 55233 105a211 55231->55233 55244 105a1fb 55231->55244 55259 105a06a 6 API calls 3 library calls 55232->55259 55257 105a06a 6 API calls 3 library calls 55233->55257 55234->55232 55237 105a2b6 GetLastError 55234->55237 55235->55227 55239 105a2c9 55237->55239 55238 105a21c RaiseException 55238->55242 55239->55232 55258 105a06a 6 API calls 3 library calls 55239->55258 55243 105a2ea RaiseException 55245 1059e2a DloadAcquireSectionWriteAccess 6 API calls 55243->55245 55244->55230 55244->55233 55246 105a301 55245->55246 55246->55232 55248 1059e36 55247->55248 55249 1059e5c 55247->55249 55260 1059ed3 GetModuleHandleW GetProcAddress GetProcAddress DloadAcquireSectionWriteAccess 55248->55260 55249->55223 55251 1059e3b 55252 1059e57 55251->55252 55261 1059ffc VirtualQuery GetSystemInfo VirtualProtect DloadProtectSection 55251->55261 55262 1059e5d GetModuleHandleW GetProcAddress GetProcAddress 55252->55262 55255 105a0a5 55255->55223 55256->55226 55257->55238 55258->55243 55259->55242 55260->55251 55261->55252 55262->55255 55263 ea4480 55264 ea44c0 55263->55264 55265 ea44e9 InitializeCriticalSection 55264->55265 55266 ea44f4 EnterCriticalSection 55264->55266 55267 ea4533 55264->55267 55265->55266 55266->55267 55268 ea4510 55266->55268 55269 1066f2b QueryPerformanceCounter 55268->55269 55270 ea4515 SetTimer 55269->55270 55270->55267 55271 ea3e40 55272 ea3e7e KillTimer 55271->55272 55273 ea3eb2 55271->55273 55281 105c787 DecodePointer LoadLibraryExA DecodePointer GetProcAddress EncodePointer 55272->55281 55275 ea3ed2 DeleteCriticalSection 55273->55275 55279 ea3ed9 std::ios_base::_Ios_base_dtor 55273->55279 55275->55279 55276 ea3e8f GetWindowLongW 55276->55273 55277 ea3ea0 SetWindowLongW 55276->55277 55277->55273 55278 ea3f28 std::ios_base::_Ios_base_dtor 55279->55278 55282 105c7ce 10 API calls 55279->55282 55281->55276 55282->55278 55283 fa87f0 55327 fa6db0 39 API calls 55283->55327 55285 fa882f 55328 eb2880 39 API calls 55285->55328 55287 fa8847 55329 e89dd0 55287->55329 55290 e88960 38 API calls 55291 fa886f 55290->55291 55293 fa8ad8 55291->55293 55298 fa88a9 std::ios_base::_Ios_base_dtor std::locale::_Setgloballocale 55291->55298 55292 fa8932 55294 fa8959 55292->55294 55295 fa893f 55292->55295 55296 1061fff std::_Throw_Cpp_error 38 API calls 55293->55296 55333 fb1850 55294->55333 55371 fb30c0 94 API calls 5 library calls 55295->55371 55299 fa8add 55296->55299 55298->55292 55365 e99ad0 50 API calls 55298->55365 55303 1061fff std::_Throw_Cpp_error 38 API calls 55299->55303 55300 fa896a 55372 e88300 55300->55372 55307 fa8ae2 55303->55307 55305 fa8903 55366 e881d0 55305->55366 55306 fa8956 55306->55294 55309 e88300 39 API calls 55307->55309 55308 fa89a1 55382 fa6db0 39 API calls 55308->55382 55311 fa8b49 55309->55311 55384 105e7d5 55311->55384 55312 fa89b5 55383 faf6d0 57 API calls 5 library calls 55312->55383 55318 fa8a6f std::ios_base::_Ios_base_dtor 55321 e88960 38 API calls 55318->55321 55319 fa8b6b 55320 fa89d5 std::ios_base::_Ios_base_dtor 55320->55299 55320->55318 55322 fa8aa5 55321->55322 55323 e88960 38 API calls 55322->55323 55324 fa8ab7 55323->55324 55325 105cb75 _ValidateLocalCookies 5 API calls 55324->55325 55326 fa8ad2 55325->55326 55327->55285 55328->55287 55330 e89e10 55329->55330 55330->55330 55331 e881d0 39 API calls 55330->55331 55332 e89e2a 55331->55332 55332->55290 55399 e88850 55333->55399 55335 fb18f9 std::locale::_Setgloballocale 55336 fb192a LoadStringW 55335->55336 55337 fb195d 55336->55337 55345 fb1a10 std::locale::_Setgloballocale 55336->55345 55338 e88300 39 API calls 55337->55338 55340 fb197e 55338->55340 55339 fb1a65 LoadStringW 55341 fb1a7c 55339->55341 55339->55345 55344 e88960 38 API calls 55340->55344 55355 fb1990 std::ios_base::_Ios_base_dtor 55340->55355 55342 e88300 39 API calls 55341->55342 55346 fb1a9d 55342->55346 55344->55355 55345->55339 55416 fb1c50 40 API calls 2 library calls 55345->55416 55349 e88960 38 API calls 55346->55349 55346->55355 55347 fb1b59 std::ios_base::_Ios_base_dtor 55350 105cb75 _ValidateLocalCookies 5 API calls 55347->55350 55348 fb1b98 55351 1061fff std::_Throw_Cpp_error 38 API calls 55348->55351 55349->55355 55352 fb1b91 55350->55352 55353 fb1b9d 55351->55353 55352->55300 55354 fb1c3e 55353->55354 55357 fb1bd9 SysFreeString 55353->55357 55358 fb1c21 SysAllocStringLen 55353->55358 55356 e8a9b0 2 API calls 55354->55356 55355->55347 55355->55348 55360 fb1c48 55356->55360 55363 105cb75 _ValidateLocalCookies 5 API calls 55357->55363 55358->55357 55359 fb1c34 55358->55359 55361 e8a9b0 2 API calls 55359->55361 55361->55354 55364 fb1c1d 55363->55364 55364->55300 55365->55305 55367 e88217 55366->55367 55370 e881e3 std::_Locinfo::_Locinfo_ctor 55366->55370 55427 e880a0 39 API calls 3 library calls 55367->55427 55369 e88228 55369->55292 55370->55292 55371->55306 55373 e8838e 55372->55373 55377 e88310 55372->55377 55428 e888b0 39 API calls std::_Throw_Cpp_error 55373->55428 55375 e8831d std::_Locinfo::_Locinfo_ctor 55375->55308 55377->55375 55378 e88850 39 API calls 55377->55378 55381 e88365 std::_Locinfo::_Locinfo_ctor 55378->55381 55381->55308 55382->55312 55383->55320 55429 105e7e3 55384->55429 55386 105e7da 55387 fa8b5c 55386->55387 55445 107628e EnterCriticalSection std::locale::_Setgloballocale 55386->55445 55398 fb30c0 94 API calls 5 library calls 55387->55398 55389 1066690 55390 106669b 55389->55390 55446 10762d3 38 API calls 7 library calls 55389->55446 55392 10666a5 IsProcessorFeaturePresent 55390->55392 55397 10666c4 55390->55397 55393 10666b1 55392->55393 55447 1061df3 8 API calls 2 library calls 55393->55447 55396 10666ce 55448 106842b 15 API calls std::locale::_Setgloballocale 55397->55448 55398->55319 55400 e88896 55399->55400 55401 e8885b 55399->55401 55400->55335 55424 e88830 39 API calls 3 library calls 55400->55424 55402 e88864 55401->55402 55403 e88886 55401->55403 55402->55400 55406 e8886b 55402->55406 55403->55400 55407 e8888a 55403->55407 55405 e88871 55408 1061fff std::_Throw_Cpp_error 38 API calls 55405->55408 55413 e8887a 55405->55413 55409 105cbb4 std::_Facet_Register 2 API calls 55406->55409 55417 105cbb4 55407->55417 55412 e888a5 55408->55412 55409->55405 55425 105a5b1 39 API calls 2 library calls 55412->55425 55413->55335 55416->55345 55418 105cbb9 std::_Locinfo::_Locinfo_ctor 55417->55418 55419 e88890 55418->55419 55421 105cbd5 std::_Facet_Register 55418->55421 55426 1072253 EnterCriticalSection std::_Facet_Register 55418->55426 55419->55335 55422 105e8fa Concurrency::cancel_current_task RaiseException 55421->55422 55423 105da10 55422->55423 55424->55405 55426->55418 55427->55369 55430 105e7ec 55429->55430 55431 105e7ef GetLastError 55429->55431 55430->55386 55449 10619cd 6 API calls ___vcrt_FlsGetValue 55431->55449 55433 105e804 55434 105e823 55433->55434 55435 105e869 SetLastError 55433->55435 55450 1061a08 6 API calls ___vcrt_FlsGetValue 55433->55450 55434->55435 55435->55386 55437 105e81d 55437->55434 55438 105e827 55437->55438 55451 106f75e 12 API calls 2 library calls 55438->55451 55445->55389 55446->55390 55447->55397 55448->55396 55449->55433 55450->55437 55452 ea3d00 55455 fb96e0 55452->55455 55454 ea3d14 55456 fb972a 55455->55456 55457 fb9716 55455->55457 55473 e8acf0 55456->55473 55457->55454 55459 fb990a 55460 e8a9b0 2 API calls 55459->55460 55461 fb9914 55460->55461 55463 fb972f 55463->55459 55465 e8acf0 50 API calls 55463->55465 55468 fb97ef GetActiveWindow 55463->55468 55470 fb983f SetForegroundWindow 55463->55470 55471 fb98ce 55463->55471 55488 fb9920 70 API calls 55463->55488 55489 e8a830 40 API calls 4 library calls 55463->55489 55490 f4b680 LoadStringW LoadStringW 55463->55490 55491 fdbc30 55463->55491 55501 e8a2a0 55463->55501 55516 e8a830 40 API calls 4 library calls 55463->55516 55465->55463 55468->55463 55470->55463 55471->55454 55474 e8ad28 55473->55474 55486 e8ad7c 55473->55486 55475 105d07e 4 API calls 55474->55475 55476 e8ad32 55475->55476 55478 e8ad3e GetProcessHeap 55476->55478 55476->55486 55477 105d07e 4 API calls 55479 e8ad96 55477->55479 55517 105cf35 41 API calls 55478->55517 55487 e8ae07 55479->55487 55519 105cf35 41 API calls 55479->55519 55482 e8ad6b 55518 105d034 EnterCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 55482->55518 55483 e8adf6 55520 105d034 EnterCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 55483->55520 55486->55477 55486->55487 55487->55463 55488->55463 55489->55463 55490->55463 55492 fdbd7a 55491->55492 55497 fdbc55 55491->55497 55493 105cb75 _ValidateLocalCookies 5 API calls 55492->55493 55494 fdbd8d 55493->55494 55494->55463 55495 fdbcf1 GetDiskFreeSpaceExW 55496 fdbd4f 55495->55496 55495->55497 55496->55492 55498 fdbd63 55496->55498 55497->55492 55497->55495 55499 105cb75 _ValidateLocalCookies 5 API calls 55498->55499 55500 fdbd76 55499->55500 55500->55463 55521 e8a0a0 55501->55521 55504 e8a332 55504->55463 55505 e8a2b6 FindResourceW 55505->55504 55506 e8a2cd 55505->55506 55528 e8a160 LoadResource LockResource SizeofResource 55506->55528 55508 e8a2d7 55508->55504 55509 e8a2fe 55508->55509 55529 e8a7c0 40 API calls 55508->55529 55530 1066607 38 API calls 3 library calls 55509->55530 55512 e8a30e 55513 e8a31e 55512->55513 55514 e8a9b0 2 API calls 55512->55514 55513->55463 55515 e8a344 55514->55515 55516->55468 55517->55482 55518->55486 55519->55483 55520->55487 55531 105c452 EnterCriticalSection 55521->55531 55523 e8a0f0 FindResourceExW 55526 e8a0d7 55523->55526 55525 105c452 4 API calls 55525->55526 55526->55523 55526->55525 55527 e8a125 55526->55527 55535 e8a160 LoadResource LockResource SizeofResource 55526->55535 55527->55504 55527->55505 55528->55508 55529->55509 55530->55512 55532 105c474 55531->55532 55533 105c46b 55531->55533 55532->55526 55533->55532 55536 105c42f RtlAllocateHeap EnterCriticalSection RaiseException 55533->55536 55535->55526 55536->55532 55537 eb46c0 55540 eb4700 55537->55540 55539 eb46e8 55541 eb4991 55540->55541 55542 eb4716 55540->55542 55541->55539 55543 eb474d 55542->55543 55544 eb4726 55542->55544 55546 eb477c 55543->55546 55547 eb4755 55543->55547 55585 f89320 55544->55585 55549 eb4788 55546->55549 55550 eb480c 55546->55550 55593 f89670 55547->55593 55561 eb47a1 55549->55561 55581 eb473b 55549->55581 55551 eb483b 55550->55551 55552 eb4814 55550->55552 55555 eb4863 55551->55555 55556 eb4840 55551->55556 55599 f88aa0 55552->55599 55553 eb48d3 55553->55539 55558 eb4888 55555->55558 55559 eb4868 55555->55559 55607 f88f40 82 API calls _ValidateLocalCookies 55556->55607 55565 eb48ad 55558->55565 55566 eb488d 55558->55566 55608 f89950 6 API calls _ValidateLocalCookies 55559->55608 55563 eb47ce 55561->55563 55564 eb47b5 CallWindowProcW 55561->55564 55562 eb490e 55562->55539 55563->55539 55564->55563 55569 eb48e0 55565->55569 55570 eb48b5 55565->55570 55609 f89c10 6 API calls _ValidateLocalCookies 55566->55609 55572 eb491f 55569->55572 55573 eb48e5 RedrawWindow 55569->55573 55610 f89ed0 5 API calls _ValidateLocalCookies 55570->55610 55574 eb493c 55572->55574 55575 eb4927 55572->55575 55573->55581 55576 eb496e 55574->55576 55577 eb4955 55574->55577 55574->55581 55612 f8a180 5 API calls _ValidateLocalCookies 55575->55612 55580 eb4978 55576->55580 55576->55581 55613 f8a180 5 API calls _ValidateLocalCookies 55577->55613 55614 f8a420 65 API calls _ValidateLocalCookies 55580->55614 55581->55553 55611 ea9430 NtdllDefWindowProc_W 55581->55611 55582 eb495f 55582->55539 55584 eb4982 55584->55539 55586 f89384 55585->55586 55587 f893e4 55586->55587 55588 f89399 TrackMouseEvent 55586->55588 55589 105cb75 _ValidateLocalCookies 5 API calls 55587->55589 55588->55587 55590 f893c7 55588->55590 55591 f89665 55589->55591 55592 f893d2 RedrawWindow 55590->55592 55591->55581 55592->55587 55594 f896c0 55593->55594 55595 f896fa 55594->55595 55597 f896e1 RedrawWindow 55594->55597 55596 105cb75 _ValidateLocalCookies 5 API calls 55595->55596 55598 f8971b 55596->55598 55597->55595 55598->55581 55600 f88af1 55599->55600 55606 f88b03 55600->55606 55615 e97210 55600->55615 55602 f88afc 55618 f88d70 GetWindowDC GetWindowRect 55602->55618 55603 105cb75 _ValidateLocalCookies 5 API calls 55604 f88b2b 55603->55604 55604->55581 55606->55603 55607->55581 55608->55581 55609->55581 55610->55581 55611->55562 55612->55581 55613->55582 55614->55584 55616 e9722d 55615->55616 55617 e97217 CallWindowProcW 55615->55617 55616->55602 55617->55602 55619 f88dd8 IsWindowEnabled 55618->55619 55620 f88dff GetFocus 55619->55620 55621 f88e20 55619->55621 55620->55621 55622 f88f1b 55621->55622 55623 f88f0d DeleteDC 55621->55623 55624 105cb75 _ValidateLocalCookies 5 API calls 55622->55624 55623->55622 55625 f88f35 55624->55625 55625->55606 55626 105d154 55627 105cbb4 std::_Facet_Register 2 API calls 55626->55627 55628 105d189 55627->55628 55629 f47540 IsWindow 55630 f47594 DestroyWindow 55629->55630 55631 f4759d 55629->55631 55630->55631 55632 e88960 38 API calls 55631->55632 55633 f475b3 55632->55633 55648 ebb1f0 39 API calls 2 library calls 55633->55648 55635 f475cc 55636 e88960 38 API calls 55635->55636 55637 f475d8 55636->55637 55638 e88960 38 API calls 55637->55638 55639 f475e4 55638->55639 55640 e88960 38 API calls 55639->55640 55641 f475f0 55640->55641 55642 e88960 38 API calls 55641->55642 55643 f475fb 55642->55643 55649 ef7760 50 API calls 55643->55649 55645 f47607 55646 f47633 55645->55646 55650 105c7ce 10 API calls 55645->55650 55648->55635 55649->55645 55650->55646 55651 f90480 55652 f904cc 55651->55652 55654 f906e7 55651->55654 55682 e91d80 39 API calls 2 library calls 55652->55682 55656 105cb75 _ValidateLocalCookies 5 API calls 55654->55656 55655 f904e0 55658 e8acf0 50 API calls 55655->55658 55657 f90769 55656->55657 55659 f904f6 55658->55659 55660 f9076d 55659->55660 55661 f90500 55659->55661 55662 e8a9b0 2 API calls 55660->55662 55664 f9051b 55661->55664 55666 f90529 55661->55666 55663 f90777 55662->55663 55665 e8a2a0 47 API calls 55664->55665 55668 f90527 55665->55668 55666->55666 55734 e8a830 40 API calls 4 library calls 55666->55734 55669 e88960 38 API calls 55668->55669 55670 f90559 CreateFileW 55669->55670 55671 f905a9 55670->55671 55672 f9058b CloseHandle 55670->55672 55683 ebe9e0 63 API calls 55671->55683 55672->55654 55674 f905b2 55684 f90780 55674->55684 55676 f905c5 WriteFile 55677 f905f5 55676->55677 55678 f9063b 55677->55678 55679 f9062d CloseHandle 55677->55679 55735 fa8e30 108 API calls _wcsrchr 55678->55735 55679->55678 55681 f90646 55681->55654 55682->55655 55683->55674 55685 e8acf0 50 API calls 55684->55685 55686 f907ba 55685->55686 55687 f9083e 55686->55687 55688 f907c0 55686->55688 55689 e8a9b0 2 API calls 55687->55689 55691 f9080b 55688->55691 55692 f907ee 55688->55692 55690 f90848 55689->55690 55736 fa97f0 55690->55736 55740 f92520 73 API calls 55691->55740 55739 f92520 73 API calls 55692->55739 55695 f90806 55695->55676 55697 f908a0 55741 e8a4e0 55697->55741 55699 f908ae 55700 f90910 55699->55700 55760 f90db0 78 API calls 2 library calls 55699->55760 55703 f90930 GetModuleHandleW 55700->55703 55702 f908c9 55761 ea2b70 55702->55761 55705 f90999 55703->55705 55706 f90964 55703->55706 55713 105d07e 4 API calls 55705->55713 55714 f909f1 55705->55714 55707 105d07e 4 API calls 55706->55707 55709 f9096e 55707->55709 55708 f908d6 MoveFileW 55712 fa97f0 10 API calls 55708->55712 55709->55705 55711 f9097a GetProcAddress 55709->55711 55770 105d034 EnterCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 55711->55770 55716 f90908 55712->55716 55717 f909c6 55713->55717 55718 105d07e 4 API calls 55714->55718 55729 f90a49 55714->55729 55716->55700 55719 f90c91 55716->55719 55717->55714 55720 f909d2 GetProcAddress 55717->55720 55721 f90a1e 55718->55721 55799 1068467 15 API calls std::locale::_Setgloballocale 55719->55799 55771 105d034 EnterCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 55720->55771 55724 f90a2a GetProcAddress 55721->55724 55721->55729 55772 105d034 EnterCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 55724->55772 55725 f90c9b 55728 f90c25 55798 f92180 11 API calls 55728->55798 55729->55728 55773 f664f0 GetSystemDirectoryW 55729->55773 55731 f90c31 55732 105cb75 _ValidateLocalCookies 5 API calls 55731->55732 55733 f90c89 55732->55733 55733->55676 55734->55668 55735->55681 55800 fa9830 55736->55800 55739->55695 55740->55695 55742 e8a4eb 55741->55742 55743 e8a4fa 55742->55743 55744 e8a59a 55742->55744 55754 e8a517 std::locale::_Setgloballocale 55742->55754 55743->55699 55817 e8a770 40 API calls 55744->55817 55746 e8a55d std::_Locinfo::_Locinfo_ctor 55746->55699 55747 e8a59f 55750 e8a4e0 40 API calls 55747->55750 55748 e8a53e 55813 106210f 11 API calls __Wcscoll 55748->55813 55752 e8a5d6 55750->55752 55751 e8a543 55814 1061fef 38 API calls __cftof 55751->55814 55752->55699 55754->55746 55754->55748 55756 e8a57f 55754->55756 55755 e8a54e 55755->55699 55756->55746 55815 106210f 11 API calls __Wcscoll 55756->55815 55758 e8a588 55816 1061fef 38 API calls __cftof 55758->55816 55760->55702 55762 ea2bd3 55761->55762 55763 ea2b86 55761->55763 55762->55708 55764 ea2bc0 55763->55764 55765 ea2b96 55763->55765 55818 e8a830 40 API calls 4 library calls 55764->55818 55767 e8a4e0 40 API calls 55765->55767 55769 ea2b9c 55767->55769 55768 ea2bcb 55768->55708 55769->55708 55770->55705 55771->55714 55772->55729 55774 f6653f 55773->55774 55797 f665fb 55773->55797 55776 e8acf0 50 API calls 55774->55776 55774->55797 55775 105cb75 _ValidateLocalCookies 5 API calls 55777 f6664b 55775->55777 55778 f6654f 55776->55778 55777->55729 55779 f66653 55778->55779 55780 f66559 55778->55780 55781 e8a9b0 2 API calls 55779->55781 55784 f66575 55780->55784 55785 f66583 55780->55785 55782 f6665d 55781->55782 55783 105cbb4 std::_Facet_Register 2 API calls 55782->55783 55786 f667b2 55783->55786 55787 e8a2a0 47 API calls 55784->55787 55819 e8a830 40 API calls 4 library calls 55785->55819 55903 e9f0f0 55786->55903 55789 f66581 55787->55789 55820 ea2290 55789->55820 55790 f667fa GetSysColor 55790->55729 55793 ea2290 123 API calls 55795 f665e9 55793->55795 55794 f665c2 55794->55793 55796 f665ff LoadLibraryExW 55795->55796 55795->55797 55796->55797 55797->55775 55798->55731 55799->55725 55801 fa9874 55800->55801 55812 fa986c 55800->55812 55802 fa9961 55801->55802 55807 fa98a4 std::locale::_Setgloballocale 55801->55807 55801->55812 55805 e8a9b0 2 API calls 55802->55805 55803 105cb75 _ValidateLocalCookies 5 API calls 55804 fa9818 55803->55804 55804->55697 55806 fa996b 55805->55806 55808 fa98c2 FindFirstFileW 55807->55808 55807->55812 55809 fa990e GetLastError 55808->55809 55810 fa98f1 55808->55810 55809->55810 55811 fa992b FindClose 55810->55811 55810->55812 55811->55812 55812->55803 55813->55751 55814->55755 55815->55758 55816->55746 55817->55747 55818->55768 55819->55789 55822 ea22b6 ___crtCompareStringW 55820->55822 55830 ea2321 std::_Locinfo::_Locinfo_ctor 55820->55830 55821 e8a9b0 2 API calls 55823 ea236c 55821->55823 55829 ea2300 std::locale::_Setgloballocale 55822->55829 55822->55830 55915 e8a7c0 40 API calls 55822->55915 55824 ea23db 55823->55824 55826 ea23ce FindClose 55823->55826 55918 e8a600 RtlAllocateHeap RaiseException 55824->55918 55826->55824 55828 ea234f 55828->55794 55829->55830 55916 106210f 11 API calls __Wcscoll 55829->55916 55830->55821 55830->55828 55832 ea23f7 55834 e8acf0 50 API calls 55832->55834 55833 ea233d 55917 1061fef 38 API calls __cftof 55833->55917 55839 ea2409 55834->55839 55836 ea27bc 55837 e8a9b0 2 API calls 55836->55837 55838 ea27c6 55837->55838 55840 e8a4e0 40 API calls 55838->55840 55839->55836 55841 ea2431 55839->55841 55844 ea243f 55839->55844 55842 ea280f 55840->55842 55843 e8a2a0 47 API calls 55841->55843 55846 ea2a0c 55842->55846 55848 ea2a30 55842->55848 55850 ea2845 55842->55850 55847 ea243d 55843->55847 55844->55844 55919 e8a830 40 API calls 4 library calls 55844->55919 55846->55794 55849 ea26ac 55847->55849 55852 ea2486 PathIsUNCW 55847->55852 55853 ea25d5 FindFirstFileW 55847->55853 55851 e8a9b0 2 API calls 55848->55851 55849->55794 55855 ea2862 55850->55855 55981 ea2c90 40 API calls 55850->55981 55856 ea2a3a 55851->55856 55857 ea249b 55852->55857 55858 ea2565 55852->55858 55853->55849 55854 ea25ed GetFullPathNameW 55853->55854 55861 ea2606 55854->55861 55902 ea2741 ___crtCompareStringW 55854->55902 55982 ea2be0 52 API calls 55855->55982 55920 e95b60 52 API calls 4 library calls 55857->55920 55974 e95b60 52 API calls 4 library calls 55858->55974 55864 ea2621 GetFullPathNameW 55861->55864 55976 e8a7c0 40 API calls 55861->55976 55863 ea2531 55863->55853 55890 ea2556 55863->55890 55870 ea263a ___crtCompareStringW 55864->55870 55866 ea286d 55869 ea2290 115 API calls 55866->55869 55867 e8a9b0 2 API calls 55867->55836 55871 ea2881 55869->55871 55872 ea26e6 55870->55872 55881 ea266e 55870->55881 55870->55902 55871->55846 55873 ea28b4 PathIsUNCW 55871->55873 55886 ea26f8 _wcsrchr 55872->55886 55977 e8a6b0 40 API calls 4 library calls 55872->55977 55875 ea28c8 55873->55875 55876 ea2997 55873->55876 55874 ea24a3 55874->55853 55921 e95f50 55874->55921 55983 e95b60 52 API calls 4 library calls 55875->55983 55984 e95b60 52 API calls 4 library calls 55876->55984 55882 ea26a4 SetLastError 55881->55882 55887 ea2697 FindClose 55881->55887 55882->55849 55884 ea251e 55888 ea2b70 40 API calls 55884->55888 55885 ea2718 _wcsrchr 55891 ea272b 55885->55891 55892 ea2745 55885->55892 55886->55885 55978 e8a6b0 40 API calls 4 library calls 55886->55978 55887->55882 55888->55863 55975 ea2a40 40 API calls 3 library calls 55890->55975 55894 ea2793 55891->55894 55891->55902 55979 e8a6b0 40 API calls 4 library calls 55891->55979 55892->55902 55980 e8a6b0 40 API calls 4 library calls 55892->55980 55893 ea28d0 55893->55846 55895 e95f50 108 API calls 55893->55895 55894->55849 55897 ea2951 55895->55897 55896 ea2963 55896->55846 55985 ea2a40 40 API calls 3 library calls 55896->55985 55901 ea2b70 40 API calls 55897->55901 55901->55896 55902->55867 55902->55894 55904 e9f10d 55903->55904 55910 e9f187 std::ios_base::_Ios_base_dtor 55903->55910 55905 e9f1cd 55904->55905 55906 e9f14b 55904->55906 55907 e9f124 55904->55907 55992 e88830 39 API calls 3 library calls 55905->55992 55909 e9f135 55906->55909 55913 105cbb4 std::_Facet_Register 2 API calls 55906->55913 55907->55905 55912 105cbb4 std::_Facet_Register 2 API calls 55907->55912 55909->55910 55914 1061fff std::_Throw_Cpp_error 38 API calls 55909->55914 55910->55790 55911 e9f1d2 55912->55909 55913->55909 55914->55905 55915->55829 55916->55833 55917->55830 55918->55832 55919->55847 55920->55874 55922 e960e0 55921->55922 55923 e95fa7 55921->55923 55924 e8a9b0 2 API calls 55922->55924 55925 e95ff9 55923->55925 55927 e95fc9 55923->55927 55926 e960ea 55924->55926 55929 e8acf0 50 API calls 55925->55929 55939 e9600b 55925->55939 55988 e8a770 40 API calls 55926->55988 55930 e8a4e0 40 API calls 55927->55930 55929->55939 55932 e95fd1 55930->55932 55931 e960ef 55933 e8a9b0 2 API calls 55931->55933 55932->55884 55934 e960f9 55933->55934 55935 e8a9b0 2 API calls 55934->55935 55936 e96103 55935->55936 55937 e9614a 55936->55937 55938 e961cd GetWindowTextLengthW 55936->55938 55940 e961af GetWindowLongW 55937->55940 55944 e96151 55937->55944 55945 e961f4 std::_Locinfo::_Locinfo_ctor 55938->55945 55939->55926 55939->55931 55939->55934 55943 e96033 55939->55943 55951 e961bc 55940->55951 55941 e96397 NtdllDefWindowProc_W 55955 e963b9 ___std_exception_destroy 55941->55955 55943->55934 55961 e96073 std::locale::_Setgloballocale 55943->55961 55944->55941 55947 e96172 GetWindowLongW 55944->55947 55950 e9623f GetWindowTextW SetWindowTextW 55945->55950 55945->55955 55946 105cb75 _ValidateLocalCookies 5 API calls 55948 e9640e 55946->55948 55947->55941 55949 e96188 GetWindowLongW SetWindowLongW NtdllDefWindowProc_W 55947->55949 55948->55884 55949->55955 55953 e9626d 55950->55953 55954 e96267 55950->55954 55951->55941 55952 e9608f std::_Locinfo::_Locinfo_ctor 55952->55884 55956 e962fb 55953->55956 55957 e96283 GlobalAlloc 55953->55957 55954->55953 55955->55946 55956->55955 55991 e96670 83 API calls 6 library calls 55956->55991 55957->55956 55958 e96293 GlobalLock 55957->55958 55968 e962a8 std::locale::_Setgloballocale 55958->55968 55961->55952 55986 106210f 11 API calls __Wcscoll 55961->55986 55962 e9632e 55964 e963a7 55962->55964 55971 e96347 SetWindowLongW 55962->55971 55963 e960b1 55987 1061fef 38 API calls __cftof 55963->55987 55964->55955 55967 e962cb 55990 1061fef 38 API calls __cftof 55967->55990 55970 e962ad std::_Locinfo::_Locinfo_ctor 55968->55970 55989 106210f 11 API calls __Wcscoll 55968->55989 55972 e962e1 GlobalUnlock 55970->55972 55973 e9635b ___std_exception_destroy 55971->55973 55972->55956 55973->55951 55974->55863 55975->55853 55976->55864 55977->55886 55978->55885 55979->55902 55980->55902 55981->55855 55982->55866 55983->55893 55984->55896 55985->55846 55986->55963 55987->55952 55988->55931 55989->55967 55990->55970 55991->55962 55992->55911 55993 e9fd90 55996 e9fdc0 55993->55996 55997 e9fdd3 55996->55997 56000 e9fdb1 55996->56000 55998 e9fddb 55997->55998 56001 e9fdff 55997->56001 56003 ea0c70 55998->56003 56001->56000 56002 e9fed1 CallWindowProcW 56001->56002 56002->56000 56004 ea0ca8 56003->56004 56005 ea0cba 56004->56005 56006 ea0cc6 BeginPaint GetClientRect 56004->56006 56009 105cb75 _ValidateLocalCookies 5 API calls 56005->56009 56016 ea1e40 CreateCompatibleDC CreateCompatibleBitmap SelectObject SetViewportOrgEx 56006->56016 56008 ea0d21 GetParent SendMessageW FillRect 56011 ea0d67 56008->56011 56010 ea0f1d 56009->56010 56010->56000 56014 ea0dc2 56011->56014 56017 ff5060 56011->56017 56021 ea1d90 BitBlt SelectObject DeleteObject DeleteDC 56014->56021 56015 ea0eda EndPaint 56015->56005 56016->56008 56018 ff50b4 56017->56018 56019 105cb75 _ValidateLocalCookies 5 API calls 56018->56019 56020 ff540a 56019->56020 56020->56014 56021->56015 56022 ea7030 56023 105cbb4 std::_Facet_Register 2 API calls 56022->56023 56024 ea7080 56023->56024 56061 ff6460 56024->56061 56026 ea70af std::locale::_Setgloballocale 56027 e8acf0 50 API calls 56026->56027 56028 ea71a3 56027->56028 56029 ea71ad 56028->56029 56030 ea72b7 56028->56030 56035 ea71c8 56029->56035 56036 ea71d6 56029->56036 56031 e8a9b0 2 API calls 56030->56031 56032 ea72c1 56031->56032 56071 f8aff0 56032->56071 56034 ea72ff 56040 e8acf0 50 API calls 56034->56040 56038 e8a2a0 47 API calls 56035->56038 56036->56036 56110 e8a830 40 API calls 4 library calls 56036->56110 56039 ea71d4 56038->56039 56042 ea2b70 40 API calls 56039->56042 56041 ea7320 56040->56041 56043 ea742a 56041->56043 56044 ea732a 56041->56044 56045 ea720d 56042->56045 56046 e8a9b0 2 API calls 56043->56046 56049 ea7348 56044->56049 56052 ea7356 56044->56052 56048 e88960 38 API calls 56045->56048 56047 ea7434 56046->56047 56053 ea723b 56048->56053 56051 e8a2a0 47 API calls 56049->56051 56056 ea7354 56051->56056 56052->56052 56111 e8a830 40 API calls 4 library calls 56052->56111 56054 105cb75 _ValidateLocalCookies 5 API calls 56053->56054 56055 ea72b3 56054->56055 56086 ea4cc0 56056->56086 56060 ea740f 56062 e8acf0 50 API calls 56061->56062 56063 ff64a8 56062->56063 56064 ff6578 56063->56064 56066 e8acf0 50 API calls 56063->56066 56065 e8a9b0 2 API calls 56064->56065 56069 ff6582 std::ios_base::_Ios_base_dtor 56065->56069 56067 ff652d 56066->56067 56067->56064 56068 ff6531 GetSysColor 56067->56068 56068->56026 56069->56026 56113 f47650 56071->56113 56074 e88300 39 API calls 56075 f8b077 56074->56075 56076 f8b0ba std::ios_base::_Ios_base_dtor 56075->56076 56078 f8b12a 56075->56078 56077 f8b0ee 56076->56077 56127 1067ebd 50 API calls __cftof 56076->56127 56080 e88960 38 API calls 56077->56080 56082 1061fff std::_Throw_Cpp_error 38 API calls 56078->56082 56081 f8b10c 56080->56081 56083 105cb75 _ValidateLocalCookies 5 API calls 56081->56083 56084 f8b12f 56082->56084 56085 f8b123 56083->56085 56084->56034 56085->56034 56087 ea4f4d 56086->56087 56088 ea4d13 56086->56088 56089 105cb75 _ValidateLocalCookies 5 API calls 56087->56089 56199 f55630 56088->56199 56090 ea4f64 56089->56090 56112 f55970 39 API calls 3 library calls 56090->56112 56094 ea4d35 56095 e88960 38 API calls 56094->56095 56096 ea4d59 56095->56096 56225 ff60c0 GetDC GetDeviceCaps 56096->56225 56098 ea4dcf 56099 ea4efe 56098->56099 56100 ea4df1 EqualRect 56098->56100 56101 ff4930 2 API calls 56099->56101 56100->56099 56108 ea4e07 56100->56108 56102 ea4ece 56101->56102 56103 ea4f3e 56102->56103 56105 ea4f6d 56102->56105 56104 e88960 38 API calls 56103->56104 56104->56087 56106 e8a9b0 2 API calls 56105->56106 56107 ea4f77 56106->56107 56226 ff4930 56108->56226 56110->56039 56111->56056 56112->56060 56114 f4769d 56113->56114 56128 f54b80 56114->56128 56119 f47753 56120 e88960 38 API calls 56119->56120 56122 f47782 56120->56122 56121 e88960 38 API calls 56121->56119 56123 e88960 38 API calls 56122->56123 56124 f47791 56123->56124 56125 105cb75 _ValidateLocalCookies 5 API calls 56124->56125 56126 f477a8 56125->56126 56126->56074 56127->56077 56132 f54be2 56128->56132 56129 f54c38 56130 105cb75 _ValidateLocalCookies 5 API calls 56129->56130 56131 f476d3 56130->56131 56160 f54f80 56131->56160 56132->56129 56133 f54c5a 56132->56133 56134 f54c6c 56132->56134 56135 f54d8a 56132->56135 56136 e88960 38 API calls 56133->56136 56139 f54c80 56134->56139 56140 f54c99 56134->56140 56138 f54f12 56135->56138 56181 f55070 42 API calls 3 library calls 56135->56181 56136->56129 56138->56133 56186 e8d630 56138->56186 56170 e87830 56139->56170 56142 e88300 39 API calls 56140->56142 56144 f54c8c 56142->56144 56146 e88960 38 API calls 56144->56146 56147 f54ce0 56144->56147 56146->56147 56149 f54d47 std::ios_base::_Ios_base_dtor 56147->56149 56150 f54f78 56147->56150 56148 e88960 38 API calls 56148->56133 56149->56133 56149->56148 56151 1061fff std::_Throw_Cpp_error 38 API calls 56150->56151 56152 f54f7d 56151->56152 56155 f54ef0 56156 e88960 38 API calls 56155->56156 56156->56138 56158 f54da5 56158->56138 56158->56155 56159 e88960 38 API calls 56158->56159 56182 ee4f90 5 API calls 2 library calls 56158->56182 56183 106677d GetStringTypeW 56158->56183 56184 1067ebd 50 API calls __cftof 56158->56184 56185 f11b60 52 API calls 3 library calls 56158->56185 56159->56158 56163 f54fbe 56160->56163 56161 f54fd1 56162 105cb75 _ValidateLocalCookies 5 API calls 56161->56162 56165 f47706 56162->56165 56163->56161 56164 f54fef 56163->56164 56169 f54ff9 56163->56169 56198 f55070 42 API calls 3 library calls 56163->56198 56166 e88960 38 API calls 56164->56166 56165->56119 56165->56121 56166->56161 56168 e8d630 39 API calls 56168->56164 56169->56164 56169->56168 56171 e87856 56170->56171 56172 e878ca 56171->56172 56176 e87861 56171->56176 56196 e888b0 39 API calls std::_Throw_Cpp_error 56172->56196 56174 e8786d 56174->56144 56176->56174 56178 e88850 39 API calls 56176->56178 56179 e878a7 std::_Locinfo::_Locinfo_ctor 56178->56179 56179->56144 56181->56158 56182->56158 56183->56158 56184->56158 56185->56158 56189 e8d67d 56186->56189 56191 e8d641 std::_Locinfo::_Locinfo_ctor 56186->56191 56187 e8d731 56197 e888b0 39 API calls std::_Throw_Cpp_error 56187->56197 56189->56187 56192 e88850 39 API calls 56189->56192 56191->56133 56193 e8d6c6 std::_Locinfo::_Locinfo_ctor 56192->56193 56194 e8d715 std::ios_base::_Ios_base_dtor 56193->56194 56195 1061fff std::_Throw_Cpp_error 38 API calls 56193->56195 56194->56133 56195->56187 56198->56169 56200 ea4d22 56199->56200 56201 f5567f 56199->56201 56203 f9acc0 56200->56203 56201->56200 56230 f55700 39 API calls _ValidateLocalCookies 56201->56230 56204 f9ad16 56203->56204 56209 f9ad23 56203->56209 56205 e87830 39 API calls 56204->56205 56224 f9ad1e 56205->56224 56206 f9ae93 56207 e87830 39 API calls 56206->56207 56207->56224 56208 105cb75 _ValidateLocalCookies 5 API calls 56211 f9aec2 56208->56211 56209->56206 56210 f9ad60 PathIsUNCW 56209->56210 56212 f9ae4b 56210->56212 56213 f9ad75 56210->56213 56211->56094 56233 f9cbd0 40 API calls ___vcrt_FlsGetValue 56212->56233 56231 f9cbd0 40 API calls ___vcrt_FlsGetValue 56213->56231 56216 f9ad9a 56216->56206 56219 f9ada5 56216->56219 56217 f9ae70 56217->56206 56218 f9ae77 56217->56218 56220 e87830 39 API calls 56218->56220 56221 e87830 39 API calls 56219->56221 56222 f9adae std::_Locinfo::_Locinfo_ctor 56220->56222 56221->56222 56232 e89c20 39 API calls std::_Locinfo::_Locinfo_ctor 56222->56232 56224->56208 56225->56098 56228 ff4951 56226->56228 56227 ff49b2 56227->56102 56228->56227 56234 fca570 56228->56234 56230->56200 56231->56216 56232->56224 56233->56217 56235 fca5aa 56234->56235 56237 fca5bb 56234->56237 56236 e8a9b0 2 API calls 56235->56236 56235->56237 56238 fca645 ___std_exception_destroy 56236->56238 56237->56228 56238->56228 56239 ea03f0 56243 ea0418 56239->56243 56240 ea0443 56241 105cb75 _ValidateLocalCookies 5 API calls 56240->56241 56244 ea04a8 56241->56244 56242 ea043d 56242->56240 56246 ea0448 GetClientRect 56242->56246 56243->56240 56243->56242 56247 ea1130 GetWindowRect GetWindow 56243->56247 56246->56240 56248 ea12ae 56247->56248 56256 ea1173 56247->56256 56249 105cb75 _ValidateLocalCookies 5 API calls 56248->56249 56251 ea12bd 56249->56251 56250 ea129f GetWindow 56250->56248 56250->56256 56251->56242 56252 ea0fb0 7 API calls 56252->56256 56253 ea11eb GetWindowRect GetWindowRect 56254 ea1267 GetWindowRect GetWindowRect 56253->56254 56255 ea1224 GetWindowRect 56253->56255 56254->56250 56254->56256 56255->56256 56256->56250 56256->56252 56256->56253 56257 ea18d0 RtlAllocateHeap RaiseException 56256->56257 56257->56256 56258 fa9da0 56259 fa97f0 10 API calls 56258->56259 56260 fa9dd1 56259->56260 56261 fa9de9 PathIsUNCW 56260->56261 56262 fa9dd5 56260->56262 56284 fa9a20 56261->56284 56264 fa9e1e 56265 fa9fb1 56264->56265 56266 e8a4e0 40 API calls 56264->56266 56267 e8a9b0 2 API calls 56265->56267 56278 fa9e35 56266->56278 56268 fa9fbb CreateFileW 56267->56268 56269 faa01c GetFileSize 56268->56269 56270 faa02a 56268->56270 56269->56270 56271 faa052 56270->56271 56272 faa044 CloseHandle 56270->56272 56272->56271 56273 e8a4e0 40 API calls 56273->56278 56274 fa9ee3 56275 ea2290 123 API calls 56275->56278 56276 ea2290 123 API calls 56277 fa9ea4 CreateDirectoryW 56276->56277 56277->56278 56279 fa9eb8 GetLastError 56277->56279 56278->56265 56278->56273 56278->56274 56278->56275 56278->56276 56281 fa9ed6 56278->56281 56360 fa7930 147 API calls __Getctype 56278->56360 56279->56278 56281->56274 56282 fa9edb 56281->56282 56359 fa9460 129 API calls 56282->56359 56285 e8acf0 50 API calls 56284->56285 56286 fa9a59 56285->56286 56287 fa9d7e 56286->56287 56290 e8acf0 50 API calls 56286->56290 56288 e8a9b0 2 API calls 56287->56288 56289 fa9d88 56288->56289 56291 e8a9b0 2 API calls 56289->56291 56292 fa9a7a 56290->56292 56293 fa9d92 56291->56293 56292->56287 56294 fa9a82 56292->56294 56295 fa97f0 10 API calls 56293->56295 56361 fa9970 108 API calls 56294->56361 56296 fa9dd1 56295->56296 56297 fa9de9 PathIsUNCW 56296->56297 56298 fa9dd5 56296->56298 56300 fa9a20 150 API calls 56297->56300 56298->56264 56302 fa9e1e 56300->56302 56301 fa9a9a 56303 fa9ba9 56301->56303 56304 fa9aa5 56301->56304 56305 fa9fb1 56302->56305 56308 e8a4e0 40 API calls 56302->56308 56306 ea2b70 40 API calls 56303->56306 56307 fa9b3a 56304->56307 56319 fa9acb 56304->56319 56311 e8a9b0 2 API calls 56305->56311 56309 fa9bb2 PathIsUNCW 56306->56309 56310 e95f50 108 API calls 56307->56310 56343 fa9e35 56308->56343 56316 fa9bcc 56309->56316 56313 fa9b54 56310->56313 56312 fa9fbb CreateFileW 56311->56312 56314 faa01c GetFileSize 56312->56314 56315 faa02a 56312->56315 56317 ea2b70 40 API calls 56313->56317 56314->56315 56323 faa052 56315->56323 56324 faa044 CloseHandle 56315->56324 56320 e95f50 108 API calls 56316->56320 56318 fa9b67 56317->56318 56328 ea2290 123 API calls 56318->56328 56322 e95f50 108 API calls 56319->56322 56321 fa9bf8 56320->56321 56327 ea2290 123 API calls 56321->56327 56329 fa9ae5 56322->56329 56323->56264 56324->56323 56325 e8a4e0 40 API calls 56325->56343 56326 fa9ee3 56326->56264 56330 fa9c0a 56327->56330 56331 fa9b38 56328->56331 56332 ea2b70 40 API calls 56329->56332 56362 fa4c90 40 API calls 3 library calls 56330->56362 56331->56309 56333 fa9af8 56332->56333 56336 ea2290 123 API calls 56333->56336 56335 fa9c36 56338 fa9c88 56335->56338 56339 fa9c3f 56335->56339 56336->56331 56337 ea2290 123 API calls 56340 fa9ea4 CreateDirectoryW 56337->56340 56341 f8a960 52 API calls 56338->56341 56363 f8a960 56339->56363 56340->56343 56344 fa9eb8 GetLastError 56340->56344 56345 fa9cad 56341->56345 56343->56305 56343->56325 56343->56326 56343->56337 56350 fa9ed6 56343->56350 56352 ea2290 123 API calls 56343->56352 56398 fa7930 147 API calls __Getctype 56343->56398 56344->56343 56347 fac3f0 147 API calls 56345->56347 56346 fa9c4b 56383 fac3f0 56346->56383 56351 fa9cc0 56347->56351 56350->56326 56353 fa9edb 56350->56353 56395 fa7930 147 API calls __Getctype 56351->56395 56352->56343 56397 fa9460 129 API calls 56353->56397 56356 fa9c5e 56356->56264 56357 fa9ced 56357->56289 56357->56356 56396 fa7930 147 API calls __Getctype 56357->56396 56359->56274 56360->56278 56361->56301 56362->56335 56364 e8acf0 50 API calls 56363->56364 56368 f8a99e 56364->56368 56365 f8ab10 56366 e8a9b0 2 API calls 56365->56366 56367 f8ab1a 56366->56367 56369 e8a9b0 2 API calls 56367->56369 56368->56365 56372 f8ab06 56368->56372 56374 f8aa17 56368->56374 56382 f8aac1 56368->56382 56376 f8ab24 ___std_exception_destroy 56369->56376 56370 105cb75 _ValidateLocalCookies 5 API calls 56371 f8ab00 56370->56371 56371->56346 56373 e8a9b0 2 API calls 56372->56373 56373->56365 56375 f8aa25 56374->56375 56399 f8ab80 RtlAllocateHeap RaiseException std::_Locinfo::_Locinfo_ctor 56374->56399 56400 1066607 38 API calls 3 library calls 56375->56400 56376->56346 56379 f8aa3d 56379->56367 56381 f8aa71 56379->56381 56401 e8a7c0 40 API calls 56379->56401 56381->56367 56381->56381 56381->56382 56382->56370 56388 fac434 56383->56388 56384 fac514 56384->56356 56385 fac553 56404 fa7930 147 API calls __Getctype 56385->56404 56387 fac4df 56387->56385 56389 fac4e6 56387->56389 56388->56384 56388->56385 56388->56387 56393 e95f50 108 API calls 56388->56393 56402 fa7930 147 API calls __Getctype 56388->56402 56390 e95f50 108 API calls 56389->56390 56391 fac501 56390->56391 56403 fa7930 147 API calls __Getctype 56391->56403 56393->56388 56395->56357 56396->56357 56397->56326 56398->56343 56399->56375 56400->56379 56401->56381 56402->56388 56403->56384 56404->56384 56405 ebc5d0 56406 ebc5e3 std::ios_base::_Ios_base_dtor 56405->56406 56411 105e79d 56406->56411 56409 ebc60b 56410 ebc5f9 SetUnhandledExceptionFilter 56410->56409 56412 105e7d5 __set_se_translator 49 API calls 56411->56412 56413 105e7a6 56412->56413 56414 105e7d5 __set_se_translator 49 API calls 56413->56414 56415 ebc5ed 56414->56415 56415->56409 56415->56410 56416 eb4f10 56431 f88460 56416->56431 56418 eb4f37 56419 eb4f4c SendMessageW 56418->56419 56420 eb4f61 56418->56420 56419->56420 56467 eb50a0 15 API calls 2 library calls 56420->56467 56422 eb4f69 56423 eb4f7d GetClientRect GetDC GetDeviceCaps 56422->56423 56424 eb5083 56422->56424 56425 eb4fc0 std::locale::_Setgloballocale 56423->56425 56426 105cb75 _ValidateLocalCookies 5 API calls 56424->56426 56428 eb4fd0 GetObjectW 56425->56428 56427 eb5093 56426->56427 56468 105eef0 56428->56468 56432 f47650 64 API calls 56431->56432 56433 f884ae 56432->56433 56470 ea5ce0 56433->56470 56435 f884c4 56436 e88300 39 API calls 56435->56436 56437 f884f9 56436->56437 56438 f88529 56437->56438 56439 e88960 38 API calls 56437->56439 56440 e88960 38 API calls 56438->56440 56439->56438 56441 f8855f 56440->56441 56442 f88596 std::ios_base::_Ios_base_dtor 56441->56442 56443 f888f8 56441->56443 56444 e88300 39 API calls 56442->56444 56445 1061fff std::_Throw_Cpp_error 38 API calls 56443->56445 56446 f885e9 56444->56446 56447 f888fd 56445->56447 56450 f88619 56446->56450 56451 e88960 38 API calls 56446->56451 56448 1061fff std::_Throw_Cpp_error 38 API calls 56447->56448 56449 f88902 SetTimer 56448->56449 56449->56418 56452 e88960 38 API calls 56450->56452 56451->56450 56453 f8864f 56452->56453 56453->56447 56454 f88686 std::ios_base::_Ios_base_dtor 56453->56454 56455 f888da 56454->56455 56457 f886da SetWindowPos RedrawWindow 56454->56457 56458 f886c6 56454->56458 56456 105cb75 _ValidateLocalCookies 5 API calls 56455->56456 56459 f888f1 56456->56459 56460 f88724 SendMessageW 56457->56460 56458->56457 56459->56418 56529 e8a830 40 API calls 4 library calls 56460->56529 56462 f8876d GetDC GetDeviceCaps MulDiv CreateFontW 56463 f887e4 GetObjectW CreateFontIndirectW 56462->56463 56463->56455 56465 f888c8 56463->56465 56466 e8d630 39 API calls 56465->56466 56466->56455 56467->56422 56469 eb4ff3 SendMessageA 56468->56469 56469->56424 56471 e88300 39 API calls 56470->56471 56473 ea5d5a std::ios_base::_Ios_base_dtor 56471->56473 56472 e88300 39 API calls 56474 ea5df4 56472->56474 56473->56472 56475 e88960 38 API calls 56474->56475 56477 ea5e21 std::ios_base::_Ios_base_dtor 56475->56477 56476 e88300 39 API calls 56478 ea5ea1 56476->56478 56477->56476 56479 e88960 38 API calls 56478->56479 56482 ea5ece std::ios_base::_Ios_base_dtor 56479->56482 56480 ea611e std::ios_base::_Ios_base_dtor 56481 e88300 39 API calls 56480->56481 56492 ea61ae std::ios_base::_Ios_base_dtor 56481->56492 56482->56480 56483 ea5fff 56482->56483 56486 ea5f73 56482->56486 56530 1067ebd 50 API calls __cftof 56483->56530 56484 e88960 38 API calls 56488 ea62fb 56484->56488 56487 ea5f9e std::ios_base::_Ios_base_dtor 56486->56487 56490 e88960 38 API calls 56486->56490 56487->56484 56493 105cb75 _ValidateLocalCookies 5 API calls 56488->56493 56489 ea600d 56531 1067ebd 50 API calls __cftof 56489->56531 56490->56486 56491 e88960 38 API calls 56491->56487 56497 ea631b 56492->56497 56499 ea62be std::ios_base::_Ios_base_dtor 56492->56499 56505 ea6261 56492->56505 56495 ea6312 56493->56495 56495->56435 56496 ea6049 56504 ea6077 56496->56504 56532 1067ebd 50 API calls __cftof 56496->56532 56534 1067ebd 50 API calls __cftof 56497->56534 56499->56491 56501 e88960 38 API calls 56501->56505 56502 ea6329 56513 ea636b 56502->56513 56535 1067ebd 50 API calls __cftof 56502->56535 56503 ea642f 56506 1061fff std::_Throw_Cpp_error 38 API calls 56503->56506 56512 ea60b9 56504->56512 56533 1067ebd 50 API calls __cftof 56504->56533 56505->56499 56505->56501 56508 ea6281 56505->56508 56510 ea644d 56506->56510 56508->56499 56508->56503 56514 ea645f 56510->56514 56515 ea64e3 56510->56515 56512->56480 56518 e88960 38 API calls 56512->56518 56536 1067ebd 50 API calls __cftof 56513->56536 56537 f903c0 9 API calls __Init_thread_footer 56514->56537 56516 ea64ec 56515->56516 56517 ea6581 56515->56517 56538 f903c0 9 API calls __Init_thread_footer 56516->56538 56527 ea646d 56517->56527 56539 f903c0 9 API calls __Init_thread_footer 56517->56539 56518->56512 56521 ea6464 56524 ea64b2 GetSysColor 56521->56524 56521->56527 56523 ea63a4 56523->56499 56523->56508 56525 e88960 38 API calls 56523->56525 56524->56435 56525->56523 56526 ea6550 GetSysColor 56526->56435 56527->56435 56528 ea64f1 56528->56526 56528->56527 56529->56462 56530->56489 56531->56496 56532->56504 56533->56512 56534->56502 56535->56513 56536->56523 56537->56521 56538->56528 56539->56521
            APIs
            • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?,SystemFolder,0000000C,?,?,?), ref: 00FBEA13
            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00FBEB0E
            • GetWindowsDirectoryW.KERNEL32(?,00000104,WindowsFolder,0000000D,?,?,?), ref: 00FBEC06
            • GetWindowsDirectoryW.KERNEL32(?,00000104,WindowsVolume,0000000D,?,?,?), ref: 00FBECE5
            • GetModuleFileNameW.KERNEL32(00000000,?,00000104,WindowsVolume,0000000D,?,?,?), ref: 00FBEE21
            • SHGetSpecialFolderLocation.SHELL32(00000000,?,WindowsVolume,0000000D,?,?,?), ref: 00FBEF02
            • __Init_thread_footer.LIBCMT ref: 00FBEF76
            • LoadLibraryW.KERNEL32(shfolder.dll,?,?,?), ref: 00FBEF8C
            • GetProcAddress.KERNEL32(00000000,SHGetFolderPathW), ref: 00FBEFBE
            • SHGetPathFromIDListW.SHELL32(?,?), ref: 00FBF073
            • SHGetMalloc.SHELL32(00000000), ref: 00FBF08C
              • Part of subcall function 00E8A9B0: RtlAllocateHeap.NTDLL(?,00000000,?,9F3ADAE5,00000000,01084C50,000000FF,?,?,01173854,?,00FE9828,80004005,9F3ADAE5,?,?), ref: 00E8A9FA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Directory$FolderPathWindows$AddressAllocateFileFromHeapInit_thread_footerLibraryListLoadLocationMallocModuleNameProcSpecialSystem
            • String ID: ProgramFiles64Folder$ProgramW6432$SETUPEXEDIR$SHGetFolderPathW$System32Folder$SystemFolder$TempFolder$WindowsFolder$WindowsVolume$shfolder.dll
            • API String ID: 2816963309-2142986682
            • Opcode ID: 26ceac375b712573c0d5d7963c2453f31593c909df5c42a10c2b8339345441b6
            • Instruction ID: 366171f991938eef7336bf1799499b133a92b260d2727657dc06657336d2e531
            • Opcode Fuzzy Hash: 26ceac375b712573c0d5d7963c2453f31593c909df5c42a10c2b8339345441b6
            • Instruction Fuzzy Hash: 0E322570A002058BDB28EF65CC44BFAB3B5BF54310F1442ACE51AAB292EB719E85DF51
            APIs
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            • GetTickCount.KERNEL32 ref: 00FC3744
            • __Xtime_get_ticks.LIBCPMT ref: 00FC374C
            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FC3796
            • __Init_thread_footer.LIBCMT ref: 00FC3981
            • GetCurrentProcess.KERNEL32(00000008,?,9F3ADAE5), ref: 00FC3B78
            • OpenProcessToken.ADVAPI32(00000000), ref: 00FC3B7F
            • GetTokenInformation.KERNELBASE(00000000,00000014(TokenIntegrityLevel),?,00000004,?), ref: 00FC3BAE
            • CloseHandle.KERNEL32(00000000), ref: 00FC3BC3
              • Part of subcall function 00E8A9B0: RtlAllocateHeap.NTDLL(?,00000000,?,9F3ADAE5,00000000,01084C50,000000FF,?,?,01173854,?,00FE9828,80004005,9F3ADAE5,?,?), ref: 00E8A9FA
            • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,00000000,00000000), ref: 00FC4495
            • CreateThread.KERNEL32(00000000,00000000,00FC4FA0,?,00000000,?), ref: 00FC44D0
            • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,?), ref: 00FC4503
              • Part of subcall function 00FC72F0: GetCurrentProcess.KERNEL32(?,9F3ADAE5), ref: 00FC7359
              • Part of subcall function 00FC72F0: IsWow64Process.KERNEL32(00000000), ref: 00FC7360
              • Part of subcall function 00FC72F0: _wcsrchr.LIBVCRUNTIME ref: 00FC73E1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Process$Init_thread_footer$CreateCurrentHeapToken$AllocateCloseCountEventHandleInformationObjectOpenSingleThreadTickUnothrow_t@std@@@WaitWow64Xtime_get_ticks__ehfuncinfo$??2@_wcsrchr
            • String ID: /uninstall$Maintenance mode:$VersionString$\/:*?"<>|$\\?\$false$true
            • API String ID: 514365542-1899154899
            • Opcode ID: 0d36e2a659cae562df1a80d0533074b166f6df848d50ab717b61040fc4f680f2
            • Instruction ID: 465473555fee957ee6e45560fac40d00426f4b7c56f5b1c2b482338de8dbaebf
            • Opcode Fuzzy Hash: 0d36e2a659cae562df1a80d0533074b166f6df848d50ab717b61040fc4f680f2
            • Instruction Fuzzy Hash: B8B2D130D0060A9FDB14DFA8C955BAEF7B4FF45320F14826DE825AB291DB74AE44DB90

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1697 f88460-f88520 call f47650 call ea5ce0 call e88300 1707 f88522-f88550 call e88960 1697->1707 1708 f88553-f8856c call e88960 1697->1708 1707->1708 1713 f8856e-f88580 1708->1713 1714 f885a0-f88610 call e88300 1708->1714 1715 f88582-f88590 1713->1715 1716 f88596-f8859d call 105cb83 1713->1716 1728 f88612-f88640 call e88960 1714->1728 1729 f88643-f8865c call e88960 1714->1729 1715->1716 1717 f888f8 call 1061fff 1715->1717 1716->1714 1724 f888fd-f88926 call 1061fff SetTimer 1717->1724 1728->1729 1734 f8865e-f88670 1729->1734 1735 f88690-f886b7 1729->1735 1736 f88672-f88680 1734->1736 1737 f88686-f8868d call 105cb83 1734->1737 1740 f888da-f888f7 call 105cb75 1735->1740 1741 f886bd-f886c4 1735->1741 1736->1724 1736->1737 1737->1735 1744 f886da-f888c6 SetWindowPos RedrawWindow SendMessageW call e8a830 GetDC GetDeviceCaps MulDiv CreateFontW GetObjectW CreateFontIndirectW 1741->1744 1745 f886c6-f886d4 1741->1745 1744->1740 1752 f888c8-f888cf 1744->1752 1745->1744 1753 f888d1 1752->1753 1754 f888d3-f888d5 call e8d630 1752->1754 1753->1754 1754->1740
            APIs
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000037), ref: 00F886E9
            • RedrawWindow.USER32(?,00000000,00000000,00000541), ref: 00F886FB
            • SendMessageW.USER32(?,00000443,00000000), ref: 00F88753
            • GetDC.USER32(00000000), ref: 00F88777
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F88782
            • MulDiv.KERNEL32(?,00000000), ref: 00F8878A
            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?), ref: 00F887AF
            • GetObjectW.GDI32(00000000,0000005C,?), ref: 00F88898
            • CreateFontIndirectW.GDI32(?), ref: 00F888AC
            • SetTimer.USER32(?,?,?,00000000), ref: 00F88920
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CreateFontWindow$CapsDeviceIndirectMessageObjectRedrawSendTimer
            • String ID: NumberValidationTipMsg$NumberValidationTipTitle$Segoe UI
            • API String ID: 3996265456-2319862951
            • Opcode ID: b7707fb4adac002089b85310c8bfe08a7b2b8e8007355e8174783142a79ff68f
            • Instruction ID: 875f8cd28bee62fd584a50580a8c509015c81b0d8699d8303fb62314a7a4a37b
            • Opcode Fuzzy Hash: b7707fb4adac002089b85310c8bfe08a7b2b8e8007355e8174783142a79ff68f
            • Instruction Fuzzy Hash: 67D1C031A00605AFEB18DF64CC95BEEB7B1FF88300F10829DE55AA72D0DB746A45CB90

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1803 fe8160-fe81f9 GetUserNameW 1804 fe81fb-fe8204 GetLastError 1803->1804 1805 fe8245-fe8283 GetEnvironmentVariableW 1803->1805 1804->1805 1806 fe8206-fe820e 1804->1806 1807 fe82c9-fe82fc 1805->1807 1808 fe8285-fe828a 1805->1808 1809 fe8226-fe822e call e8f6f0 1806->1809 1810 fe8210-fe8224 1806->1810 1813 fe82fe-fe8311 1807->1813 1814 fe8313-fe831b call e88300 1807->1814 1811 fe828c-fe82a0 1808->1811 1812 fe82a2-fe82ac call e8f6f0 1808->1812 1817 fe8233-fe8243 GetUserNameW 1809->1817 1810->1817 1819 fe82b1-fe82c3 GetEnvironmentVariableW 1811->1819 1812->1819 1815 fe8320-fe8355 call e881d0 * 2 1813->1815 1814->1815 1825 fe8389-fe83a6 1815->1825 1826 fe8357-fe8369 1815->1826 1817->1805 1819->1807 1829 fe83a8-fe83ba 1825->1829 1830 fe83d6-fe8409 call 105cb75 1825->1830 1827 fe837f-fe8386 call 105cb83 1826->1827 1828 fe836b-fe8379 1826->1828 1827->1825 1828->1827 1832 fe840a-fe8491 call 1061fff call fe88c0 call fa7040 call e88960 1828->1832 1834 fe83cc-fe83d3 call 105cb83 1829->1834 1835 fe83bc-fe83ca 1829->1835 1848 fe84bc-fe84c2 1832->1848 1849 fe8493-fe84b9 call f94550 1832->1849 1834->1830 1835->1832 1835->1834 1850 fe84c6-fe84f5 call e88960 * 2 1848->1850 1851 fe84c4 1848->1851 1849->1848 1859 fe84f7-fe84fe RegCloseKey 1850->1859 1860 fe8505-fe857b call e88300 call fa7040 1850->1860 1851->1850 1859->1860 1865 fe85af-fe85c9 1860->1865 1866 fe857d-fe858f 1860->1866 1869 fe85cb-fe85fb call f94550 1865->1869 1870 fe8600-fe8662 call fe8a70 call fa7040 1865->1870 1867 fe85a5-fe85ac call 105cb83 1866->1867 1868 fe8591-fe859f 1866->1868 1867->1865 1868->1867 1871 fe88ab call 1061fff 1868->1871 1869->1870 1884 fe869f-fe86c0 call e88960 * 2 1870->1884 1885 fe8664-fe8685 call e88960 * 2 1870->1885 1878 fe88b0-fe88b5 call 1061fff 1871->1878 1896 fe86c2-fe86ca 1884->1896 1897 fe86d1-fe86dc 1884->1897 1894 fe8696-fe869d 1885->1894 1895 fe8687-fe868f 1885->1895 1900 fe86ed-fe872f call e88960 * 3 1894->1900 1895->1894 1896->1897 1898 fe86de 1897->1898 1899 fe86e0-fe86e1 1897->1899 1898->1899 1899->1900 1909 fe873e-fe8795 call e88300 call fa7040 1900->1909 1910 fe8731-fe8734 RegCloseKey 1900->1910 1915 fe87c9-fe87e5 1909->1915 1916 fe8797-fe87a9 1909->1916 1910->1909 1919 fe87e7-fe881f call f94550 1915->1919 1920 fe8825-fe8829 1915->1920 1917 fe87bf-fe87c6 call 105cb83 1916->1917 1918 fe87ab-fe87b9 1916->1918 1917->1915 1918->1878 1918->1917 1919->1920 1923 fe882d-fe886e call e88960 * 2 1920->1923 1924 fe882b 1920->1924 1932 fe887d-fe88aa call 105cb75 1923->1932 1933 fe8870-fe8873 RegCloseKey 1923->1933 1924->1923 1933->1932
            APIs
            • GetUserNameW.ADVAPI32(?,?), ref: 00FE81F5
            • GetLastError.KERNEL32 ref: 00FE81FB
            • GetUserNameW.ADVAPI32(?,?), ref: 00FE8243
            • GetEnvironmentVariableW.KERNEL32(UserDomain,00000000,00000000), ref: 00FE8279
            • GetEnvironmentVariableW.KERNEL32(UserDomain,?,00000000,00000000,00000000), ref: 00FE82C3
            • RegCloseKey.ADVAPI32(?,?,00000000,80000001,00000001,00000000,9F3ADAE5), ref: 00FE84F8
            • RegCloseKey.ADVAPI32(?,?,00000000,80000001,00000001,00000000), ref: 00FE8732
            • RegCloseKey.ADVAPI32(?,?,?,?,80000001,00000001,00000000,Software\Microsoft\Windows\CurrentVersion\RunOnce,00000031,?,00000000,80000001,00000001,00000000), ref: 00FE8871
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Close$EnvironmentNameUserVariable$ErrorLast
            • String ID: Software$Software\Microsoft\Windows\CurrentVersion\RunOnce$UserDomain
            • API String ID: 938064350-4079418357
            • Opcode ID: 5e200a52986ad910449d50cf85ea3fcb4f24539c751ef05239281e8939b435c1
            • Instruction ID: 2aaf0e68423e35feded18190492e8e7e9c56e778bc3fe6aaa21bf048ea084643
            • Opcode Fuzzy Hash: 5e200a52986ad910449d50cf85ea3fcb4f24539c751ef05239281e8939b435c1
            • Instruction Fuzzy Hash: 3F228D70D00249DFEB14EFA9CD95BEEBBB4AF14304F208159E819B7280DB746A85DB91

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1936 fa4d70-fa4dcd GetCurrentProcess OpenProcessToken 1938 fa4dcf-fa4dd7 GetLastError 1936->1938 1939 fa4ddc-fa4dfd GetTokenInformation 1936->1939 1940 fa4e9a-fa4ead 1938->1940 1941 fa4e2b-fa4e2f 1939->1941 1942 fa4dff-fa4e08 GetLastError 1939->1942 1946 fa4eaf-fa4eb6 FindCloseChangeNotification 1940->1946 1947 fa4ebd-fa4ed9 call 105cb75 1940->1947 1944 fa4e7e GetLastError 1941->1944 1945 fa4e31-fa4e60 AllocateAndInitializeSid 1941->1945 1943 fa4e0a-fa4e29 call fa4ee0 GetTokenInformation 1942->1943 1942->1944 1943->1941 1943->1944 1951 fa4e84 1944->1951 1950 fa4e62-fa4e7c EqualSid FreeSid 1945->1950 1945->1951 1946->1947 1954 fa4e86-fa4e93 call 105d234 1950->1954 1951->1954 1954->1940
            APIs
            • GetCurrentProcess.KERNEL32 ref: 00FA4DB8
            • OpenProcessToken.ADVAPI32(00000000,00000008,00000000), ref: 00FA4DC5
            • GetLastError.KERNEL32 ref: 00FA4DCF
            • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?), ref: 00FA4DF9
            • GetLastError.KERNEL32 ref: 00FA4DFF
            • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,?,?,?), ref: 00FA4E25
            • AllocateAndInitializeSid.ADVAPI32(00000000,00000001,00000012,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00FA4E58
            • EqualSid.ADVAPI32(00000000,?), ref: 00FA4E67
            • FreeSid.ADVAPI32(?), ref: 00FA4E76
            • FindCloseChangeNotification.KERNEL32(00000000), ref: 00FA4EB0
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Token$ErrorInformationLastProcess$AllocateChangeCloseCurrentEqualFindFreeInitializeNotificationOpen
            • String ID:
            • API String ID: 2037597787-0
            • Opcode ID: cfcf7f1adcde4911fb21dbc33385fe55c7388f7650aff8e70a4a9d3c300aae54
            • Instruction ID: 3d54bb50c5c3c3e1ded2c35230c972e56a967b837cdaa82c752bdec61e50f228
            • Opcode Fuzzy Hash: cfcf7f1adcde4911fb21dbc33385fe55c7388f7650aff8e70a4a9d3c300aae54
            • Instruction Fuzzy Hash: 55414CB1D00219EFDF20DFA5C889BEEBBB8FF09724F104119E911B6290D779A944DB64
            APIs
            • GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00F66531
            • GetSysColor.USER32(00000011), ref: 00F66854
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
              • Part of subcall function 00E8A2A0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,?,?,?,*.*,?,80070057,9F3ADAE5), ref: 00E8A2C3
            • LoadLibraryExW.KERNEL32(?,00000000,00000000,010BD25D,000000FF), ref: 00F66604
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Init_thread_footer$ColorDirectoryFindHeapLibraryLoadProcessResourceSystem
            • String ID: UxTheme.dll
            • API String ID: 3874013222-352951104
            • Opcode ID: e924529715d445f6c3e03b30fef4eba85cbce93af017c8b413e2d2d53b1ee991
            • Instruction ID: 45e3b1fa83b19cc6a56efe70b5e25b129aef7ad717250d30515fab8de7618730
            • Opcode Fuzzy Hash: e924529715d445f6c3e03b30fef4eba85cbce93af017c8b413e2d2d53b1ee991
            • Instruction Fuzzy Hash: 61A18BB0900645EFE714CF68C918B9ABBF4FF04318F14865DD8299B681D7BAA618CF90
            APIs
            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00FDBD0A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: DiskFreeSpace
            • String ID: \$\$\
            • API String ID: 1705453755-3791832595
            • Opcode ID: e142cd543cc106f0dc037825da54f614e8998aa2be03d44136a7aa94388eb0a8
            • Instruction ID: 94e1d7df19616b1d837944bcb1e65c122f0aa1528185dddb2199b1b69c66a6a8
            • Opcode Fuzzy Hash: e142cd543cc106f0dc037825da54f614e8998aa2be03d44136a7aa94388eb0a8
            • Instruction Fuzzy Hash: AF41F522E14315C6CB309F248040AABB7F6FF95364F1A4A2FE8D897240E7318D84A3C6
            APIs
            • LoadStringW.USER32(?,00000000,?,00000100), ref: 00FB194C
            • LoadStringW.USER32(?,00000000,?,00000001), ref: 00FB1A6D
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: LoadString
            • String ID:
            • API String ID: 2948472770-0
            • Opcode ID: 04af7425337961d398a697bf9e6bde9790df9b209e8535e5121683847978ae1d
            • Instruction ID: 5eb511f61db72677a6734b92f926244f297bba9206fa9e0b428fe5c0f4e6b4bf
            • Opcode Fuzzy Hash: 04af7425337961d398a697bf9e6bde9790df9b209e8535e5121683847978ae1d
            • Instruction Fuzzy Hash: 6CC19F71D00249DBDB04CFA8C955BEEBBB5FF44314F648229E815BB280EB746A44DB90
            APIs
            • KillTimer.USER32(00000003,00000001,9F3ADAE5,?,?,?,?,0108A654,000000FF), ref: 00EA3E81
            • GetWindowLongW.USER32(00000003,000000FC), ref: 00EA3E96
            • SetWindowLongW.USER32(00000003,000000FC,?), ref: 00EA3EA8
            • DeleteCriticalSection.KERNEL32(?,9F3ADAE5,?,?,?,?,0108A654,000000FF), ref: 00EA3ED3
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: LongWindow$CriticalDeleteKillSectionTimer
            • String ID:
            • API String ID: 1032004442-0
            • Opcode ID: 3a844b56e053e25e60a80b7c36545d378054b06b75ab043cd4bf5deaf1e10ed1
            • Instruction ID: 284b3c79bfcce182e3592091d225f0963a99c9e27911ed59568ce835872cdcef
            • Opcode Fuzzy Hash: 3a844b56e053e25e60a80b7c36545d378054b06b75ab043cd4bf5deaf1e10ed1
            • Instruction Fuzzy Hash: 6531A171A04346AFDB24DF34C908B9ABBB8FF19724F104269F864A7681D771EA10DB90
            APIs
            • GetProcessHeap.KERNEL32(00000008,00000008,00000000,00FD3A1E,?,?), ref: 0105C727
            • HeapAlloc.KERNEL32(00000000,?,?), ref: 0105C72E
            • GetProcessHeap.KERNEL32(00000000,00000000,?,?), ref: 0105C774
            • HeapFree.KERNEL32(00000000,?,?), ref: 0105C77B
              • Part of subcall function 0105C5C0: GetProcessHeap.KERNEL32(00000008,0000000D,00000000,?,0105C76A,?,?,?), ref: 0105C5E4
              • Part of subcall function 0105C5C0: HeapAlloc.KERNEL32(00000000,?,0105C76A,?,?,?), ref: 0105C5EB
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Heap$Process$Alloc$Free
            • String ID:
            • API String ID: 1864747095-0
            • Opcode ID: d6b844a285e3af842bedd25809266f8ef36c8d3bf1b47e38a6b8ad11b3553848
            • Instruction ID: e7df133059ff0dec7b060370594d760be020093147b656068339fa09fa6803fc
            • Opcode Fuzzy Hash: d6b844a285e3af842bedd25809266f8ef36c8d3bf1b47e38a6b8ad11b3553848
            • Instruction Fuzzy Hash: 7CF0B473604B129BEBF52BBEBA0CA5B3DECAF80E657114418F9C2CA644DF24C8418B50
            APIs
            • FindFirstFileW.KERNEL32(?,?,?,?), ref: 00FA98CD
            • FindClose.KERNEL32(00000000), ref: 00FA992C
              • Part of subcall function 00E8A9B0: RtlAllocateHeap.NTDLL(?,00000000,?,9F3ADAE5,00000000,01084C50,000000FF,?,?,01173854,?,00FE9828,80004005,9F3ADAE5,?,?), ref: 00E8A9FA
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Find$AllocateCloseFileFirstHeap
            • String ID:
            • API String ID: 1673784098-0
            • Opcode ID: d8f83c131935cd1bf26252c61133d72cac987d3451e733cf9ac69d309367555c
            • Instruction ID: 6a8c947cc029766ed54b3390b01323a5465903748eaee2b567af81df4de7ccfe
            • Opcode Fuzzy Hash: d8f83c131935cd1bf26252c61133d72cac987d3451e733cf9ac69d309367555c
            • Instruction Fuzzy Hash: 3131E6B1D08218AFDB34DF15C848B5AB7F4EF4A724F10416DE959A7380D7B55D44DB80
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: Name${Binary Data}
            • API String ID: 0-874704490
            • Opcode ID: 67b285b0150bd573f4d84cccef9ed91eaaadec0002b6e436b4a7a8260a780367
            • Instruction ID: 5291d1d2155faec597e53c082def7759ce7ae1600474f4fb495cb48df15154a6
            • Opcode Fuzzy Hash: 67b285b0150bd573f4d84cccef9ed91eaaadec0002b6e436b4a7a8260a780367
            • Instruction Fuzzy Hash: AD522671D00259DFDB24DF68C984BEDBBB5AF58304F1081E9E509B7291EB70AA84DF90
            APIs
            • CreateNamedPipeW.KERNEL32(?,00000003,00000006,000000FF,00007F90,00007F90,00001388,00000000,?,9F3ADAE5,9F3ADAE5,?,?,?,?,00000000), ref: 00FE98B9
            • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,00000000,00000000,?,9F3ADAE5,9F3ADAE5,?,?,?,?,00000000,010D5045), ref: 00FE98DA
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Create$FileNamedPipe
            • String ID:
            • API String ID: 1328467360-0
            • Opcode ID: d95dc3b1148a75676ec4d8f050da5ab64e21d8828ca442f6f10ff2e5ff0ce527
            • Instruction ID: 8f1b28fc609957909e71568643bb477e9f6f3dd16ddcf637f886abdf5ab7a7df
            • Opcode Fuzzy Hash: d95dc3b1148a75676ec4d8f050da5ab64e21d8828ca442f6f10ff2e5ff0ce527
            • Instruction Fuzzy Hash: C0312531A88745AFE730CF15CC05B99BFA4EB01730F10826EF9A5AB6D0C7B5A900CB50
            APIs
            • __set_se_translator.LIBVCRUNTIME ref: 00EBC5E8
            • SetUnhandledExceptionFilter.KERNEL32(00FA87F0), ref: 00EBC5FE
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled__set_se_translator
            • String ID:
            • API String ID: 2480343447-0
            • Opcode ID: 09533c986bb65b12eb333f12c07ea1c6eecf9cafc90747b7882a0748159399f7
            • Instruction ID: e41b802444a9faf7cd81480cd4f9ec4588ddce3f36558eb2c36c6c055cb40a65
            • Opcode Fuzzy Hash: 09533c986bb65b12eb333f12c07ea1c6eecf9cafc90747b7882a0748159399f7
            • Instruction Fuzzy Hash: 9DE026B2D043146AD3215360E808F5B3F98ABA2B50F048094F68067240C7B49841D372
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Init_thread_footer$HeapProcess
            • String ID:
            • API String ID: 275895251-0
            • Opcode ID: 9b316c2c0222088d8e0a74d95d920bc6fe965164eed4a87633e0f62bf29e71d3
            • Instruction ID: 9e2974e61d6b7d1c4daefe5bc8b4b3b26f514f6a6c4cd8af0f7190fa8e5d4b5f
            • Opcode Fuzzy Hash: 9b316c2c0222088d8e0a74d95d920bc6fe965164eed4a87633e0f62bf29e71d3
            • Instruction Fuzzy Hash: 116159B0500744DFE710CF25C50838AFBF0BF09318F148A6DD599AB782D7B9A649DB81

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 faef00-faef78 RegOpenKeyExW 2 faef7e-faefaf RegQueryValueExW 0->2 3 faf1e2-faf1fb 0->3 6 faefff-faf02a RegQueryValueExW 2->6 7 faefb1-faefc3 call fb4950 2->7 4 faf20e-faf229 call 105cb75 3->4 5 faf1fd-faf204 RegCloseKey 3->5 5->4 6->3 10 faf030-faf041 6->10 16 faefd4-faefeb call fb4950 7->16 17 faefc5-faefd2 7->17 13 faf04d-faf04f 10->13 14 faf043-faf04b 10->14 13->3 15 faf055-faf05c 13->15 14->13 14->14 18 faf060-faf06e call fb4950 15->18 24 faefed 16->24 25 faeff2-faeff8 16->25 19 faeffa 17->19 26 faf079-faf087 call fb4950 18->26 27 faf070-faf074 18->27 19->6 24->25 25->19 32 faf089-faf08d 26->32 33 faf092-faf0a0 call fb4950 26->33 28 faf1b4 27->28 31 faf1bb-faf1c8 28->31 34 faf1da-faf1dc 31->34 35 faf1ca 31->35 32->28 39 faf0ab-faf0b9 call fb4950 33->39 40 faf0a2-faf0a6 33->40 34->3 34->18 37 faf1d0-faf1d8 35->37 37->34 37->37 43 faf0bb-faf0bf 39->43 44 faf0c4-faf0d2 call fb4950 39->44 40->28 43->28 47 faf0dd-faf0eb call fb4950 44->47 48 faf0d4-faf0d8 44->48 51 faf0ed-faf0f1 47->51 52 faf0f6-faf104 call fb4950 47->52 48->28 51->28 55 faf10f-faf11d call fb4950 52->55 56 faf106-faf10a 52->56 59 faf129-faf137 call fb4950 55->59 60 faf11f-faf124 55->60 56->28 64 faf139-faf13e 59->64 65 faf140-faf14e call fb4950 59->65 61 faf1b1 60->61 61->28 64->61 68 faf150-faf155 65->68 69 faf157-faf165 call fb4950 65->69 68->61 72 faf16e-faf17c call fb4950 69->72 73 faf167-faf16c 69->73 76 faf17e-faf183 72->76 77 faf185-faf193 call fb4950 72->77 73->61 76->61 80 faf19c-faf1aa call fb4950 77->80 81 faf195-faf19a 77->81 80->31 84 faf1ac 80->84 81->61 84->61
            APIs
            • RegOpenKeyExW.KERNEL32(80000002,SYSTEM\CurrentControlSet\Control\ProductOptions,00000000,00020119,00000000), ref: 00FAEF70
            • RegQueryValueExW.KERNEL32(00000000,ProductType,00000000,00000000,?), ref: 00FAEFAB
            • RegQueryValueExW.KERNEL32(00000000,ProductSuite,00000000,00000000,?,?), ref: 00FAF026
            • RegCloseKey.KERNEL32(00000000), ref: 00FAF1FE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: QueryValue$CloseOpen
            • String ID: BackOffice$Blade$CommunicationServer$Compute Server$DataCenter$Embedded(Restricted)$EmbeddedNT$Enterprise$Personal$ProductSuite$ProductType$SYSTEM\CurrentControlSet\Control\ProductOptions$Security Appliance$ServerNT$Small Business$Small Business(Restricted)$Storage Server$Terminal Server$WinNT
            • API String ID: 1586453840-3149529848
            • Opcode ID: e73346bbbd5d8ce6c03d9acec149d3ade13fef72c92a3e1656a16736283755db
            • Instruction ID: 02142cbe7ec306ebf9cdfd38f3f7f7a972d296006a9df548f2f3aff8c1d4dac1
            • Opcode Fuzzy Hash: e73346bbbd5d8ce6c03d9acec149d3ade13fef72c92a3e1656a16736283755db
            • Instruction Fuzzy Hash: 8471FA71F00309CAEB24DB61CE407AB7265EF42354F1081B59916AF282F778DD49AF80

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 85 faeb70-faebe6 RegOpenKeyExW 87 faeeab-faeec4 85->87 88 faebec-faec4d RegQueryValueExW * 2 85->88 91 faeec6-faeecd RegCloseKey 87->91 92 faeed7-faeef0 call 105cb75 87->92 89 faecab-faecec RegQueryValueExW 88->89 90 faec4f-faec81 RegQueryValueExW 88->90 94 faed18 89->94 95 faecee-faed16 call fb48b0 89->95 90->89 93 faec83-faec8b 90->93 91->92 93->93 97 faec8d-faec90 93->97 100 faed1e-faed26 94->100 95->100 97->89 101 faec92-faeca5 97->101 103 faed3b-faed66 RegQueryValueExW 100->103 104 faed28-faed36 100->104 101->89 105 faed68-faed88 call fb48b0 103->105 106 faed8d-faedb8 RegQueryValueExW 103->106 104->103 105->106 108 faedba-faedc9 106->108 109 faee0f-faee22 106->109 111 faedcb-faedd4 108->111 112 faede5-faedf3 108->112 113 faee6b-faee73 109->113 114 faee24-faee38 call 105d07e 109->114 117 faedd6-faede3 111->117 118 faedff-faee0a 112->118 119 faedf5-faedfd 112->119 115 faee9f 113->115 116 faee75-faee91 GetCurrentProcess IsWow64Process 113->116 114->113 125 faee3a-faee68 GetModuleHandleW GetProcAddress call 105d034 114->125 122 faeea1-faeea6 call faef00 115->122 116->115 121 faee93-faee9d 116->121 117->112 117->117 118->109 119->118 119->119 121->122 122->87 125->113
            APIs
            • RegOpenKeyExW.KERNEL32(80000002,Software\Microsoft\Windows NT\CurrentVersion,00000000,00020119,00000000), ref: 00FAEBDE
            • RegQueryValueExW.KERNEL32(00000000,CurrentMajorVersionNumber,00000000,00000000,?,?), ref: 00FAEC25
            • RegQueryValueExW.KERNEL32(00000000,CurrentMinorVersionNumber,00000000,00000000,?,00000004), ref: 00FAEC44
            • RegQueryValueExW.ADVAPI32(00000000,CurrentVersion,00000000,00000000,?,?), ref: 00FAEC73
            • RegQueryValueExW.KERNEL32(00000000,CurrentBuildNumber,00000000,00000000,?,?), ref: 00FAECE8
            • RegQueryValueExW.KERNEL32(00000000,ReleaseId,00000000,00000000,?,?), ref: 00FAED62
            • RegQueryValueExW.KERNEL32(00000000,CSDVersion,00000000,00000000,?,?), ref: 00FAEDB4
            • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 00FAEE48
            • GetProcAddress.KERNEL32(00000000), ref: 00FAEE4F
            • __Init_thread_footer.LIBCMT ref: 00FAEE63
            • GetCurrentProcess.KERNEL32(?), ref: 00FAEE86
            • IsWow64Process.KERNEL32(00000000), ref: 00FAEE8D
            • RegCloseKey.ADVAPI32(00000000), ref: 00FAEEC7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: QueryValue$Process$AddressCloseCurrentHandleInit_thread_footerModuleOpenProcWow64
            • String ID: CSDVersion$CurrentBuildNumber$CurrentMajorVersionNumber$CurrentMinorVersionNumber$CurrentVersion$IsWow64Process$ReleaseId$Software\Microsoft\Windows NT\CurrentVersion$kernel32
            • API String ID: 1906320730-3583743485
            • Opcode ID: 94d0ef8af61c0b23761d6cf5a395985d2b1695e8ffef045f67b4ed53ff925d8e
            • Instruction ID: be7a027ceb70cd433991c450c3ff108682980fbb2712f353650abf98bbca4471
            • Opcode Fuzzy Hash: 94d0ef8af61c0b23761d6cf5a395985d2b1695e8ffef045f67b4ed53ff925d8e
            • Instruction Fuzzy Hash: D29190B1D003289EDB35CF54CC45BEAB7B5FB45B20F0042EAE819A7280EB759A94CF54

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 746 f90780-f907be call e8acf0 749 f9083e-f9089b call e8a9b0 call f90ca0 call fa97f0 746->749 750 f907c0-f907ec 746->750 764 f908a0-f908bf call e8a4e0 749->764 754 f9080b-f90826 call f92520 750->754 755 f907ee-f90809 call f92520 750->755 763 f90829-f9083b 754->763 755->763 767 f908c1-f908ea call f90db0 call ea2b70 764->767 768 f90910-f90962 call f92690 GetModuleHandleW 764->768 781 f908ec-f908ef 767->781 782 f908f4-f9090a MoveFileW call fa97f0 767->782 774 f9099c-f909a3 768->774 775 f90964-f90978 call 105d07e 768->775 778 f909ac-f909ba 774->778 779 f909a5 774->779 775->774 787 f9097a-f90999 GetProcAddress call 105d034 775->787 783 f909bc-f909d0 call 105d07e 778->783 784 f909f4-f909fb 778->784 779->778 781->782 782->768 799 f90c91-f90c9b call 1068467 782->799 783->784 800 f909d2-f909f1 GetProcAddress call 105d034 783->800 785 f909fd 784->785 786 f90a04-f90a12 784->786 785->786 790 f90a4c-f90a53 786->790 791 f90a14-f90a28 call 105d07e 786->791 787->774 797 f90a5c-f90c07 790->797 798 f90a55 790->798 791->790 805 f90a2a-f90a49 GetProcAddress call 105d034 791->805 803 f90c11-f90c23 call f664f0 797->803 798->797 800->784 811 f90c25-f90c45 call f92180 803->811 805->790 815 f90c4f-f90c64 811->815 816 f90c47-f90c4a 811->816 817 f90c6e-f90c90 call 105cb75 815->817 818 f90c66-f90c69 815->818 816->815 818->817
            APIs
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            • MoveFileW.KERNEL32(?,?), ref: 00F908FA
            • GetModuleHandleW.KERNEL32(kernel32,?), ref: 00F9093C
            • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00F90984
            • GetProcAddress.KERNEL32(00000000,SetDllDirectory), ref: 00F909DC
            • __Init_thread_footer.LIBCMT ref: 00F909EC
            • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00F90A34
            • __Init_thread_footer.LIBCMT ref: 00F90994
              • Part of subcall function 0105D034: EnterCriticalSection.KERNEL32(0117BF4C,?,?,00E8AE07,0117CB7C,010E6B00), ref: 0105D03E
              • Part of subcall function 0105D034: LeaveCriticalSection.KERNEL32(0117BF4C,?,00E8AE07,0117CB7C,010E6B00), ref: 0105D071
              • Part of subcall function 0105D034: RtlWakeAllConditionVariable.NTDLL ref: 0105D0E8
            • __Init_thread_footer.LIBCMT ref: 00F90A44
              • Part of subcall function 00F664F0: GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00F66531
            Strings
            • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try del "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls, xrefs: 00F907F2
            • kernel32.dll, xrefs: 00F90B3F
            • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1rd "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r ", xrefs: 00F90810, 00F9081F
            • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1del "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r ", xrefs: 00F90817
            • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try rd "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls, xrefs: 00F907F7, 00F907FF
            • kernel32, xrefs: 00F90937
            • SetDllDirectory, xrefs: 00F909D6
            • SetDefaultDllDirectories, xrefs: 00F90A2E
            • SetSearchPathMode, xrefs: 00F9097E
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Init_thread_footer$AddressProc$CriticalSection$ConditionDirectoryEnterFileHandleHeapLeaveModuleMoveProcessSystemVariableWake
            • String ID: @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try del "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls$@echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try rd "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls$@echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1rd "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r "$@echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1del "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r "$SetDefaultDllDirectories$SetDllDirectory$SetSearchPathMode$kernel32$kernel32.dll
            • API String ID: 3437638698-3455668873
            • Opcode ID: f44bd0ed9d77159cd275ed9296ccb53555af5c8d03b3291964db35a0b8de1ac0
            • Instruction ID: 698baa63047a65153f60e0d92ae1012e8ab65db9770b7a112b177139d751402a
            • Opcode Fuzzy Hash: f44bd0ed9d77159cd275ed9296ccb53555af5c8d03b3291964db35a0b8de1ac0
            • Instruction Fuzzy Hash: 80E17AB09003899FDF2ADF54DA49B9E7BF4BF05314F148119E818AB281DBB49A48CF91
            APIs
            • GetActiveWindow.USER32 ref: 00FC4E30
            • SetLastError.KERNEL32(0000000E), ref: 00FC4E4D
            • GetCurrentThreadId.KERNEL32 ref: 00FC4E65
            • EnterCriticalSection.KERNEL32(0118297C), ref: 00FC4E82
            • LeaveCriticalSection.KERNEL32(0118297C), ref: 00FC4EA5
            • DialogBoxParamW.USER32(000007D0,00000000,00EFC5E0,00000000), ref: 00FC4EC2
            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00FC5074
            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 00FC50A8
              • Part of subcall function 00F92490: MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,00000000,00000000,?,?,0117D68C,00FDDE10,?), ref: 00F924A8
              • Part of subcall function 00F92490: MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,?,-00000001), ref: 00F924DA
            • SetEvent.KERNEL32(?,?,00000000,?,00000001), ref: 00FC527D
            • SetEvent.KERNEL32(?,?,00000000,?), ref: 00FC52EF
              • Part of subcall function 00FD2050: DeleteFileW.KERNEL32(?,?,?,?,?,00FC531F,?), ref: 00FD207B
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ByteCharMultiWide$CriticalEventInit_thread_footerSection$ActiveCurrentDeleteDialogEnterErrorFileHeapLastLeaveParamProcessThreadWindow
            • String ID: v$Advinst_Extract_$Code returned to Windows by setup:$FILES.7z
            • API String ID: 2923632737-2516696193
            • Opcode ID: 72dd87cfa4d78117b60f6ae6fddc2cafc3d8b5fd9c150fc64d383df26054b7ef
            • Instruction ID: c60deb5c42f6e13dad2b92b6d5119a06fc8a9d6b2f076994151bfe5ccea98f91
            • Opcode Fuzzy Hash: 72dd87cfa4d78117b60f6ae6fddc2cafc3d8b5fd9c150fc64d383df26054b7ef
            • Instruction Fuzzy Hash: D192F230D00249DFDB14DBA8CD49BDEBBB4AF45310F1481ADE409AB292DB74AE84DF91
            APIs
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00FC5074
            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 00FC50A8
              • Part of subcall function 00E8A2A0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,?,?,?,*.*,?,80070057,9F3ADAE5), ref: 00E8A2C3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ByteCharInit_thread_footerMultiWide$FindHeapProcessResource
            • String ID: %hu$A valid language was received from commnad line. This is:$AI_BOOTSTRAPPERLANGS$Advinst_Extract_$Code returned to Windows by setup:$Language of a related product is:$Language selected programatically for UI:$Language used for UI:$Languages of setup:$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\$Software\Caphyon\Advanced Installer\
            • API String ID: 1419962739-297406034
            • Opcode ID: 3d8e4fa59efac35dcb579d070d0d4ca3ee12af51702cc0794f4a11025f4416cc
            • Instruction ID: d4c26c418894e0e5374ebd85a142eb761224d087dd08a88f3033e224d4c5794b
            • Opcode Fuzzy Hash: 3d8e4fa59efac35dcb579d070d0d4ca3ee12af51702cc0794f4a11025f4416cc
            • Instruction Fuzzy Hash: B352167090160A9FDB14DF68CD46FEEB7B4EF41720F1841ACE819AB291DB74AE44CB90

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1756 fd39b0-fd39e1 1757 fd39e7-fd3a01 GetActiveWindow 1756->1757 1758 fd3ba6-fd3bb7 1756->1758 1759 fd3a0f-fd3a17 1757->1759 1760 fd3a03-fd3a05 call fcb180 1757->1760 1762 fd3a19-fd3a23 call 105c722 1759->1762 1763 fd3a32-fd3a41 call 105c824 1759->1763 1764 fd3a0a KiUserCallbackDispatcher 1760->1764 1762->1763 1769 fd3a25-fd3a2d SetLastError 1762->1769 1770 fd3bcf-fd3bd6 call e9a040 1763->1770 1771 fd3a47-fd3aac GetCurrentThreadId EnterCriticalSection CreateDialogParamW 1763->1771 1764->1759 1772 fd3ab2-fd3ac9 GetCurrentThreadId 1769->1772 1775 fd3bdb-fd3be5 call e8a9b0 1770->1775 1771->1772 1778 fd3b2e 1772->1778 1779 fd3acb-fd3ad2 1772->1779 1782 fd3b31-fd3b59 SetWindowTextW GetDlgItem SetWindowTextW 1778->1782 1780 fd3ae5-fd3b22 call face00 call e89d10 1779->1780 1781 fd3ad4-fd3ae0 call ea2b70 call fb3f30 1779->1781 1780->1782 1795 fd3b24-fd3b2c 1780->1795 1781->1780 1782->1758 1786 fd3b5b-fd3b64 call e8acf0 1782->1786 1786->1775 1793 fd3b66-fd3b88 call e8a2a0 1786->1793 1800 fd3bba-fd3bcd GetDlgItem SetWindowTextW 1793->1800 1801 fd3b8a-fd3b9c 1793->1801 1795->1782 1800->1801 1801->1758 1802 fd3b9e-fd3ba1 1801->1802 1802->1758
            APIs
            • GetActiveWindow.USER32 ref: 00FD39EA
            • SetLastError.KERNEL32(0000000E,?,?), ref: 00FD3A27
            • GetCurrentThreadId.KERNEL32 ref: 00FD3AB2
            • SetWindowTextW.USER32(?,00000000), ref: 00FD3B3C
            • GetDlgItem.USER32(?,000003E9), ref: 00FD3B46
            • SetWindowTextW.USER32(00000000,?), ref: 00FD3B52
            • GetDlgItem.USER32(?,00000002), ref: 00FD3BBF
            • SetWindowTextW.USER32(00000000,?), ref: 00FD3BC7
              • Part of subcall function 00FCB180: GetDlgItem.USER32(?,00000002), ref: 00FCB1A0
              • Part of subcall function 00FCB180: GetWindowRect.USER32(00000000,?), ref: 00FCB1B6
              • Part of subcall function 00FCB180: ShowWindow.USER32(00000000,00000000,?,?,?,?,?,?,?,00FD3A0A,?,?), ref: 00FCB1CF
              • Part of subcall function 00FCB180: InvalidateRect.USER32(00000000,00000000,00000001,?,?,?,?,?,?,?,00FD3A0A,?,?), ref: 00FCB1DA
              • Part of subcall function 00FCB180: GetDlgItem.USER32(00000000,000003E9), ref: 00FCB1EC
              • Part of subcall function 00FCB180: GetWindowRect.USER32(00000000,?), ref: 00FCB202
              • Part of subcall function 00FCB180: SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000206,?,?,?,?,?,?,?,00FD3A0A), ref: 00FCB245
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$Item$RectText$ActiveCurrentErrorInvalidateLastShowThread
            • String ID: v
            • API String ID: 127311041-3261393531
            • Opcode ID: df9b4f1a9e8220b5718d83e31bbd2c988e58b241bab92c245452b1382448a68e
            • Instruction ID: 0ce0cf3042b7663e5f81eef4db6643aa49f4e99b61895d53df9178e20a4d5f2b
            • Opcode Fuzzy Hash: df9b4f1a9e8220b5718d83e31bbd2c988e58b241bab92c245452b1382448a68e
            • Instruction Fuzzy Hash: A5612531900600DFDB21EF68C848B49BBF5FF44320F18826AF969AB391D774AA44CF91

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1957 105c4b4-105c4bf 1958 105c4c1-105c4cd DecodePointer 1957->1958 1959 105c4ce-105c4e5 LoadLibraryExA 1957->1959 1960 105c4e7-105c4fc call 105c564 1959->1960 1961 105c55f 1959->1961 1960->1961 1965 105c4fe-105c513 call 105c564 1960->1965 1962 105c561-105c563 1961->1962 1965->1961 1968 105c515-105c52a call 105c564 1965->1968 1968->1961 1971 105c52c-105c541 call 105c564 1968->1971 1971->1961 1974 105c543-105c55d DecodePointer 1971->1974 1974->1962
            APIs
            • DecodePointer.KERNEL32(?,?,?,0105C7FA,0117BF04,00000000,?,?,00FE9771,?), ref: 0105C4C6
            • LoadLibraryExA.KERNEL32(atlthunk.dll,00000000,00000800,?,?,?,0105C7FA,0117BF04,00000000,?,?,00FE9771,?), ref: 0105C4DB
            • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00FE9771,?), ref: 0105C557
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: DecodePointer$LibraryLoad
            • String ID: AtlThunk_AllocateData$AtlThunk_DataToCode$AtlThunk_FreeData$AtlThunk_InitData$atlthunk.dll
            • API String ID: 1423960858-1745123996
            • Opcode ID: 9a75980ca9757df097d51c171ca210b9e197ea49d8f34be308986405b9e8fbb1
            • Instruction ID: 32b4c907fc96bfc5e40af184d5c062d306bc6db66f486fd7947b90ab4750a27e
            • Opcode Fuzzy Hash: 9a75980ca9757df097d51c171ca210b9e197ea49d8f34be308986405b9e8fbb1
            • Instruction Fuzzy Hash: 3201C831644315AFEB95D75A9E0AFCB3FE88B11D0CF040094FEC57B365DBA686C88689

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1975 fb3910-fb3956 call fae990 1978 fb395c-fb3978 SHGetFolderPathW 1975->1978 1979 fb3c20-fb3c28 call fb3cd0 1975->1979 1980 fb398a-fb3999 1978->1980 1981 fb397a 1978->1981 1988 fb3c2c-fb3c49 call 105cb75 1979->1988 1984 fb399b 1980->1984 1985 fb39b2-fb39c3 call f8e1e0 1980->1985 1983 fb3980-fb3988 1981->1983 1983->1980 1983->1983 1989 fb39a0-fb39a8 1984->1989 1993 fb39e7-fb3a11 call e917a0 call f9acc0 1985->1993 1994 fb39c5 1985->1994 1989->1989 1992 fb39aa-fb39ac 1989->1992 1992->1979 1992->1985 2002 fb3a13 1993->2002 2003 fb3a15-fb3a1e call e8acf0 1993->2003 1996 fb39d0-fb39dc 1994->1996 1996->1979 1998 fb39e2-fb39e5 1996->1998 1998->1993 1998->1996 2002->2003 2006 fb3c4c-fb3c51 call e8a9b0 2003->2006 2007 fb3a24-fb3a38 2003->2007 2010 fb3c56-fb3c99 call e8a9b0 2006->2010 2011 fb3a3a-fb3a40 2007->2011 2012 fb3a71 2007->2012 2020 fb3c9b-fb3c9d DeleteFileW 2010->2020 2021 fb3ca3-fb3cbc call 105d234 2010->2021 2014 fb3a53-fb3a58 2011->2014 2015 fb3a42-fb3a51 call e8a2a0 2011->2015 2017 fb3a73-fb3a7b call e8a830 2012->2017 2019 fb3a60-fb3a69 2014->2019 2026 fb3a80-fb3aa9 call e88960 * 2 2015->2026 2017->2026 2019->2019 2024 fb3a6b-fb3a6f 2019->2024 2020->2021 2024->2017 2032 fb3aab-fb3ab0 2026->2032 2033 fb3ad8-fb3b07 call 105eef0 GetTempFileNameW 2026->2033 2032->2010 2034 fb3ab6-fb3ab8 2032->2034 2039 fb3b09-fb3b0f call 105d234 2033->2039 2040 fb3b12-fb3b21 2033->2040 2034->2010 2036 fb3abe-fb3ac3 2034->2036 2036->2033 2038 fb3ac5-fb3ad2 call ea2c90 2036->2038 2038->2033 2039->2040 2043 fb3b2d-fb3b57 call 105d239 2040->2043 2044 fb3b23-fb3b2b 2040->2044 2049 fb3b7b-fb3bc8 Wow64DisableWow64FsRedirection CopyFileW 2043->2049 2050 fb3b59-fb3b62 2043->2050 2044->2043 2044->2044 2052 fb3bca-fb3bcd call fb3cd0 2049->2052 2053 fb3bd2-fb3bdd 2049->2053 2051 fb3b64-fb3b73 2050->2051 2051->2051 2054 fb3b75 2051->2054 2052->2053 2056 fb3bff-fb3c14 2053->2056 2057 fb3bdf-fb3bf9 Wow64RevertWow64FsRedirection 2053->2057 2054->2049 2056->1988 2058 fb3c16-fb3c1e 2056->2058 2057->2056 2058->1988
            APIs
              • Part of subcall function 00FAE990: __Init_thread_footer.LIBCMT ref: 00FAEA70
            • SHGetFolderPathW.SHELL32(00000000,00000024,00000000,00000000,?,9F3ADAE5,00000000,00000000,?), ref: 00FB396B
            • GetTempFileNameW.KERNEL32(?,shim_clone,00000000,?,?,00000000,00000000), ref: 00FB3AFD
            • Wow64DisableWow64FsRedirection.KERNEL32(00000000,?,?,00000000,00000000), ref: 00FB3B97
            • CopyFileW.KERNEL32(?,?,00000000,?,?,00000000,00000000), ref: 00FB3BB9
            • Wow64RevertWow64FsRedirection.KERNEL32(00000000,?,?,00000000), ref: 00FB3BE5
            • DeleteFileW.KERNEL32(?,9F3ADAE5,00000000,00000000,01084CA0,000000FF,?,80070057,80004005,?), ref: 00FB3C9D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Wow64$File$Redirection$CopyDeleteDisableFolderInit_thread_footerNamePathRevertTemp
            • String ID: shim_clone
            • API String ID: 896069032-3944563459
            • Opcode ID: 182d31f5f4ae55886a172e71ff0b8ab9f744f83e2574ac92394a486b97c7cd28
            • Instruction ID: 9f16d1394329610c7cdebb74c7892fd7a069aaf7b9d3cbad7a66954544294bd2
            • Opcode Fuzzy Hash: 182d31f5f4ae55886a172e71ff0b8ab9f744f83e2574ac92394a486b97c7cd28
            • Instruction Fuzzy Hash: D3A1D1B4A402589FDB24EB65CC44BEAB7F8EF44310F1480ADE94AA7281DB74AF44DF54

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2060 f90db0-f90e0c call f90ca0 call e8acf0 2065 f90efd-f90f74 call e8a9b0 FreeLibrary EnterCriticalSection 2060->2065 2066 f90e12 2060->2066 2070 f90fbe-f90fdf 2065->2070 2071 f90f76-f90f7a 2065->2071 2068 f90e15-f90e45 call e89d10 call fa97f0 2066->2068 2096 f90e7a-f90e8a 2068->2096 2097 f90e47-f90e5e 2068->2097 2079 f9101f-f91027 2070->2079 2080 f90fe1-f90fe5 2070->2080 2073 f90f8c-f90f8e 2071->2073 2074 f90f7c-f90f86 DestroyWindow 2071->2074 2073->2070 2078 f90f90-f90f94 2073->2078 2074->2073 2082 f90fa5-f90fbb call 105cb83 2078->2082 2083 f90f96-f90f9f call 1066a99 2078->2083 2089 f91029-f9102c 2079->2089 2090 f91053-f91061 2079->2090 2084 f90fe7-f90ff0 call 1066a99 2080->2084 2085 f90ff6-f90ffb 2080->2085 2082->2070 2083->2082 2084->2085 2092 f9100d-f9101c call 105cb83 2085->2092 2093 f90ffd-f91006 call 1066a99 2085->2093 2089->2090 2100 f9102e 2089->2100 2094 f9107d-f91091 call f93300 2090->2094 2095 f91063-f91067 2090->2095 2092->2079 2093->2092 2126 f91099-f910aa 2094->2126 2127 f91093 2094->2127 2106 f91069-f91070 2095->2106 2107 f91076-f9107b 2095->2107 2102 f90e8c-f90e90 2096->2102 2103 f90ed0-f90edf 2096->2103 2109 f90e68-f90e72 call e8acf0 2097->2109 2110 f90e60-f90e63 2097->2110 2101 f91030-f91035 2100->2101 2112 f9103d-f91051 2101->2112 2113 f91037-f91039 2101->2113 2114 f90ec2-f90ec8 call e8a830 2102->2114 2115 f90e92-f90e96 2102->2115 2120 f90ee9-f90efc 2103->2120 2121 f90ee1-f90ee4 2103->2121 2106->2107 2107->2094 2107->2095 2109->2065 2128 f90e78 2109->2128 2110->2109 2112->2090 2112->2101 2113->2112 2131 f90ecd 2114->2131 2115->2114 2122 f90e98-f90eae call e8a4e0 2115->2122 2121->2120 2133 f90ebb-f90ec0 2122->2133 2134 f90eb0-f90eb8 2122->2134 2127->2126 2128->2068 2131->2103 2133->2131 2134->2133
            APIs
              • Part of subcall function 00F90DB0: GetModuleFileNameW.KERNEL32(00000000,?,00000104,9F3ADAE5,00000000,?,010C4546,000000FF), ref: 00F90CF8
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            • FreeLibrary.KERNEL32(00000001,9F3ADAE5,?,00000001,?,?,?), ref: 00F90F47
            • EnterCriticalSection.KERNEL32(0117D628), ref: 00F90F62
            • DestroyWindow.USER32(00000000), ref: 00F90F80
            • LeaveCriticalSection.KERNEL32(0117D628), ref: 00F90FC9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalInit_thread_footerSection$DestroyEnterFileFreeHeapLeaveLibraryModuleNameProcessWindow
            • String ID: v$%s%lu$.local
            • API String ID: 3496055493-1141559199
            • Opcode ID: 74f12c88310a7527799d28415310a2e13c84de5586dc1cce136451077952a9a2
            • Instruction ID: b07a48e3fcb267d75fb5505062ddcf1bb5dd0f19b3a242167c26bf1ed9126ff4
            • Opcode Fuzzy Hash: 74f12c88310a7527799d28415310a2e13c84de5586dc1cce136451077952a9a2
            • Instruction Fuzzy Hash: 0391E071A00205DFEB20DFA8C844B6ABBF4FF04724F14866DE859AB381DB75A944CB91

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2136 e9a130-e9a15e 2137 e9a189-e9a198 call 105c824 2136->2137 2138 e9a160-e9a16a call 105c722 2136->2138 2144 e9a19a-e9a19f 2137->2144 2145 e9a174-e9a186 2137->2145 2138->2137 2143 e9a16c-e9a16e SetLastError 2138->2143 2143->2145 2146 e9a1a5-e9a1a7 2144->2146 2147 e9a267-e9a289 call e9a040 2144->2147 2146->2147 2149 e9a1ad-e9a202 GetCurrentThreadId EnterCriticalSection 2146->2149 2151 e9a28b-e9a293 2147->2151 2152 e9a296-e9a29e 2147->2152 2154 e9a211-e9a264 CreateWindowExW 2149->2154 2155 e9a204-e9a20e 2149->2155 2156 e9a2a0-e9a2ce call e99bd0 call e9a130 2152->2156 2157 e9a2d3-e9a2dd 2152->2157 2155->2154 2156->2157
            APIs
            • SetLastError.KERNEL32(0000000E,9F3ADAE5,?,?,00000000,?), ref: 00E9A16E
            • GetCurrentThreadId.KERNEL32 ref: 00E9A1AF
            • EnterCriticalSection.KERNEL32(0118297C), ref: 00E9A1CF
            • LeaveCriticalSection.KERNEL32(0118297C), ref: 00E9A1F3
            • CreateWindowExW.USER32(00000000,00000000,00000000,0118297C,?,80000000,00000000,80000000,00000000,00000000,00000000), ref: 00E9A24E
              • Part of subcall function 0105C722: GetProcessHeap.KERNEL32(00000008,00000008,00000000,00FD3A1E,?,?), ref: 0105C727
              • Part of subcall function 0105C722: HeapAlloc.KERNEL32(00000000,?,?), ref: 0105C72E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalHeapSection$AllocCreateCurrentEnterErrorLastLeaveProcessThreadWindow
            • String ID: v$AXWIN UI Window
            • API String ID: 213679520-2690018532
            • Opcode ID: 90f389ec9696c66b092cb612d41b3c428a482fdd550dfe18daebf0f5eba56af3
            • Instruction ID: b8d01d2709665b1136d6c22c04b347f952fb7ca38fcf8d76d2ed059a7133bf4e
            • Opcode Fuzzy Hash: 90f389ec9696c66b092cb612d41b3c428a482fdd550dfe18daebf0f5eba56af3
            • Instruction Fuzzy Hash: 3451A271A04305AFDB21DF59DD05BAABBF4FF88B14F14812AFD54A7280D776A810CBA1

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2161 facbb0-facc09 LoadLibraryW 2162 facc0b-facc19 GetProcAddress 2161->2162 2163 facc34-facc79 GetSystemMetrics * 2 2161->2163 2162->2163 2164 facc1b-facc28 2162->2164 2167 facc7c-facc8c 2163->2167 2166 facc2b-facc2d 2164->2166 2166->2163 2168 facc2f-facc32 2166->2168 2169 facc8e-facc95 FreeLibrary 2167->2169 2170 facc9c-faccaf 2167->2170 2168->2167 2169->2170
            APIs
            • LoadLibraryW.KERNEL32(ComCtl32.dll,9F3ADAE5,?,?,00000000), ref: 00FACBEE
            • GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 00FACC11
            • GetSystemMetrics.USER32(0000000C), ref: 00FACC4C
            • GetSystemMetrics.USER32(0000000B), ref: 00FACC62
            • FreeLibrary.KERNEL32(00000000), ref: 00FACC8F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: LibraryMetricsSystem$AddressFreeLoadProc
            • String ID: ComCtl32.dll$LoadIconMetric
            • API String ID: 499052680-764666640
            • Opcode ID: 4b1482ffc298ebe89ea25741cbc8851ff36346499d0c4e17969cfb10dfaef6ca
            • Instruction ID: 04fcba79178b326b4795d631956a6c6b7550f9028f8c9f73b4544df5fe1520f6
            • Opcode Fuzzy Hash: 4b1482ffc298ebe89ea25741cbc8851ff36346499d0c4e17969cfb10dfaef6ca
            • Instruction Fuzzy Hash: FB3150B1E04259ABDB15CF95DC44BAFBFF8EB49764F00416AF919A7380D7B989008B90

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2171 fed630-fed67b call fa4ee0 2174 fed67d-fed682 2171->2174 2175 fed687-fed695 2171->2175 2176 fed831-fed85b call 105d234 2174->2176 2177 fed6a0-fed6c1 2175->2177 2179 fed6cb-fed6e2 SetFilePointer 2177->2179 2180 fed6c3-fed6c9 2177->2180 2182 fed6e4-fed6ec GetLastError 2179->2182 2183 fed6f2-fed707 ReadFile 2179->2183 2180->2179 2182->2183 2184 fed82c 2182->2184 2183->2184 2185 fed70d-fed714 2183->2185 2184->2176 2185->2184 2186 fed71a-fed72b 2185->2186 2186->2177 2187 fed731-fed73d 2186->2187 2188 fed740-fed744 2187->2188 2189 fed746-fed74f 2188->2189 2190 fed751-fed755 2188->2190 2189->2188 2189->2190 2191 fed778-fed77a 2190->2191 2192 fed757-fed75d 2190->2192 2194 fed77d-fed77f 2191->2194 2192->2191 2193 fed75f-fed762 2192->2193 2197 fed774-fed776 2193->2197 2198 fed764-fed76a 2193->2198 2195 fed794-fed796 2194->2195 2196 fed781-fed784 2194->2196 2200 fed798-fed7a1 2195->2200 2201 fed7a6-fed7cc SetFilePointer 2195->2201 2196->2187 2199 fed786-fed78f 2196->2199 2197->2194 2198->2191 2202 fed76c-fed772 2198->2202 2199->2177 2200->2177 2201->2184 2203 fed7ce-fed7e3 ReadFile 2201->2203 2202->2191 2202->2197 2203->2184 2204 fed7e5-fed7e9 2203->2204 2204->2184 2205 fed7eb-fed7f5 2204->2205 2206 fed80f-fed814 2205->2206 2207 fed7f7-fed7fd 2205->2207 2206->2176 2207->2206 2208 fed7ff-fed807 2207->2208 2208->2206 2209 fed809-fed80d 2208->2209 2209->2206 2210 fed816-fed82a 2209->2210 2210->2176
            APIs
            • SetFilePointer.KERNEL32(010D5D7D,-00000400,?,00000002,00000400,9F3ADAE5,?,?,?), ref: 00FED6D6
            • GetLastError.KERNEL32(?,?), ref: 00FED6E4
            • ReadFile.KERNEL32(010D5D7D,00000000,00000400,?,00000000,?,?), ref: 00FED6FF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: File$ErrorLastPointerRead
            • String ID: ADVINSTSFX
            • API String ID: 64821003-4038163286
            • Opcode ID: d92b57a09ad78bef378b27b336093813c53c5a2fd180222c5fab8fd24780bc5a
            • Instruction ID: 45e2a0b5af61ca311b3c30632c280218271f9b6224e657a30611d98e63381887
            • Opcode Fuzzy Hash: d92b57a09ad78bef378b27b336093813c53c5a2fd180222c5fab8fd24780bc5a
            • Instruction Fuzzy Hash: 9761C371E002499BDB10CF6AC884BBEBBB6FF45324F244255E915AB680D7359D41DBA0

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2211 e99e81-e99f09 call ea3d50 2213 e99f0b-e99f14 2211->2213 2214 e99f7f-e99f84 2211->2214 2217 e99f2c-e99f5e GetWindowLongW CallWindowProcW 2213->2217 2218 e99f16-e99f2a CallWindowProcW 2213->2218 2215 e99faf-e99fbd 2214->2215 2216 e99f86-e99f88 2214->2216 2216->2215 2219 e99f8a-e99fac 2216->2219 2220 e99f7b 2217->2220 2221 e99f60-e99f6b GetWindowLongW 2217->2221 2218->2214 2220->2214 2221->2220 2222 e99f6d-e99f75 SetWindowLongW 2221->2222 2222->2220
            APIs
            • CallWindowProcW.USER32(?,?,?,?,00000024), ref: 00E99F20
            • GetWindowLongW.USER32(?,000000FC), ref: 00E99F35
            • CallWindowProcW.USER32(?,?,00000082,?,00000024), ref: 00E99F4B
            • GetWindowLongW.USER32(?,000000FC), ref: 00E99F65
            • SetWindowLongW.USER32(?,000000FC,?), ref: 00E99F75
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$Long$CallProc
            • String ID: $
            • API String ID: 513923721-3993045852
            • Opcode ID: 35335d0d60434a473476fc5520e9ab1cf5ad33d8162ac2137978832140b35178
            • Instruction ID: 0a208ebf87f7eb858137a03207f2fdb83774c6960abcd14e439da1caade964f0
            • Opcode Fuzzy Hash: 35335d0d60434a473476fc5520e9ab1cf5ad33d8162ac2137978832140b35178
            • Instruction Fuzzy Hash: A341F171208700AFC724DF19C884A1BFBF5FB89724F505A2EF5A6876A1D772E8448B51

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2225 ea4650-ea468c 2226 ea4699-ea46be EnterCriticalSection call 1066f2b 2225->2226 2227 ea468e-ea4697 InitializeCriticalSection 2225->2227 2230 ea46c0-ea46cc 2226->2230 2231 ea46d5-ea46dd 2226->2231 2227->2226 2230->2231 2232 ea46ce-ea46d0 call ea43c0 2230->2232 2233 ea46df-ea46f1 KillTimer call ea4100 2231->2233 2234 ea46f3-ea470b 2231->2234 2232->2231 2242 ea4762-ea476e 2233->2242 2235 ea470d 2234->2235 2236 ea4746-ea475c call ea4100 SetTimer 2234->2236 2240 ea4712-ea4716 2235->2240 2236->2242 2243 ea4718-ea471b 2240->2243 2244 ea471d-ea472d 2240->2244 2247 ea4780-ea4793 2242->2247 2248 ea4770-ea477e 2242->2248 2246 ea4730-ea4734 2243->2246 2244->2246 2246->2236 2249 ea4736-ea473e 2246->2249 2248->2247 2249->2240 2250 ea4740-ea4744 2249->2250 2250->2240
            APIs
            • InitializeCriticalSection.KERNEL32(9F3ADAE5,9F3ADAE5,?), ref: 00EA468F
            • EnterCriticalSection.KERNEL32(?,9F3ADAE5,?), ref: 00EA469C
            • KillTimer.USER32(?,00000001), ref: 00EA46E4
            • SetTimer.USER32(?,00000001,?,00000000), ref: 00EA475C
            • LeaveCriticalSection.KERNEL32(?,?,00000000,?), ref: 00EA4773
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalSection$Timer$EnterInitializeKillLeave
            • String ID: v
            • API String ID: 160562401-3261393531
            • Opcode ID: 69e702f8dce53e0946e300b3c9c7b974ae5f8a972092a820e17d84a949fc79e7
            • Instruction ID: 697dca65a495f6ce665683bfa13624bc748b7805ec38c99c002b88c9e68cbe4e
            • Opcode Fuzzy Hash: 69e702f8dce53e0946e300b3c9c7b974ae5f8a972092a820e17d84a949fc79e7
            • Instruction Fuzzy Hash: 3F41E4B42007418FDB21DF38D840BAABBB5EF9B314F10552AE596AB381CB71B9158B50
            APIs
            • GetDlgItem.USER32(?,00000002), ref: 00FCB1A0
            • GetWindowRect.USER32(00000000,?), ref: 00FCB1B6
            • ShowWindow.USER32(00000000,00000000,?,?,?,?,?,?,?,00FD3A0A,?,?), ref: 00FCB1CF
            • InvalidateRect.USER32(00000000,00000000,00000001,?,?,?,?,?,?,?,00FD3A0A,?,?), ref: 00FCB1DA
            • GetDlgItem.USER32(00000000,000003E9), ref: 00FCB1EC
            • GetWindowRect.USER32(00000000,?), ref: 00FCB202
            • SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000206,?,?,?,?,?,?,?,00FD3A0A), ref: 00FCB245
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$Rect$Item$InvalidateShow
            • String ID:
            • API String ID: 2147159307-0
            • Opcode ID: 18aef61c56c05b08b5c6b74aa122701ce5886da22a513b1cfbea9838fd7e4e08
            • Instruction ID: ff7bf37c197489f4ef80dbbdba5f0fc5e309cbc3b968a2dad68600f3af6b798a
            • Opcode Fuzzy Hash: 18aef61c56c05b08b5c6b74aa122701ce5886da22a513b1cfbea9838fd7e4e08
            • Instruction Fuzzy Hash: 10213B71608301AFE314DF24D949A6B7BE9EF8D710F00862DF859D7291E730DD818B56
            APIs
            • PathIsUNCW.SHLWAPI(?,9F3ADAE5,?,?,?,?,?,?,010C8765,000000FF,?,00FCE484,?,?,?), ref: 00FA9DEB
            • CreateDirectoryW.KERNEL32(?,00000000,?,00000000,0110525C,00000001,?), ref: 00FA9EAA
            • GetLastError.KERNEL32 ref: 00FA9EB8
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CreateDirectoryErrorLastPath
            • String ID:
            • API String ID: 953296794-0
            • Opcode ID: f8fcb438fa70853aa2ea29165e968edca3534ce40c7621a2e618e3744c43f9c5
            • Instruction ID: ff2db0945206780a9ae9fa3de08284cf8592d387fd2ea39f9ed0586887347fe2
            • Opcode Fuzzy Hash: f8fcb438fa70853aa2ea29165e968edca3534ce40c7621a2e618e3744c43f9c5
            • Instruction Fuzzy Hash: 1D81D171E046089FDB10DFA8C885B9DBBF4EF06320F244269E924E72D0DB759904CBA0
            APIs
            • CreateThread.KERNEL32(00000000,00000000,00FEF6B0,01111934,00000000,?), ref: 00FD3C6D
            • GetLastError.KERNEL32 ref: 00FD3C7A
            • WaitForSingleObject.KERNEL32(00000000,FFFFFFFF), ref: 00FD3CA3
            • GetExitCodeThread.KERNEL32(00000000,?), ref: 00FD3CBD
            • TerminateThread.KERNEL32(00000000,00000000), ref: 00FD3CD5
            • CloseHandle.KERNEL32(00000000), ref: 00FD3CDE
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Thread$CloseCodeCreateErrorExitHandleLastObjectSingleTerminateWait
            • String ID:
            • API String ID: 1566822279-0
            • Opcode ID: 4004970c65e3f55e992283aeab7b93ada728255aac72a738064f5a4c659a1037
            • Instruction ID: e83e8849542349dcfd427cdbe1c1ca399bc195c3950392b8edcfa0e75841dad4
            • Opcode Fuzzy Hash: 4004970c65e3f55e992283aeab7b93ada728255aac72a738064f5a4c659a1037
            • Instruction Fuzzy Hash: C131C775910209AFDF20DFA5C908BDDBBF5FB08724F504229E960BB290D7799A04CBA5
            APIs
            • GetFileVersionInfoSizeW.KERNELBASE(80004005,010D0985,9F3ADAE5,?,?,00000000,?,?,00000000,010D0985,000000FF,?,80004005,9F3ADAE5,?), ref: 00FB3F95
            • GetFileVersionInfoW.KERNELBASE(80004005,?,00000000,000000FF,00000000,?,00000000,?,?,00000000,010D0985,000000FF,?,80004005,9F3ADAE5,?), ref: 00FB3FE3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: FileInfoVersion$Size
            • String ID: ProductName$\StringFileInfo\%04x%04x\%s$\VarFileInfo\Translation
            • API String ID: 2104008232-2149928195
            • Opcode ID: 491f1e139ec344d88720150a709563ee09ca5b66110a323748ad9cadfc74dcff
            • Instruction ID: 5e8c34c46ed8f184f55a8020e964890c03b9e8ed5a354ace6e7f0b90de3d9d79
            • Opcode Fuzzy Hash: 491f1e139ec344d88720150a709563ee09ca5b66110a323748ad9cadfc74dcff
            • Instruction Fuzzy Hash: C761B171D001099FDB14EFA9C948AEEBBF8FF14320F144169E915A7292EB34AD04DFA0
            APIs
              • Part of subcall function 00FB3910: SHGetFolderPathW.SHELL32(00000000,00000024,00000000,00000000,?,9F3ADAE5,00000000,00000000,?), ref: 00FB396B
            • GetFileVersionInfoSizeW.KERNELBASE(?,000000FF,Shlwapi.dll,9F3ADAE5,00000000,?,?,00000000,010C9E75,000000FF,Shlwapi.dll,00FB3DD6,?,?,?), ref: 00FB3E6D
            • GetFileVersionInfoW.KERNELBASE(?,?,?,00000000,00000000,?,?), ref: 00FB3E99
            • GetLastError.KERNEL32(?,?), ref: 00FB3EDE
            • DeleteFileW.KERNEL32(?), ref: 00FB3EF1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: File$InfoVersion$DeleteErrorFolderLastPathSize
            • String ID: Shlwapi.dll
            • API String ID: 2825328469-1687636465
            • Opcode ID: dc6e1793ed036bf8ee9deaf7a72b573874bd1bff8399780c955147aef9558c6e
            • Instruction ID: 3e75ccb7fabba490b9c36c0e03d27f55f589ff89f3af0e5fc6e31bf15a54039f
            • Opcode Fuzzy Hash: dc6e1793ed036bf8ee9deaf7a72b573874bd1bff8399780c955147aef9558c6e
            • Instruction Fuzzy Hash: 6E317071E05219EBDB15CFA6C844BEFBBB8EF08720F14416AE805A3240D7759A44DFA1
            APIs
            • InitializeCriticalSection.KERNEL32(?,9F3ADAE5), ref: 00EA44EA
            • EnterCriticalSection.KERNEL32(?,9F3ADAE5), ref: 00EA44F7
            • SetTimer.USER32(00000000,00000001,0000000A,00000000), ref: 00EA452D
            • LeaveCriticalSection.KERNEL32(?), ref: 00EA4548
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalSection$EnterInitializeLeaveTimer
            • String ID: v
            • API String ID: 3379552715-3261393531
            • Opcode ID: 4a237c144d706259bfe0baf0672b1e5b32c2c8586a4af1d3368c917866a274f2
            • Instruction ID: c0e83b71306c361e15719c8f3b89aa171cd96d33d769611afda3ef7be3459b92
            • Opcode Fuzzy Hash: 4a237c144d706259bfe0baf0672b1e5b32c2c8586a4af1d3368c917866a274f2
            • Instruction Fuzzy Hash: 792105729002449FDF11DF64D840BE9BFB4FB5A328F5001A9EC99AF386C7326905CB60
            APIs
            • GetWindowDC.USER32(?,9F3ADAE5,?,?,00000000,?,?,?,?,?,?,?,?,00000000,010C306D,000000FF), ref: 00F88DA0
            • GetWindowRect.USER32(?,?), ref: 00F88DC0
            • IsWindowEnabled.USER32(?), ref: 00F88DF1
            • GetFocus.USER32 ref: 00F88DFF
            • DeleteDC.GDI32(?), ref: 00F88F15
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$DeleteEnabledFocusRect
            • String ID:
            • API String ID: 733580484-0
            • Opcode ID: 9b6d838060e7123a38542ab2d1ab47d07c1a562d1b84e008363dec388540f702
            • Instruction ID: 9bde21d40ad2374808bab61d9cd4c4ad49c19a12db1378803d5e8548e0c37209
            • Opcode Fuzzy Hash: 9b6d838060e7123a38542ab2d1ab47d07c1a562d1b84e008363dec388540f702
            • Instruction Fuzzy Hash: E8513871E04649EFDB24DFA4C948BEEBBF8FF08310F144129E456A7290DB716945DB24
            APIs
            • MsgWaitForMultipleObjectsEx.USER32(00000001,00000000,000000FF,000005FF,00000004), ref: 00FAA691
            • PeekMessageW.USER32(?,00000000), ref: 00FAA6D7
            • TranslateMessage.USER32(00000000), ref: 00FAA6E2
            • DispatchMessageW.USER32(00000000), ref: 00FAA6E9
            • MsgWaitForMultipleObjectsEx.USER32(00000001,?,000000FF,000005FF,00000004), ref: 00FAA6FB
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Message$MultipleObjectsWait$DispatchPeekTranslate
            • String ID:
            • API String ID: 4084795276-0
            • Opcode ID: cda51f842aa2acc906f0751ffcdf439e95f839640ec5daab71f6a656ebd7d971
            • Instruction ID: 1093f51cdcde6750e888144c1e3ee69ed22fbe34a4c31459748379a9d27f069f
            • Opcode Fuzzy Hash: cda51f842aa2acc906f0751ffcdf439e95f839640ec5daab71f6a656ebd7d971
            • Instruction Fuzzy Hash: 42112971A443097AE620DA51AC81FA7B7ECEB89774F500636FB10D62C0D771E9C88B66
            APIs
            • PathIsUNCW.SHLWAPI(?,9F3ADAE5,?,00000010,?), ref: 00FCBF3A
              • Part of subcall function 00FA4D70: GetCurrentProcess.KERNEL32 ref: 00FA4DB8
              • Part of subcall function 00FA4D70: OpenProcessToken.ADVAPI32(00000000,00000008,00000000), ref: 00FA4DC5
              • Part of subcall function 00FA4D70: GetLastError.KERNEL32 ref: 00FA4DCF
              • Part of subcall function 00FA4D70: FindCloseChangeNotification.KERNEL32(00000000), ref: 00FA4EB0
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
              • Part of subcall function 00E8A2A0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,?,?,?,*.*,?,80070057,9F3ADAE5), ref: 00E8A2C3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Process$FindInit_thread_footer$ChangeCloseCurrentErrorHeapLastNotificationOpenPathResourceToken
            • String ID: Extraction path set to:$[WindowsVolume]$\\?\
            • API String ID: 2914359614-3538578949
            • Opcode ID: 0636210c8538a9985af7b04628973a7696a5b42faa043294c2415dfed9334784
            • Instruction ID: d1f751abbd531a86ddfee8695c8b3fd438055036a930426f4aa71424221c8d12
            • Opcode Fuzzy Hash: 0636210c8538a9985af7b04628973a7696a5b42faa043294c2415dfed9334784
            • Instruction Fuzzy Hash: 28C1E430900546DBDB10DFA8C946FAEF7F4AF45320F1482ADE819AB292DB74DD05CB91
            APIs
              • Part of subcall function 00FC36C0: GetTickCount.KERNEL32 ref: 00FC3744
              • Part of subcall function 00FC36C0: __Xtime_get_ticks.LIBCPMT ref: 00FC374C
              • Part of subcall function 00FC36C0: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FC3796
              • Part of subcall function 00FE8160: GetUserNameW.ADVAPI32(?,?), ref: 00FE81F5
              • Part of subcall function 00FE8160: GetLastError.KERNEL32 ref: 00FE81FB
              • Part of subcall function 00FE8160: GetUserNameW.ADVAPI32(?,?), ref: 00FE8243
              • Part of subcall function 00FE8160: GetEnvironmentVariableW.KERNEL32(UserDomain,00000000,00000000), ref: 00FE8279
              • Part of subcall function 00FE8160: GetEnvironmentVariableW.KERNEL32(UserDomain,?,00000000,00000000,00000000), ref: 00FE82C3
            • __Init_thread_footer.LIBCMT ref: 00FC3981
            • GetCurrentProcess.KERNEL32(00000008,?,9F3ADAE5), ref: 00FC3B78
            • OpenProcessToken.ADVAPI32(00000000), ref: 00FC3B7F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: EnvironmentNameProcessUserVariable$CountCurrentErrorInit_thread_footerLastOpenTickTokenUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@
            • String ID: \/:*?"<>|
            • API String ID: 1521599615-3830478854
            • Opcode ID: 6dc9d1e406bd1d9d687661b055d33cfd88172184816a6f00f7cb04c75df1c84d
            • Instruction ID: a16dcdd5b127a5ae2455d5d487530ec6f79d0e1fe8e025d71292e0321f57f074
            • Opcode Fuzzy Hash: 6dc9d1e406bd1d9d687661b055d33cfd88172184816a6f00f7cb04c75df1c84d
            • Instruction Fuzzy Hash: A5B1F030D00249CFDB14DF68CA45BEEBBB0BF44714F24826CD859B7281DB34AA45CB91
            APIs
            • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,9F3ADAE5,?,00000010,?,00FC6E40,?), ref: 00FC3426
            • SetFilePointer.KERNEL32(00000000,?,00000010,00000000), ref: 00FC346F
            • ReadFile.KERNEL32(00000000,9F3ADAE5,?,?,00000000,00000078,?), ref: 00FC34B1
            • FindCloseChangeNotification.KERNEL32(00000000), ref: 00FC352A
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: File$ChangeCloseCreateFindNotificationPointerRead
            • String ID:
            • API String ID: 2405668454-0
            • Opcode ID: 1dc682df8f9d0ebd7951752a341e328429b2a240473f6be5ec6b71527bfbaab1
            • Instruction ID: 11710ea019eac9e62cbb73eb992bfa816cd619f0664f8b168912086ba1a6cc5f
            • Opcode Fuzzy Hash: 1dc682df8f9d0ebd7951752a341e328429b2a240473f6be5ec6b71527bfbaab1
            • Instruction Fuzzy Hash: D0518D71D0064A9BDB11CBA8CD49FEEFBB8EF44724F188259E421AB2D1D7749E04CB60
            APIs
            • GetCurrentThreadId.KERNEL32 ref: 00FCB119
            • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,010CD7B0,000000FF), ref: 00FCB128
            • PostMessageW.USER32(?,00000401,00000000,00000000), ref: 00FCB146
            • IsWindow.USER32(?), ref: 00FCB155
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$CurrentDestroyMessagePostThread
            • String ID:
            • API String ID: 3186974096-0
            • Opcode ID: 29239971c0ce1b4b94521adfa02f72867408e5f329c76510234dee9f1199e1be
            • Instruction ID: 96fa87c87f122c0d49e18f87dcd011cadad165dcfc99d77e464b1bd670047f80
            • Opcode Fuzzy Hash: 29239971c0ce1b4b94521adfa02f72867408e5f329c76510234dee9f1199e1be
            • Instruction Fuzzy Hash: FDF0E2714097409AD734AB28EA09F83BBE17B48B10F04081CF19686A80C3B0F880CB18
            APIs
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            • PathIsUNCW.SHLWAPI(?,?,?,?,00000000,00000000,010C86FF,000000FF), ref: 00FA9BB6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Init_thread_footer$HeapPathProcess
            • String ID: \\?\$\\?\UNC\
            • API String ID: 806983814-3019864461
            • Opcode ID: 8e2e73232341e03cf2837cbda4a8d567c38acadc381a304c02a0b680d5942340
            • Instruction ID: f6e8c5ad6176c9fda2f9578a2c619ad02ea03993411fa0f590b389df597061c2
            • Opcode Fuzzy Hash: 8e2e73232341e03cf2837cbda4a8d567c38acadc381a304c02a0b680d5942340
            • Instruction Fuzzy Hash: 04C194719046099FDB00DBA8CC45B9EF7F8FF49324F148269E515EB2D1DB789904CBA0
            APIs
            • __freea.LIBCMT ref: 0107711B
              • Part of subcall function 01074FC7: RtlAllocateHeap.NTDLL(00000000,0107CB1E,?,?,0107CB1E,00000220,?,?,?), ref: 01074FF9
            • __freea.LIBCMT ref: 01077130
            • __freea.LIBCMT ref: 01077140
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: __freea$AllocateHeap
            • String ID:
            • API String ID: 2243444508-0
            • Opcode ID: f6a7ed31d09b629b28df57b0eae368f17e0132f387ce99295f5ad53769b83bec
            • Instruction ID: fb893df498f03dbc9631fb8d23c8ccdfcb20bb40e58a18cf10feda991591950c
            • Opcode Fuzzy Hash: f6a7ed31d09b629b28df57b0eae368f17e0132f387ce99295f5ad53769b83bec
            • Instruction Fuzzy Hash: 2751B572E00216AFFF619E689C88DFF3BEAEB54290F150568FD88D6110E631CC5087A8
            APIs
            • SetFilePointer.KERNEL32(?,?,?,00000000,9F3ADAE5,?,?), ref: 00FCECF7
            • ReadFile.KERNEL32(?,00000000,00000018,?,00000000), ref: 00FCEE04
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: File$PointerRead
            • String ID:
            • API String ID: 3154509469-0
            • Opcode ID: bfc4079ab7a5c369442c9a05aa71647107884ab5b558ed79592484065676183f
            • Instruction ID: 2e7db98698d35866d918779b96cfda4191b7572a5edf819fe5159a1c42212bb2
            • Opcode Fuzzy Hash: bfc4079ab7a5c369442c9a05aa71647107884ab5b558ed79592484065676183f
            • Instruction Fuzzy Hash: C4617F71D006099FDB04DFA8C945B9DFBB4FF09720F14426EE825A7390EB75AA04CB91
            APIs
            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,9F3ADAE5,?,00000000,?,80004005,?,00000000), ref: 00FCC0EE
            • GetLastError.KERNEL32 ref: 00FCC126
            • GetLastError.KERNEL32(?), ref: 00FCC1BF
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ErrorLast$CreateFile
            • String ID:
            • API String ID: 1722934493-0
            • Opcode ID: b33400114bf64d93e5900403cdac34b7de967d157a93fc5f1878f9b16ea98078
            • Instruction ID: e3531638936cd710e9d82484d23c0ebd70f68cb6ca52b36e40e9b7ecabbfb72e
            • Opcode Fuzzy Hash: b33400114bf64d93e5900403cdac34b7de967d157a93fc5f1878f9b16ea98078
            • Instruction Fuzzy Hash: 5C51E031E006069FDB20DF69C942BAAF7B1FF45320F14462DE919E7291EB35A904DB80
            APIs
            • CreateFileW.KERNEL32(00FFD4E4,40000000,00000001,00000000,00000002,00000080,00000000,9F3ADAE5,?,00000001), ref: 00FFC532
            • WriteFile.KERNEL32(00000000,0000C800,0000C800,0000C800,00000000,?,0000C800), ref: 00FFC5C8
            • CloseHandle.KERNEL32(00000000,?,0000C800), ref: 00FFC63C
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: File$CloseCreateHandleWrite
            • String ID:
            • API String ID: 1065093856-0
            • Opcode ID: 207adf2d0eeea3c62eb127702298315362cb3140aa2a402d8ee40cbaae062772
            • Instruction ID: 8ae20d458d7f41ff54619bf9fb3bffc5b4004d5fd354013b1f20fa985375fdf4
            • Opcode Fuzzy Hash: 207adf2d0eeea3c62eb127702298315362cb3140aa2a402d8ee40cbaae062772
            • Instruction Fuzzy Hash: 36518C7190021DAFDB14DFA8DD45BEEBBB9FF48710F144219E910BB290DB75AA00CBA4
            APIs
            • GetLastError.KERNEL32(00FCA871), ref: 00FCAF10
            • EnableWindow.USER32(?,00000000), ref: 00FCAFA1
            • DestroyWindow.USER32(00000000,?,00000000), ref: 00FCAFC7
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$DestroyEnableErrorLast
            • String ID:
            • API String ID: 2755773105-0
            • Opcode ID: 465b41639499ea3c32a702b213d7380962c253dce4aebe3923621c229f12a737
            • Instruction ID: 21eb7f894f79a8f52a31f8462904e6a967eefb07d5f9930be6cc7d9875dc5c0f
            • Opcode Fuzzy Hash: 465b41639499ea3c32a702b213d7380962c253dce4aebe3923621c229f12a737
            • Instruction Fuzzy Hash: BF2127B1A1410E5BD720AE08E906FEA77A4EB54330F00026AFD14C7380C77AEC60E7E2
            APIs
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000025,00000000,9F3ADAE5), ref: 00FAA390
              • Part of subcall function 00FAA450: GetEnvironmentVariableW.KERNEL32(00000000,00000000,00000000,?,?,?,80004005), ref: 00FAA45D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Init_thread_footer$EnvironmentFolderHeapPathProcessSpecialVariable
            • String ID: USERPROFILE
            • API String ID: 1777821646-2419442777
            • Opcode ID: dd1a9ef23272a03662259a7eb40fbead2dbe432f357a00d95868ab01936df025
            • Instruction ID: aba6f3df5eb04fb648a449b9f99ae75c036bab9fb53746be806164f1a5f45fda
            • Opcode Fuzzy Hash: dd1a9ef23272a03662259a7eb40fbead2dbe432f357a00d95868ab01936df025
            • Instruction Fuzzy Hash: 1261D2B1A006099FDB14DF68C849BAEB7F4FF45320F14826DE819EB291DB759904CB92
            APIs
              • Part of subcall function 00E8A0A0: FindResourceExW.KERNEL32(00000000,00000006,?,00000000,00000000,9F3ADAE5,?,?,*.*,?,00000000,010850D0,000000FF,?,00E8A2B0,?), ref: 00E8A0F6
            • FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,?,?,?,*.*,?,80070057,9F3ADAE5), ref: 00E8A2C3
              • Part of subcall function 00E8A160: LoadResource.KERNEL32(00000000,00000000,9F3ADAE5,00000001,00000000,?,00000000,01084A00,000000FF,?,00E8A10C,9F3ADAE5,?,?,*.*,?), ref: 00E8A18B
              • Part of subcall function 00E8A160: LockResource.KERNEL32(00000000,?,00E8A10C,9F3ADAE5,?,?,*.*,?,00000000,010850D0,000000FF,?,00E8A2B0,?,?,*.*), ref: 00E8A196
              • Part of subcall function 00E8A160: SizeofResource.KERNEL32(00000000,00000000,?,00E8A10C,9F3ADAE5,?,?,*.*,?,00000000,010850D0,000000FF,?,00E8A2B0,?,?), ref: 00E8A1A4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Resource$Find$LoadLockSizeof
            • String ID: *.*
            • API String ID: 3127896203-438819550
            • Opcode ID: 6cd2999a5806e6305089c4af3b684067eda135f08e6af9b277e3521e5a65ffee
            • Instruction ID: a0e2c5d15e237c663c6f0940611a9c372afdd7b3f933be9d16e31d37479446c9
            • Opcode Fuzzy Hash: 6cd2999a5806e6305089c4af3b684067eda135f08e6af9b277e3521e5a65ffee
            • Instruction Fuzzy Hash: 5D1101713001219FE710ABA8E88497FB3DDEF84714B18903BF54DEB251DA669C1287A2
            APIs
              • Part of subcall function 0105C452: EnterCriticalSection.KERNEL32(0117BED0,?,?,?,00E8A0D7,00000000,9F3ADAE5,?,?,*.*,?,00000000,010850D0,000000FF,?,00E8A2B0), ref: 0105C45D
              • Part of subcall function 0105C452: LeaveCriticalSection.KERNEL32(0117BED0,?,?,?,00E8A0D7,00000000,9F3ADAE5,?,?,*.*,?,00000000,010850D0,000000FF,?,00E8A2B0), ref: 0105C489
            • FindResourceExW.KERNEL32(00000000,00000006,?,00000000,00000000,9F3ADAE5,?,?,*.*,?,00000000,010850D0,000000FF,?,00E8A2B0,?), ref: 00E8A0F6
              • Part of subcall function 00E8A160: LoadResource.KERNEL32(00000000,00000000,9F3ADAE5,00000001,00000000,?,00000000,01084A00,000000FF,?,00E8A10C,9F3ADAE5,?,?,*.*,?), ref: 00E8A18B
              • Part of subcall function 00E8A160: LockResource.KERNEL32(00000000,?,00E8A10C,9F3ADAE5,?,?,*.*,?,00000000,010850D0,000000FF,?,00E8A2B0,?,?,*.*), ref: 00E8A196
              • Part of subcall function 00E8A160: SizeofResource.KERNEL32(00000000,00000000,?,00E8A10C,9F3ADAE5,?,?,*.*,?,00000000,010850D0,000000FF,?,00E8A2B0,?,?), ref: 00E8A1A4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Resource$CriticalSection$EnterFindLeaveLoadLockSizeof
            • String ID: *.*
            • API String ID: 529824247-438819550
            • Opcode ID: 157e77ef46f882bfae28e3323a0b40d491d9d209d97fece4446cc0b2289f7d32
            • Instruction ID: efcabf2ee9ff79f1ad13c595b7c4169aa3fc5f14e2f60330d1b8e046f11d17c6
            • Opcode Fuzzy Hash: 157e77ef46f882bfae28e3323a0b40d491d9d209d97fece4446cc0b2289f7d32
            • Instruction Fuzzy Hash: 7C110172B086245BE7259A59AC41B7BB7E8E748A64F14027FED0EE7380EB359C004790
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: EventMouseRedrawTrackWindow
            • String ID:
            • API String ID: 2912621452-0
            • Opcode ID: ca8f7c33717a38bf245b9c38ebb2575bfdb90dd3ccf9e16ccf67aa25576c0635
            • Instruction ID: 2036a43091cb560502b61e59ec23f73fd6a379f1c3c84ebcd31698e7442d5908
            • Opcode Fuzzy Hash: ca8f7c33717a38bf245b9c38ebb2575bfdb90dd3ccf9e16ccf67aa25576c0635
            • Instruction Fuzzy Hash: CC7129B26043058FDB24AF28D8847EBBBE5EB8432CF10462EF045A72D2D7359598CB52
            APIs
              • Part of subcall function 0107C84A: GetOEMCP.KERNEL32(00000000,?,?,?,?), ref: 0107C875
            • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,0107CB61,?,00000000,?,?,?), ref: 0107CD7B
            • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,0107CB61,?,00000000,?,?,?), ref: 0107CDBD
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CodeInfoPageValid
            • String ID:
            • API String ID: 546120528-0
            • Opcode ID: 63d6afedb55b4b198ce8d024d1558df242ea4ae7dd7c74cda90a76f7180aeefe
            • Instruction ID: 2810c0ae5ac81233c9c36e63a38499de74348514670c7f5bfbf9c1d0906eb7a6
            • Opcode Fuzzy Hash: 63d6afedb55b4b198ce8d024d1558df242ea4ae7dd7c74cda90a76f7180aeefe
            • Instruction Fuzzy Hash: 8A5105B0E002478FFB65CF39CA446EABBF5EF41300F1848AED1D68B252D6749946CB94
            APIs
            • IsWindow.USER32(00000000), ref: 00FEFBA1
            • EndDialog.USER32(00000000,00000001), ref: 00FEFBB0
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: DialogWindow
            • String ID:
            • API String ID: 2634769047-0
            • Opcode ID: 1ee3b26e30daffc908f21cbbc0f75d29cd9e06e1f36db5d93ba5e4c322d4bc41
            • Instruction ID: 52585b7606445396f2e5a184a0cbf9c00ab0fb0bdb07c4f83b8aa58d8ec92a7e
            • Opcode Fuzzy Hash: 1ee3b26e30daffc908f21cbbc0f75d29cd9e06e1f36db5d93ba5e4c322d4bc41
            • Instruction Fuzzy Hash: F651AC30901B89DFD710CF69CA08B4AFBF4FF49320F2482ADE4559B2A1D774AA08CB51
            APIs
            • IsWindow.USER32(00000004), ref: 00F4758A
            • DestroyWindow.USER32(00000004,?,?,?,?,?,?,?,?,000000FF), ref: 00F47597
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$Destroy
            • String ID:
            • API String ID: 3707531092-0
            • Opcode ID: 2e60a52db6804bf3e77731a692f663dc4b0cde10518ccec76f4421b2d9f8736c
            • Instruction ID: 66ca9129d2fcf2cfb9fc394149f7166320d34a20b85075c948960f2873c0965f
            • Opcode Fuzzy Hash: 2e60a52db6804bf3e77731a692f663dc4b0cde10518ccec76f4421b2d9f8736c
            • Instruction Fuzzy Hash: 6E319F70805B49EEC715EF68CA4479EFBF4FF14714F108299E4A8A76C1CB746A08CB91
            APIs
            • BeginPaint.USER32(?,?,9F3ADAE5), ref: 00EA3DDC
            • EndPaint.USER32(?,?), ref: 00EA3E01
              • Part of subcall function 00EA4650: InitializeCriticalSection.KERNEL32(9F3ADAE5,9F3ADAE5,?), ref: 00EA468F
              • Part of subcall function 00EA4650: EnterCriticalSection.KERNEL32(?,9F3ADAE5,?), ref: 00EA469C
              • Part of subcall function 00EA4650: KillTimer.USER32(?,00000001), ref: 00EA46E4
              • Part of subcall function 00EA4650: LeaveCriticalSection.KERNEL32(?,?,00000000,?), ref: 00EA4773
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalSection$Paint$BeginEnterInitializeKillLeaveTimer
            • String ID:
            • API String ID: 1542273292-0
            • Opcode ID: 89b1d5236cae8dac68edbefa20ca0eacbd97bd0c2fb53af4f3fb252c62782df8
            • Instruction ID: c16ddfa5da0aa2adf26ef7cf0f55c5762de6e115db83571ec2a68b296d37b8f9
            • Opcode Fuzzy Hash: 89b1d5236cae8dac68edbefa20ca0eacbd97bd0c2fb53af4f3fb252c62782df8
            • Instruction Fuzzy Hash: A521B3B0904348DFDB20CFA4C544B9EBBF4FB09714F10462DE416AB780D775AA44CB91
            APIs
              • Part of subcall function 00FACBB0: LoadLibraryW.KERNEL32(ComCtl32.dll,9F3ADAE5,?,?,00000000), ref: 00FACBEE
              • Part of subcall function 00FACBB0: GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 00FACC11
              • Part of subcall function 00FACBB0: FreeLibrary.KERNEL32(00000000), ref: 00FACC8F
              • Part of subcall function 00FACBB0: GetSystemMetrics.USER32(0000000C), ref: 00FACC4C
              • Part of subcall function 00FACBB0: GetSystemMetrics.USER32(0000000B), ref: 00FACC62
            • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 00FAD5E4
            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00FAD5EF
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: LibraryMessageMetricsSendSystem$AddressFreeLoadProc
            • String ID:
            • API String ID: 1118950307-0
            • Opcode ID: 7446c92c0a37ef16fac95bc3299a40ab81b632632351a55bb0db7b3a01430118
            • Instruction ID: f3ca9205f17d7174dbe9909091899465a804088cdcace36bd45efd456fbddc91
            • Opcode Fuzzy Hash: 7446c92c0a37ef16fac95bc3299a40ab81b632632351a55bb0db7b3a01430118
            • Instruction Fuzzy Hash: 07F01C7178521836F66021595C57F67B64DD781BA4F108266BA98AB2C2ECC67C0402E8
            APIs
            • LCMapStringEx.KERNEL32(?,0107705A,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 01076D0C
            • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,0107705A,?,?,00000000,?,00000000), ref: 01076D2A
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: String
            • String ID:
            • API String ID: 2568140703-0
            • Opcode ID: fa4dd0d710ae1aa8c6223702377bdde9188665d59a5e854a8c9cd318ae57fca4
            • Instruction ID: 074de133087cbf847e1e19848bc52dcd8233f0ea7d0c0316e265226c55ff015f
            • Opcode Fuzzy Hash: fa4dd0d710ae1aa8c6223702377bdde9188665d59a5e854a8c9cd318ae57fca4
            • Instruction Fuzzy Hash: 40F0B43280051ABBCF226E91EC04ADE3E66AB586A0F058010BA5929120CB37D871AB88
            APIs
            • MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,00000000,00000000,?,?,0117D68C,00FDDE10,?), ref: 00F924A8
            • MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,?,-00000001), ref: 00F924DA
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ByteCharMultiWide
            • String ID:
            • API String ID: 626452242-0
            • Opcode ID: a0ca11906745bdfc061b13ff5c5e70c43eedc167da9b553af5665f46e9bf28a7
            • Instruction ID: 3b42f46837a0df5f66f9bb96764fe59f260bfcafb98b21e21303a3dc930ab6b7
            • Opcode Fuzzy Hash: a0ca11906745bdfc061b13ff5c5e70c43eedc167da9b553af5665f46e9bf28a7
            • Instruction Fuzzy Hash: 8501D635301111AFEA10DA4DDC89F5EB799EFC4721F24412EF619EB2C4CA216D019790
            APIs
            • EqualRect.USER32(00000000,?), ref: 00EA4DF9
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: EqualRect
            • String ID:
            • API String ID: 90978676-0
            • Opcode ID: 1b23b577a84346d1c341f0372a67c8eb5c05a96a2d6952dc1f0f28ea062b2fd1
            • Instruction ID: 1e003a7cdd2518257c64973d3554e4f129b2c660693c1cc8a09671c2d6d7bd9f
            • Opcode Fuzzy Hash: 1b23b577a84346d1c341f0372a67c8eb5c05a96a2d6952dc1f0f28ea062b2fd1
            • Instruction Fuzzy Hash: CF9109B5901208DFDB25DFA8C945BAEBBF4FF49704F144169E819BB281DB706A44CF90
            APIs
            • WaitForSingleObject.KERNEL32(?,000000FF,9F3ADAE5), ref: 00FEEA84
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ObjectSingleWait
            • String ID:
            • API String ID: 24740636-0
            • Opcode ID: 92afef62b7e5c644284e136c2bd3684f314f1a78de71c5ae2e7cd7c8f3499727
            • Instruction ID: 07af1b7eb8a810f0d50c6de22442e470a5dfca7e74f7879b78031e013497773e
            • Opcode Fuzzy Hash: 92afef62b7e5c644284e136c2bd3684f314f1a78de71c5ae2e7cd7c8f3499727
            • Instruction Fuzzy Hash: 06518D75A00256CFCB04CF59D984B6ABBB1FF88710F2545A9E816EB351C735ED01DB90
            APIs
            • GetCPInfo.KERNEL32(E8458D00,?,0107CB6D,0107CB61,00000000), ref: 0107C950
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Info
            • String ID:
            • API String ID: 1807457897-0
            • Opcode ID: 53e1acff242dff5c6b6630a8861ae4a5cb44b934ad2e5cd2e47ade3cf6607310
            • Instruction ID: 0b0490fd85f30f43759a78d4864edb686e50a2a589e4ce825e689aa75b0ad45f
            • Opcode Fuzzy Hash: 53e1acff242dff5c6b6630a8861ae4a5cb44b934ad2e5cd2e47ade3cf6607310
            • Instruction Fuzzy Hash: C3517AB1D04259ABEB21CA2CCE84AEA7BFCEB55308F1405EDD5DAD7142C334AE45CB24
            APIs
            • EnumResourceLanguagesW.KERNEL32(?,00000010,00000001,00FD34C0,?), ref: 00FD33DB
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: EnumLanguagesResource
            • String ID:
            • API String ID: 4141015960-0
            • Opcode ID: d692cfa1e9c8930f0c889ce6acf254e493f201a039661b0c33899dc67f499096
            • Instruction ID: 421f1bdf34684e6c587bc7b2b8eb4285bf00a2a674a5f574aa15bbb1b93b6b33
            • Opcode Fuzzy Hash: d692cfa1e9c8930f0c889ce6acf254e493f201a039661b0c33899dc67f499096
            • Instruction Fuzzy Hash: A741B171C0020A9BDB11DF94C880BDEBBF5FF44324F14426AE525A7781D7B9EA44CB91
            APIs
              • Part of subcall function 00FAEAD0: __Init_thread_footer.LIBCMT ref: 00FAEB46
              • Part of subcall function 0105D07E: EnterCriticalSection.KERNEL32(0117BF4C,?,?,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5,?,?), ref: 0105D089
              • Part of subcall function 0105D07E: LeaveCriticalSection.KERNEL32(0117BF4C,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5,?,?), ref: 0105D0C6
            • __Init_thread_footer.LIBCMT ref: 00FAE930
              • Part of subcall function 0105D034: EnterCriticalSection.KERNEL32(0117BF4C,?,?,00E8AE07,0117CB7C,010E6B00), ref: 0105D03E
              • Part of subcall function 0105D034: LeaveCriticalSection.KERNEL32(0117BF4C,?,00E8AE07,0117CB7C,010E6B00), ref: 0105D071
              • Part of subcall function 0105D034: RtlWakeAllConditionVariable.NTDLL ref: 0105D0E8
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalSection$EnterInit_thread_footerLeave$ConditionVariableWake
            • String ID:
            • API String ID: 984842325-0
            • Opcode ID: d95129966746a79994db6450d1912de0c1859f14221268ea2001067b7f46b573
            • Instruction ID: cc55574ff7fcd41bd76af40cb8a9027f79ac36f2271f70d3867b4982194a90c2
            • Opcode Fuzzy Hash: d95129966746a79994db6450d1912de0c1859f14221268ea2001067b7f46b573
            • Instruction Fuzzy Hash: 7731CEB19007019BE76ADF04E881F4E77F5F706724F108329E86247784D3B56884DB49
            APIs
              • Part of subcall function 0105D07E: EnterCriticalSection.KERNEL32(0117BF4C,?,?,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5,?,?), ref: 0105D089
              • Part of subcall function 0105D07E: LeaveCriticalSection.KERNEL32(0117BF4C,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5,?,?), ref: 0105D0C6
            • __Init_thread_footer.LIBCMT ref: 00F8E402
              • Part of subcall function 0105D034: EnterCriticalSection.KERNEL32(0117BF4C,?,?,00E8AE07,0117CB7C,010E6B00), ref: 0105D03E
              • Part of subcall function 0105D034: LeaveCriticalSection.KERNEL32(0117BF4C,?,00E8AE07,0117CB7C,010E6B00), ref: 0105D071
              • Part of subcall function 0105D034: RtlWakeAllConditionVariable.NTDLL ref: 0105D0E8
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
            • String ID:
            • API String ID: 2296764815-0
            • Opcode ID: 0a920774976e3bd8ee484c3a9926458b2acbe5fcbdb6b90b85dd322deb052b2d
            • Instruction ID: 2d38862d403fee9e14b19a53dda836429fbd72ce5b4d80676f7b8adce714ee3e
            • Opcode Fuzzy Hash: 0a920774976e3bd8ee484c3a9926458b2acbe5fcbdb6b90b85dd322deb052b2d
            • Instruction Fuzzy Hash: 7501D4B1A44A05DBCB99EB98D945B4973E0F706B20F10863DF86A873C0D734A900CF21
            APIs
              • Part of subcall function 0105D07E: EnterCriticalSection.KERNEL32(0117BF4C,?,?,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5,?,?), ref: 0105D089
              • Part of subcall function 0105D07E: LeaveCriticalSection.KERNEL32(0117BF4C,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5,?,?), ref: 0105D0C6
              • Part of subcall function 00FAEB70: RegOpenKeyExW.KERNEL32(80000002,Software\Microsoft\Windows NT\CurrentVersion,00000000,00020119,00000000), ref: 00FAEBDE
              • Part of subcall function 00FAEB70: RegQueryValueExW.KERNEL32(00000000,CurrentMajorVersionNumber,00000000,00000000,?,?), ref: 00FAEC25
              • Part of subcall function 00FAEB70: RegQueryValueExW.KERNEL32(00000000,CurrentMinorVersionNumber,00000000,00000000,?,00000004), ref: 00FAEC44
              • Part of subcall function 00FAEB70: RegQueryValueExW.ADVAPI32(00000000,CurrentVersion,00000000,00000000,?,?), ref: 00FAEC73
              • Part of subcall function 00FAEB70: RegQueryValueExW.KERNEL32(00000000,CurrentBuildNumber,00000000,00000000,?,?), ref: 00FAECE8
            • __Init_thread_footer.LIBCMT ref: 00FAEB46
              • Part of subcall function 0105D034: EnterCriticalSection.KERNEL32(0117BF4C,?,?,00E8AE07,0117CB7C,010E6B00), ref: 0105D03E
              • Part of subcall function 0105D034: LeaveCriticalSection.KERNEL32(0117BF4C,?,00E8AE07,0117CB7C,010E6B00), ref: 0105D071
              • Part of subcall function 0105D034: RtlWakeAllConditionVariable.NTDLL ref: 0105D0E8
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalQuerySectionValue$EnterLeave$ConditionInit_thread_footerOpenVariableWake
            • String ID:
            • API String ID: 3563064969-0
            • Opcode ID: 536bd89b36496c20345ac61a94988248b8efcf38cfdcd39ca3dd8befebdc49c7
            • Instruction ID: 0596f3a88aaae7da383eda42d0f4cf7fea3d1c9b015c02710a8417873a0b0b7a
            • Opcode Fuzzy Hash: 536bd89b36496c20345ac61a94988248b8efcf38cfdcd39ca3dd8befebdc49c7
            • Instruction Fuzzy Hash: B201D6B1A44605DBC329EBD8DD05B6DB3A4E705B60F108769ED269B7C0DB746A00CF61
            APIs
              • Part of subcall function 0105E8FA: RaiseException.KERNEL32(E06D7363,00000001,00000003,9F3ADAE5,?,?,00FE9828,80004005,9F3ADAE5,?,?), ref: 0105E95A
            • RtlAllocateHeap.NTDLL(?,00000000,?,9F3ADAE5,00000000,01084C50,000000FF,?,?,01173854,?,00FE9828,80004005,9F3ADAE5,?,?), ref: 00E8A9FA
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: AllocateExceptionHeapRaise
            • String ID:
            • API String ID: 3789339297-0
            • Opcode ID: 696c2e4b2ba83219761f1773ba0cba30b3275ef9cafe47b10dfd09a23699e7f9
            • Instruction ID: a0cc6b23d6ea50ac195e3a29b4f4cbada12683067c036e9b2f269b5a8929125f
            • Opcode Fuzzy Hash: 696c2e4b2ba83219761f1773ba0cba30b3275ef9cafe47b10dfd09a23699e7f9
            • Instruction Fuzzy Hash: 55F08C72A48648BFCB15DF55DC05F5ABBF8FB08B10F10866EF969C6690DB36A900CB44
            APIs
            • RtlAllocateHeap.NTDLL(00000000,0107CB1E,?,?,0107CB1E,00000220,?,?,?), ref: 01074FF9
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: AllocateHeap
            • String ID:
            • API String ID: 1279760036-0
            • Opcode ID: c76a0b1949c7ebaede76edf3d21c5f1969fcf61057c71e329e69580489b0fa7b
            • Instruction ID: e2c7ef3374e6ad06531b1c8ecfcb417fc2ab9ff54af83690a83f8c6651e3c5b2
            • Opcode Fuzzy Hash: c76a0b1949c7ebaede76edf3d21c5f1969fcf61057c71e329e69580489b0fa7b
            • Instruction Fuzzy Hash: D4E06531E042129BEB72266A5C08BEA7AD99F517A0F054160FDD8D61C4DF20C84082ED
            APIs
            • FindCloseChangeNotification.KERNEL32(?), ref: 00E8971B
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ChangeCloseFindNotification
            • String ID:
            • API String ID: 2591292051-0
            • Opcode ID: 4225109994cb4df3d071183c9163982c692ae8115354d00deef1fd811f983c5b
            • Instruction ID: d0358485083877bb583df9c997ee1c57800aac28b625fd7aa63041bc4bf27392
            • Opcode Fuzzy Hash: 4225109994cb4df3d071183c9163982c692ae8115354d00deef1fd811f983c5b
            • Instruction Fuzzy Hash: 9DC08C306102104BD7305E18B50878236DC9B08B14F04480AB44ED3200C6B5DC008754
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: 100$100$100$100$10000$10000$10000$100000$100000$12000$12000$12000$12000$12000$12000$12000$12000$12000$12000$12000$12000$12000$120000$120000$1500$1500$1500$1500$1500$15000$15000$15000$15000$15000$15000$15000$15000$1500000$1500000$1800$1800$1800$2000$2000$2000$2000$2000$2000$2000$2000$2000$20000$20000$200000$200000$3000$3000$3000$3000$3000$3000$3000$3000$3000$3000$3000$3000$3000$3000$3000$3000$30000$30000$30000$30000$3000000$3000000$500$500$5000$5000$6000$6000$800$800$8000$8000$8000$8000$8000$AI_AppSearchEx$AI_ChainProductsPseudo$AI_CountRowAction$AI_DefaultActionCost$AI_DownloadPrereq$AI_ExtractPrereq$AI_Game$AI_Game$AI_Game$AI_GxInstall$AI_GxUninstall$AI_InstallPostPrerequisite$AI_InstallPrerequisite$AI_PreRequisite$AI_ProcessAccounts$AI_ProcessGroups$AI_ProcessTasks$AI_ScheduledTasks$AI_UninstallAccounts$AI_UninstallGroups$AI_UninstallTasks$AI_UserAccounts$AI_UserGroups$AI_XmlAttribute$AI_XmlElement$AI_XmlInstall$AI_XmlUninstall$AppId$AppId$AppId$AppSearch$BindImage$Complus$Complus$Complus$Component$Component_$CostFinalize$CostInitialize$CreateFolder$CreateFolders$CreateShortcuts$DuplicateFile$DuplicateFiles$Environment$Extension$Feature$Feature$Feature$Feature_$File$File$File$File$FileCost$FileSize$Font$Font$Font$IniFile$IniFile$IniFile$InstallFiles$InstallFinalize$InstallInitialize$InstallODBC$InstallServices$InstallValidate$Location$MIME$MIME$MIME$MoveFile$MoveFiles$MsiAssembly$MsiConfigureServices$MsiPublishAssemblies$MsiUnpublishAssemblies$ODBCDataSource$ODBCDriver$ODBCTranslator$Options$Options$Options$Patch$Patch$PatchFiles$PatchSize$ProcessComponents$ProgId$ProgId$ProgId$PublishComponent$PublishComponents$PublishFeatures$RegisterClassInfo$RegisterComPlus$RegisterExtensionInfo$RegisterFonts$RegisterMIMEInfo$RegisterProgIdInfo$RegisterTypeLibraries$Registry$RemoveDuplicateFiles$RemoveEnvironmentStrings$RemoveExistingProducts$RemoveFile$RemoveFiles$RemoveFolders$RemoveIniFile$RemoveIniValues$RemoveODBC$RemoveRegistry$RemoveRegistryValues$RemoveShortcuts$SelfReg$SelfReg$SelfReg$SelfRegModules$SelfUnregModules$ServiceControl$ServiceInstall$Shortcut$StartServices$StopServices$TypeLib$TypeLib$UnpublishComponents$UnpublishFeatures$UnregisterClassInfo$UnregisterComPlus$UnregisterExtensionInfo$UnregisterFonts$UnregisterMIMEInfo$UnregisterProgIdInfo$WriteEnvironmentStrings$WriteIniValues$WriteRegistryValues$~
            • API String ID: 0-3108495574
            • Opcode ID: 40c221afafff0cc3911a0de41f1823f26e0838524bcf2142af790bc1c76fc1ac
            • Instruction ID: 0c51e11122565bb8b6d10448286994b3f5e01f2ca761ad5290d93339375aab1c
            • Opcode Fuzzy Hash: 40c221afafff0cc3911a0de41f1823f26e0838524bcf2142af790bc1c76fc1ac
            • Instruction Fuzzy Hash: 12733520A4538895E768EBB59A1635E7AF1AFA3304F60939CF5683F3C5DFB406C08791
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: 100$100$100$10000$10000$10000$100000$100000$12000$12000$12000$12000$12000$1500$1500$1500$15000$15000$15000$15000$15000$1500000$1500000$1800$1800$1800$2000$2000$2000$2000$2000$2000$2000$2000$20000$20000$200000$200000$3000$3000$3000$3000$3000$30000$30000$30000$3000000$3000000$500$500$5000$5000$6000$6000$8000$8000$8000$AI_AppSearchEx$AI_ChainProductsPseudo$AI_CountRowAction$AI_DefaultActionCost$AI_DownloadPrereq$AI_ExtractPrereq$AI_Game$AI_Game$AI_Game$AI_GxInstall$AI_GxUninstall$AI_InstallPostPrerequisite$AI_InstallPrerequisite$AI_PreRequisite$AI_ProcessAccounts$AI_ProcessGroups$AI_ProcessTasks$AI_ScheduledTasks$AI_UninstallAccounts$AI_UninstallGroups$AI_UninstallTasks$AI_UserAccounts$AI_UserGroups$AI_XmlAttribute$AI_XmlElement$AI_XmlInstall$AI_XmlUninstall$AppId$AppId$BindImage$Complus$Complus$Component_$CreateShortcuts$DuplicateFile$DuplicateFiles$Environment$Extension$Feature$Feature$Feature_$Font$Font$IniFile$IniFile$InstallFinalize$InstallInitialize$InstallODBC$InstallServices$Location$MIME$MIME$MsiAssembly$MsiConfigureServices$MsiPublishAssemblies$ODBCDataSource$ODBCDriver$ODBCTranslator$Options$Options$Options$Patch$Patch$PatchSize$ProgId$ProgId$PublishComponent$PublishComponents$PublishFeatures$RegisterClassInfo$RegisterComPlus$RegisterExtensionInfo$RegisterFonts$RegisterMIMEInfo$RegisterProgIdInfo$RegisterTypeLibraries$Registry$SelfReg$SelfReg$SelfRegModules$ServiceControl$ServiceInstall$Shortcut$StartServices$TypeLib$TypeLib$WriteEnvironmentStrings$WriteIniValues$WriteRegistryValues$~
            • API String ID: 0-402056873
            • Opcode ID: 493be7e1502fa1fee01436d7876374c426b356ae621b0bd1c1b3d38484962b72
            • Instruction ID: 15e527b491f0c08953adc9d609e604d06cbf165659c75c7f21fd69cf62935c3f
            • Opcode Fuzzy Hash: 493be7e1502fa1fee01436d7876374c426b356ae621b0bd1c1b3d38484962b72
            • Instruction Fuzzy Hash: 76C2FD10645389D5CB5DF6B94B1679F69A16B73710F50929CBBA93F3C2CFA40E0183E2
            APIs
            • CreateFileW.KERNEL32(0117D6B0,C0000000,00000003,00000000,00000004,00000080,00000000,9F3ADAE5,0117D68C,0117D6A4,?), ref: 00FDD6B0
            • GetLastError.KERNEL32 ref: 00FDD6CD
            • OutputDebugStringW.KERNEL32(00000000,00000020), ref: 00FDD746
            • OutputDebugStringW.KERNEL32(00000000,?,0000001C), ref: 00FDD84A
            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,0000001C), ref: 00FDD8BB
            • WriteFile.KERNEL32(00000000,00BFC388,00000026,00000000,00000000,?,0000001C), ref: 00FDD8EB
            • WriteFile.KERNEL32(00000000,000000B7,?,00000000,00000000,010F7104,00000002), ref: 00FDD996
            • FlushFileBuffers.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0000001C), ref: 00FDD99F
            • FlushFileBuffers.KERNEL32(00000000,?,0000001C), ref: 00FDD8F0
              • Part of subcall function 00E8A2A0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,?,?,?,*.*,?,80070057,9F3ADAE5), ref: 00E8A2C3
            • OutputDebugStringW.KERNEL32(00000000,?,0000001D), ref: 00FDDA93
            • WriteFile.KERNEL32(00000000,00000000,00000002,?,00000000,?,0000001D), ref: 00FDDB19
            • FlushFileBuffers.KERNEL32(00000000,?,0000001D), ref: 00FDDB24
            • WriteFile.KERNEL32(00000000,000000FF,?,00000000,00000000,010F7104,00000002,?,?,CPU: ,00000005), ref: 00FDDB98
            • FlushFileBuffers.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0000001C), ref: 00FDDBA1
            • WriteFile.KERNEL32(00000000,000000B7,?,00000000,00000000,010F7104,00000002), ref: 00FDDC26
            • FlushFileBuffers.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0000001C), ref: 00FDDC2F
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: File$BuffersFlushWrite$DebugOutputString$Init_thread_footer$CreateErrorFindHeapLastPointerProcessResource
            • String ID: CPU: $LOGGER->Creating LOG file at:$LOGGER->Reusing LOG file at:$LOGGER->failed to create LOG at:$OS Version: %u.%u.%u SP%u (%s) [%s]$server$workstation$x64$x86
            • API String ID: 4051163352-1312762833
            • Opcode ID: f4bbb8974c973e3ec5531dd43db5a28fdd64f58f20c8a1aa36b3e29a07059d29
            • Instruction ID: 81f083cef8fda284af219c4f7f173b9d424b08ac21e1abfcc9fe9e09874dda9d
            • Opcode Fuzzy Hash: f4bbb8974c973e3ec5531dd43db5a28fdd64f58f20c8a1aa36b3e29a07059d29
            • Instruction Fuzzy Hash: A012B0709016059FEB10DF68CC49BAEBBB5FF44324F1881A9E814AB3A6DB74DD44DB90
            APIs
            • lstrcmpiW.KERNEL32(?,?,msix,00000004,?,?,?,?,?, ?(-|/)+q,010F8D76), ref: 00EBCFA1
            • lstrcmpiW.KERNEL32(?,?,msixbundle,0000000A,msix,00000004,?,?,?,?,?, ?(-|/)+q,010F8D76), ref: 00EBD131
            • GetCurrentThreadId.KERNEL32 ref: 00EBD321
            • Sleep.KERNEL32(000007D0,?,?,?,?,?,?,?,?,?,?, ?(-|/)+q,010F8D76), ref: 00EBD6C1
            • std::_Throw_Cpp_error.LIBCPMT ref: 00EBD744
            • std::_Throw_Cpp_error.LIBCPMT ref: 00EBD74B
            • std::_Throw_Cpp_error.LIBCPMT ref: 00EBD752
            • std::_Throw_Cpp_error.LIBCPMT ref: 00EBD768
            • GetCurrentThreadId.KERNEL32 ref: 00EBD95E
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            • std::_Throw_Cpp_error.LIBCPMT ref: 00EBDA6F
            • std::_Throw_Cpp_error.LIBCPMT ref: 00EBDA76
            • std::_Throw_Cpp_error.LIBCPMT ref: 00EBDA7D
            • std::_Throw_Cpp_error.LIBCPMT ref: 00EBDA84
              • Part of subcall function 00EA2290: FindClose.KERNEL32(00000000), ref: 00EA23CF
              • Part of subcall function 00EA2290: PathIsUNCW.SHLWAPI(?,*.*,00000000), ref: 00EA2487
              • Part of subcall function 00FACA20: FormatMessageW.KERNEL32(00001300,00000000,00000000,00000400,?,00000000,00000000,9F3ADAE5,?,00000000), ref: 00FACA6B
              • Part of subcall function 00FACA20: GetLastError.KERNEL32(?,00000000), ref: 00FACA75
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Cpp_errorThrow_std::_$CurrentInit_thread_footerThreadlstrcmpi$CloseErrorFindFormatHeapLastMessagePathProcessSleep
            • String ID: ?(-|/)+q$($Launch failed. Error:$Launching file:$Return code of launched file:$appx$msix$msixbundle
            • API String ID: 2370152566-3482523422
            • Opcode ID: 208b0d993f5ce787c7766676a0d469aa06e5152e1044afdfd7a9b5f1b5bcb47c
            • Instruction ID: a2bd2f478faaeb47d1bac3505968595783ec43a16057e5170335166443794e8f
            • Opcode Fuzzy Hash: 208b0d993f5ce787c7766676a0d469aa06e5152e1044afdfd7a9b5f1b5bcb47c
            • Instruction Fuzzy Hash: 02A2BE70D00219CFDB24DF68CC45BEEB7B1AF45318F148299D459BB291EB70AE85CB91
            APIs
              • Part of subcall function 00E96B00: EnterCriticalSection.KERNEL32(0118297C,9F3ADAE5,00000000,?,?,?,?,?,?,.c,0108826D,000000FF), ref: 00E96B3D
              • Part of subcall function 00E96B00: GetClassInfoExW.USER32 ref: 00E96B81
              • Part of subcall function 00E96B00: LoadCursorW.USER32(00000000,00007F00), ref: 00E96BB8
              • Part of subcall function 00E96B00: RegisterClassExW.USER32(00000030), ref: 00E96BE1
              • Part of subcall function 00E96B00: GetClassInfoExW.USER32(AtlAxWinLic140,00000030), ref: 00E96C2A
              • Part of subcall function 00E96B00: LoadCursorW.USER32(00000000,00007F00), ref: 00E96C5E
              • Part of subcall function 00E96B00: RegisterClassExW.USER32(00000030), ref: 00E96C7F
            • SysFreeString.OLEAUT32(00000000), ref: 00E96713
            • GetWindowLongW.USER32(?,000000EC), ref: 00E9681B
            • GetWindowLongW.USER32(?,000000EC), ref: 00E9682B
            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00E96836
            • NtdllDefWindowProc_W.NTDLL(?,?,00000001,?), ref: 00E96844
            • GetWindowLongW.USER32(?,000000EB), ref: 00E96852
            • GetWindowTextLengthW.USER32(?), ref: 00E96876
            • GetWindowTextW.USER32(?,00000000,00000001), ref: 00E968E5
            • SetWindowTextW.USER32(?,010F42AC), ref: 00E968F1
            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00E96926
            • GlobalLock.KERNEL32(00000000), ref: 00E96934
            • GlobalUnlock.KERNEL32(?), ref: 00E96988
            • SetWindowLongW.USER32(?,000000EB,00000000), ref: 00E96A13
            • SysFreeString.OLEAUT32(00000000), ref: 00E96A2C
            • NtdllDefWindowProc_W.NTDLL(?,?,?,00000000), ref: 00E96A73
            • SysFreeString.OLEAUT32(00000000), ref: 00E96A92
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$Long$Class$FreeGlobalStringText$CursorInfoLoadNtdllProc_Register$AllocCriticalEnterLengthLockSectionUnlock
            • String ID: .c$.c
            • API String ID: 3033972998-2435476076
            • Opcode ID: f4df2015af47d8878c898f3176d1a61a59cec219287da4887f21321ea1c675e7
            • Instruction ID: 895944f1aec2a0391e74bd774f3e2c65edb59286e0c1fa24f63b12143309db13
            • Opcode Fuzzy Hash: f4df2015af47d8878c898f3176d1a61a59cec219287da4887f21321ea1c675e7
            • Instruction Fuzzy Hash: B8D1C271904209EFDF10DFA4C948BAFBBB9EF45714F14816AF911BB280D7759A00CBA1
            APIs
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
              • Part of subcall function 00E8A2A0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,?,?,?,*.*,?,80070057,9F3ADAE5), ref: 00E8A2C3
            • SysFreeString.OLEAUT32(00000000), ref: 00EAD479
            • SysFreeString.OLEAUT32(00000000), ref: 00EAD897
            • SysFreeString.OLEAUT32(00000000), ref: 00EADA2C
              • Part of subcall function 00E8A9B0: RtlAllocateHeap.NTDLL(?,00000000,?,9F3ADAE5,00000000,01084C50,000000FF,?,?,01173854,?,00FE9828,80004005,9F3ADAE5,?,?), ref: 00E8A9FA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: FreeString$HeapInit_thread_footer$AllocateFindProcessResource
            • String ID: GetFontHeight$MessageBox$MsiEvaluateCondition$MsiGetBinaryPath$MsiGetBinaryPathIndirect$MsiGetBytesCountText$MsiGetFormattedError$MsiGetProperty$MsiPublishEvents$MsiResolveFormatted$MsiSetProperty
            • API String ID: 2507001652-3153392536
            • Opcode ID: f5b938c85012bf0ebae3081d7c5a1e97c7105bf969d53c640c6a1cb666c2d5d3
            • Instruction ID: 5a80c245c2aaf99ce0310bb5f4268f3970de47a60df062ac40f8a09372454cc1
            • Opcode Fuzzy Hash: f5b938c85012bf0ebae3081d7c5a1e97c7105bf969d53c640c6a1cb666c2d5d3
            • Instruction Fuzzy Hash: 18E2AF71D04248CBDB14DFA8CC447DEBBB4FF49314F248259E85ABB291EB74AA85CB50
            APIs
            • GetClientRect.USER32(?,?), ref: 00EA0538
            • GetWindowLongW.USER32(?,000000EB), ref: 00EA05B3
            • ShowWindow.USER32(00000000,?), ref: 00EA05D2
            • SetWindowLongW.USER32(?,000000EB,00000000), ref: 00EA05E0
            • GetWindowRect.USER32(00000000,?), ref: 00EA05F7
            • ShowWindow.USER32(00000000,?), ref: 00EA0618
            • SetWindowLongW.USER32(?,000000EB,?), ref: 00EA062F
              • Part of subcall function 00E8A9B0: RtlAllocateHeap.NTDLL(?,00000000,?,9F3ADAE5,00000000,01084C50,000000FF,?,?,01173854,?,00FE9828,80004005,9F3ADAE5,?,?), ref: 00E8A9FA
            • GetClientRect.USER32(?,?), ref: 00EA06E8
            • ShowWindow.USER32(?,?), ref: 00EA076D
            • GetWindowLongW.USER32(?,000000EB), ref: 00EA079C
            • ShowWindow.USER32(?,?), ref: 00EA07B9
            • GetWindowRect.USER32(?,?), ref: 00EA07DE
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$LongRectShow$Client$AllocateHeap
            • String ID:
            • API String ID: 2610838350-0
            • Opcode ID: a38aadca215b09b5148263bf8e5e05454937106e07135197718b1838bfd04d6a
            • Instruction ID: 927208f6fc2714a7c37dbd6cfad747321253722a6b0fd4445d569e2fa0f2b609
            • Opcode Fuzzy Hash: a38aadca215b09b5148263bf8e5e05454937106e07135197718b1838bfd04d6a
            • Instruction Fuzzy Hash: 54423671A04208DFDB24CFA8D984AAEBBF5FF89304F14456EF859AB260D730A945CF51
            APIs
            • FindClose.KERNEL32(00000000), ref: 00EA23CF
            • PathIsUNCW.SHLWAPI(?,*.*,00000000), ref: 00EA2487
            • FindFirstFileW.KERNEL32(?,?,*.*,00000000), ref: 00EA25DC
            • GetFullPathNameW.KERNEL32(?,00000000,00000000,00000000), ref: 00EA25F6
            • GetFullPathNameW.KERNEL32(?,00000000,?,00000000), ref: 00EA2629
            • FindClose.KERNEL32(00000000), ref: 00EA2698
            • SetLastError.KERNEL32(0000007B), ref: 00EA26A6
            • _wcsrchr.LIBVCRUNTIME ref: 00EA26FC
            • _wcsrchr.LIBVCRUNTIME ref: 00EA271C
            • PathIsUNCW.SHLWAPI(*.*,?,9F3ADAE5), ref: 00EA28B5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Path$Find$CloseFullName_wcsrchr$ErrorFileFirstLast
            • String ID: *.*$\\?\$\\?\UNC\
            • API String ID: 1241272779-1700010636
            • Opcode ID: 0cf96bce463427d0703ca73a5b360f0e6262468515913dfd824b95990fafe70f
            • Instruction ID: d1ad04d61980c436278171c188ca207cbebef1b73393804892b24380785fa5eb
            • Opcode Fuzzy Hash: 0cf96bce463427d0703ca73a5b360f0e6262468515913dfd824b95990fafe70f
            • Instruction Fuzzy Hash: 6A321230A006069FDB14DF6CC848B6AB7F5FF5A318F14426DEA15BF291EB76A904CB40
            APIs
            • GetWindowLongW.USER32(80070216,000000EC), ref: 00E9617B
            • GetWindowLongW.USER32(00000000,000000EC), ref: 00E9618B
            • SetWindowLongW.USER32(00000000,000000EC,00000000), ref: 00E96196
            • NtdllDefWindowProc_W.NTDLL(00000000,00000000,00000001,80070216,?,?,80070216), ref: 00E961A4
            • GetWindowLongW.USER32(00000000,000000EB), ref: 00E961B2
            • GetWindowTextLengthW.USER32(00000000), ref: 00E961D6
            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00E96245
            • SetWindowTextW.USER32(00000000,010F42AC), ref: 00E96251
            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00E96286
            • GlobalLock.KERNEL32(00000000), ref: 00E96294
            • GlobalUnlock.KERNEL32(?), ref: 00E962E8
            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00E9634D
            • NtdllDefWindowProc_W.NTDLL(00000000,00000000,9F3ADAE5,00000000), ref: 00E9639F
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$Long$GlobalText$NtdllProc_$AllocLengthLockUnlock
            • String ID:
            • API String ID: 2673961051-0
            • Opcode ID: f7a0fcf650d47d3e87810d2efcc4399c1d87b067f96ee805bed847999f3a0efb
            • Instruction ID: 4dacca1ac30e9c82ccc4a64157f942472f90a4fa1f04dbb21987061e1095d78a
            • Opcode Fuzzy Hash: f7a0fcf650d47d3e87810d2efcc4399c1d87b067f96ee805bed847999f3a0efb
            • Instruction Fuzzy Hash: B1E1D071A00206DFDF24DF68C848BAFBBB9EF85314F14452AE915EB291DB35D900CBA1
            APIs
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            • FindFirstFileW.KERNEL32(?,?,?,00000001), ref: 00FB7DB2
            • FindClose.KERNEL32(00000000), ref: 00FB7DE0
            • FindClose.KERNEL32(00000000), ref: 00FB7E69
            Strings
            • An acceptable version was found., xrefs: 00FB8352
            • No acceptable version found. Operating System not supported., xrefs: 00FB836E
            • No acceptable version found. It is already downloaded and it will be installed., xrefs: 00FB8375
            • No acceptable version found., xrefs: 00FB837C
            • No acceptable version found. It must be downloaded., xrefs: 00FB8360
            • No acceptable version found. It must be installed from package., xrefs: 00FB8359
            • No acceptable version found. It must be downloaded manually from a site., xrefs: 00FB8367
            • Not selected for install., xrefs: 00FB8383
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Find$CloseInit_thread_footer$FileFirstHeapProcess
            • String ID: An acceptable version was found.$No acceptable version found.$No acceptable version found. It is already downloaded and it will be installed.$No acceptable version found. It must be downloaded manually from a site.$No acceptable version found. It must be downloaded.$No acceptable version found. It must be installed from package.$No acceptable version found. Operating System not supported.$Not selected for install.
            • API String ID: 544434140-749633484
            • Opcode ID: f77118128bad59ca8eb52aee6f8ade1bd3cc5e83ba8675e7071423b455a31811
            • Instruction ID: 8db427b745d34496f4d381a9934754ea5697b7c3f0d4cece778430c163f330ee
            • Opcode Fuzzy Hash: f77118128bad59ca8eb52aee6f8ade1bd3cc5e83ba8675e7071423b455a31811
            • Instruction Fuzzy Hash: A4F18E709047098FDB10EF29C9487AEFBF1AF85320F1482A9D859AB391DB349E45DF91
            APIs
            • SendMessageW.USER32(?,00001036,00010000,00000000), ref: 00F87D3B
            • GetParent.USER32(00000000), ref: 00F87D8E
            • GetWindowRect.USER32(00000000), ref: 00F87D91
            • GetParent.USER32(00000000), ref: 00F87DA0
            • GetDC.USER32(00000000), ref: 00F87DA3
            • CreateCompatibleDC.GDI32(00000000), ref: 00F87DD0
            • CreateCompatibleBitmap.GDI32(00000000), ref: 00F87E0F
            • SelectObject.GDI32(?,00000000), ref: 00F87E20
            • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 00F87E36
              • Part of subcall function 00F3E220: IsWindowVisible.USER32(?), ref: 00F3E29A
              • Part of subcall function 00F3E220: GetWindowRect.USER32(?,?), ref: 00F3E2B2
              • Part of subcall function 00F3E220: GetWindowRect.USER32(?,?), ref: 00F3E2CA
              • Part of subcall function 00F3E220: IntersectRect.USER32(?,?,?), ref: 00F3E2E7
              • Part of subcall function 00F3E220: EqualRect.USER32(?,?), ref: 00F3E2F7
              • Part of subcall function 00F3E220: GetSysColorBrush.USER32(0000000F), ref: 00F3E30D
            • FillRect.USER32(?,?,00000000), ref: 00F87E4C
            • DeleteDC.GDI32(?), ref: 00F87E6C
            • SendMessageW.USER32(?,00001026,00000000,000000FF), ref: 00F87E90
            • SendMessageW.USER32(?,0000108A,00000000,00000011), ref: 00F87EA3
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Rect$Window$MessageSend$CompatibleCreateParent$BitmapBrushColorDeleteEqualFillIntersectObjectPointsSelectVisible
            • String ID:
            • API String ID: 2161025992-0
            • Opcode ID: 01ea84bed758d1e6c6db0151100eaf5501b4b702586b4428567aa80be4e86140
            • Instruction ID: 5a4464bf18c1d141d9a655ab5b0a6c6c591eced8343eefea6c77f580803bd1af
            • Opcode Fuzzy Hash: 01ea84bed758d1e6c6db0151100eaf5501b4b702586b4428567aa80be4e86140
            • Instruction Fuzzy Hash: EF514771D04608ABDB21DFA8C945BDEFBF8EF59710F20436AE915B7281EB706980CB50
            APIs
              • Part of subcall function 00E8A9B0: RtlAllocateHeap.NTDLL(?,00000000,?,9F3ADAE5,00000000,01084C50,000000FF,?,?,01173854,?,00FE9828,80004005,9F3ADAE5,?,?), ref: 00E8A9FA
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
              • Part of subcall function 00E8A2A0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,?,?,?,*.*,?,80070057,9F3ADAE5), ref: 00E8A2C3
            • CopyFileW.KERNEL32(?,?,00000000,00000000,00000000), ref: 00FBBFF8
            • CopyFileW.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,?), ref: 00FBC4F9
              • Part of subcall function 00F92490: MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,00000000,00000000,?,?,0117D68C,00FDDE10,?), ref: 00F924A8
              • Part of subcall function 00F92490: MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,?,-00000001), ref: 00F924DA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ByteCharCopyFileHeapInit_thread_footerMultiWide$AllocateFindProcessResource
            • String ID: AI_PRODUCTNAME_ARP$InstanceId$ProductCode$ProductName$\\?\$instname-custom.mst$instname-target.msi${%0.8X-%0.4X-%0.4X-%0.2X%0.2X-%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X}
            • API String ID: 2868415777-2893908338
            • Opcode ID: f2b142ef44e69e2ca25305ed0baaab8b14842750a1da7fde432a3ff5e84fbca8
            • Instruction ID: 788c29b976f7d5af7f97db745ee08f239b69e42efedd4bc6a8df6c5db4d20adf
            • Opcode Fuzzy Hash: f2b142ef44e69e2ca25305ed0baaab8b14842750a1da7fde432a3ff5e84fbca8
            • Instruction Fuzzy Hash: F5D2AF70901649DFDB00DFA9C844BEEBBF4AF45324F188169E815EB292EB749E04DF91
            APIs
            • __Init_thread_footer.LIBCMT ref: 00FAF87D
            • __Init_thread_footer.LIBCMT ref: 00FAFA22
              • Part of subcall function 0105D07E: EnterCriticalSection.KERNEL32(0117BF4C,?,?,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5,?,?), ref: 0105D089
              • Part of subcall function 0105D07E: LeaveCriticalSection.KERNEL32(0117BF4C,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5,?,?), ref: 0105D0C6
            • GetStdHandle.KERNEL32(000000F5,?,9F3ADAE5,?,?), ref: 00FAFAAA
            • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?), ref: 00FAFAB1
            • GetStdHandle.KERNEL32(000000F5,0000000C,?,?), ref: 00FAFAC5
            • SetConsoleTextAttribute.KERNEL32(00000000,?,?), ref: 00FAFACC
            • GetStdHandle.KERNEL32(000000F5,000000FF,?,00000000,?,00000000,010F7104,00000002,?,?), ref: 00FAFB5B
            • SetConsoleTextAttribute.KERNEL32(00000000,?,?), ref: 00FAFB62
            • IsWindow.USER32(00000000), ref: 00FAFDF9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ConsoleHandle$AttributeCriticalInit_thread_footerSectionText$BufferEnterInfoLeaveScreenWindow
            • String ID: Error
            • API String ID: 2811146417-2619118453
            • Opcode ID: 82861373d539df75cff821e5d900e79da5061286cd84306a5ba6cf4b287dd197
            • Instruction ID: 190de67eb80c39f779d07d89895e89bd16e340b7632efee493b86f244883e167
            • Opcode Fuzzy Hash: 82861373d539df75cff821e5d900e79da5061286cd84306a5ba6cf4b287dd197
            • Instruction Fuzzy Hash: 0142AFB0D1021ADFDB24DFA8CC44BEEB7B0BF55714F1042A9E418AB290E7749A89DF50
            APIs
            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00EB975F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: ' AND `Control_`='$AiTabPage$ControlEvent$Dialog$SpawnDialog$Title$`Dialog_`='
            • API String ID: 3850602802-1412757306
            • Opcode ID: ab8cacdb8d48cf187f930a6e73e1158e62a4f48a3ba0c488508185e5c1536609
            • Instruction ID: a0df6918c0a71296012ca524757bd8be262e64a193e26d7c5f49b0c8a36f6128
            • Opcode Fuzzy Hash: ab8cacdb8d48cf187f930a6e73e1158e62a4f48a3ba0c488508185e5c1536609
            • Instruction Fuzzy Hash: F072D031D00258DFDB14DFA8C984BEEB7B1FF59304F148299E549BB291DB74AA84CB90
            APIs
            • SendMessageW.USER32(?,00001009,00000000,00000000), ref: 00EAF4F1
              • Part of subcall function 0105D07E: EnterCriticalSection.KERNEL32(0117BF4C,?,?,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5,?,?), ref: 0105D089
              • Part of subcall function 0105D07E: LeaveCriticalSection.KERNEL32(0117BF4C,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5,?,?), ref: 0105D0C6
            • __Init_thread_footer.LIBCMT ref: 00EAF4AE
              • Part of subcall function 0105D034: EnterCriticalSection.KERNEL32(0117BF4C,?,?,00E8AE07,0117CB7C,010E6B00), ref: 0105D03E
              • Part of subcall function 0105D034: LeaveCriticalSection.KERNEL32(0117BF4C,?,00E8AE07,0117CB7C,010E6B00), ref: 0105D071
              • Part of subcall function 0105D034: RtlWakeAllConditionVariable.NTDLL ref: 0105D0E8
            • SendMessageW.USER32(?,0000104D,00000000,?), ref: 00EAFA12
            • SendMessageW.USER32(?,0000102B,?,0000000F), ref: 00EAFAC0
            • SendMessageW.USER32(?,00001003,00000001,?), ref: 00EAFB61
              • Part of subcall function 00F9DCE0: __cftof.LIBCMT ref: 00F9DD30
            • SendMessageW.USER32(?,0000101E,00000000,0000FFFE), ref: 00EAFD98
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend$CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake__cftof
            • String ID: AiFeatIco$Icon
            • API String ID: 2303580663-1280411655
            • Opcode ID: 9fa86dbffe778a0a615ec0bd406e11bcc5df9f2a811b98fe178a95a7cda083f1
            • Instruction ID: fd7b3c1239068606b3960561d11258e849cbc4c477f9994300652a60537c1308
            • Opcode Fuzzy Hash: 9fa86dbffe778a0a615ec0bd406e11bcc5df9f2a811b98fe178a95a7cda083f1
            • Instruction Fuzzy Hash: 84625A70900658DFDB24DF64CC98BEEBBB1EF99304F1041A9E459AB291DB706E84CF90
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: $AI_DynInstances$AI_GenNewCompGuids$AI_MajorUpgrades$InstanceId$Manufacturer$OldProductCode$ProductCode$ProductVersion$UpgradeCode
            • API String ID: 0-614494711
            • Opcode ID: 5d2faf686872a2d58cbbe1787fc57adb28e72b1f3ec9dbacb7740210ea2c367e
            • Instruction ID: 1a5af2f863ee72130e89baf6ac81b63684570f80ad05d20b5d24fb3488c33183
            • Opcode Fuzzy Hash: 5d2faf686872a2d58cbbe1787fc57adb28e72b1f3ec9dbacb7740210ea2c367e
            • Instruction Fuzzy Hash: 15620331D00258CBDF18DB64CD94BEEB7B1AF59304F18829DD449BB291DB746E84CBA1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: AI_CONTROL_VISUAL_STYLE$AI_CONTROL_VISUAL_STYLE_EX$AI_NO_BORDER_HOVER$AI_NO_BORDER_NORMAL
            • API String ID: 0-932585912
            • Opcode ID: ede3d6a27e8cb184d51962a018f8f2ae7a2d368f05cbfd1dc608dcf051eb1d50
            • Instruction ID: 01306a95c400222419a1bd5190b6b4f0b3bef75d320cdd9d10b90e4f8cec0592
            • Opcode Fuzzy Hash: ede3d6a27e8cb184d51962a018f8f2ae7a2d368f05cbfd1dc608dcf051eb1d50
            • Instruction Fuzzy Hash: 1142E171D002188FDB18CF68CC947EEB7B1EF9A304F148259E495BB395C774AA45CBA1
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: __floor_pentium4
            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
            • API String ID: 4168288129-2761157908
            • Opcode ID: 8ab3c8a07a5a394be9e2d119db71efae66ae9e3927617f2b435865d9f0b57796
            • Instruction ID: fcd8d01c9f91e016b7bbeb6ff60c665742b3bccfd6f6f717e5c56543709c465d
            • Opcode Fuzzy Hash: 8ab3c8a07a5a394be9e2d119db71efae66ae9e3927617f2b435865d9f0b57796
            • Instruction Fuzzy Hash: CCD22871E082298FDB65DE28DD407EAB7F5EB44304F1441EAE48DE7244EB78AE858F41
            APIs
            • IsProcessorFeaturePresent.KERNEL32(0000000C,0105C5D2,00000000,?,0105C76A,?,?,?), ref: 0105C6B8
            • GetProcessHeap.KERNEL32(00000008,00000008,00000000,00000000,?,0105C76A,?,?,?), ref: 0105C6DF
            • HeapAlloc.KERNEL32(00000000,?,0105C76A,?,?,?), ref: 0105C6E6
            • InitializeSListHead.KERNEL32(00000000,?,0105C76A,?,?,?), ref: 0105C6F3
            • GetProcessHeap.KERNEL32(00000000,00000000,?,0105C76A,?,?,?), ref: 0105C708
            • HeapFree.KERNEL32(00000000,?,0105C76A,?,?,?), ref: 0105C70F
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Heap$Process$AllocFeatureFreeHeadInitializeListPresentProcessor
            • String ID:
            • API String ID: 1475849761-0
            • Opcode ID: 5da66ce59349134b13c52faaf0148f83ef011dc446b8a8d5c23529a8e13fd093
            • Instruction ID: d2b1f43020c81e0e0fefc14527f2752161068ba5c73af40a329378a42ce2ca00
            • Opcode Fuzzy Hash: 5da66ce59349134b13c52faaf0148f83ef011dc446b8a8d5c23529a8e13fd093
            • Instruction Fuzzy Hash: 41F0A4716012119FEBB19F2E990CB167BF8BB88A15F040428FAD1C7345DB35C400C760
            APIs
            • _wcsrchr.LIBVCRUNTIME ref: 00FA8F28
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            • FindFirstFileW.KERNEL32(?,00000000), ref: 00FA9028
            • FindFirstFileW.KERNEL32(?,00000000,0000002A,?,00000000), ref: 00FA90C5
            • FindClose.KERNEL32(00000000,?,00000000), ref: 00FA90EB
            • FindClose.KERNEL32(00000000,?,00000000), ref: 00FA9135
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Find$CloseFileFirstInit_thread_footer$HeapProcess_wcsrchr
            • String ID:
            • API String ID: 352340201-0
            • Opcode ID: 3d24e84c00f6e0970fea090651366c5f15320af85742b794cf875cc51f245a89
            • Instruction ID: 9930acbd23bd53e9a9095bb9d6cea88b2fa1ed5240dcbcfb117bb5542f04587b
            • Opcode Fuzzy Hash: 3d24e84c00f6e0970fea090651366c5f15320af85742b794cf875cc51f245a89
            • Instruction Fuzzy Hash: 0571F6B1D0420A9FDB14DF68CC48BAEB7F5FF45324F14862AE825972C0E7B59904DB90
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Init_thread_footer
            • String ID: AI_EXIST_INSTANCES$AI_EXIST_NEW_INSTANCES$MultipleInstances$MultipleInstancesProps$PropertyValue
            • API String ID: 1385522511-2308371840
            • Opcode ID: 62a4ee7e2d38bcb7515eb54d0ede2f57cfe13476f93adeb9b20db1e12015543e
            • Instruction ID: d2c19117c2c0c72bf0175ce4957b5938d606c125628fc6f29206212c2ef5bece
            • Opcode Fuzzy Hash: 62a4ee7e2d38bcb7515eb54d0ede2f57cfe13476f93adeb9b20db1e12015543e
            • Instruction Fuzzy Hash: 3122E330D003489FDB08DFA4CD59BEEBBB1AF49304F28925DE455BB291DB746A84CB91
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: _strrchr
            • String ID:
            • API String ID: 3213747228-0
            • Opcode ID: 9e0b76cd5f3e377c6f2159358687fa5fc72b664d1f100b5c02f00f2f9645654f
            • Instruction ID: 8ec6adf5aaf23a28f61e39f4c8ad80d96a12781f65e02d18e97a6e6f4418bbb9
            • Opcode Fuzzy Hash: 9e0b76cd5f3e377c6f2159358687fa5fc72b664d1f100b5c02f00f2f9645654f
            • Instruction Fuzzy Hash: FFB16972E042869FDB11CF6CCC807FEBFE5EF55314F1481AAE985AB241D6749902CBA4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: <> "$ = "$Hide$Show
            • API String ID: 0-289022205
            • Opcode ID: 293e12297da3742c5e205616da41769fdf90de1007a8faf1d79630f097305dcc
            • Instruction ID: 9bfebf525a3cfad271254e14e8d198792a45a22965d395f4bfb0c005a8a25ec1
            • Opcode Fuzzy Hash: 293e12297da3742c5e205616da41769fdf90de1007a8faf1d79630f097305dcc
            • Instruction Fuzzy Hash: 3DF18A70D00259CFDB24DF64CD95BEEB7B4AF94304F1082DAD4497B291EB70AA84CBA0
            APIs
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            • GetLocaleInfoW.KERNEL32(?,00000002,010F42AC,00000000), ref: 00FD3561
            • GetLocaleInfoW.KERNEL32(?,00000002,00FD30E5,-00000001,00000078,-00000001), ref: 00FD359D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: InfoInit_thread_footerLocale$HeapProcess
            • String ID: %d-%s
            • API String ID: 1688948774-1781338863
            • Opcode ID: 8b2dbb0d0b2e3c6b341f10ba5fb85e611bb0895fb4ad42b2134394b8b1d75fce
            • Instruction ID: 54248b6b6273b41bb1d59cf7a1d83865d6a49b2643de0f3b797ca336cf87ce02
            • Opcode Fuzzy Hash: 8b2dbb0d0b2e3c6b341f10ba5fb85e611bb0895fb4ad42b2134394b8b1d75fce
            • Instruction Fuzzy Hash: 4C31AF71900205AFDB00EF99CC4ABAEFBB4FF04724F14416EF519AB281DB759900CB90
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: MultipleInstances$MultipleInstancesProps$OldProductCode$ProductCode
            • API String ID: 0-469785651
            • Opcode ID: 954faad1e6d03abdcff87093a6285ec546f2b5056fe8646f37bc521ecd238c97
            • Instruction ID: 98cdb093a75b8f6852992b3a2e53b0cd1b3a8ee24b267bc9fe7d888c167f0d24
            • Opcode Fuzzy Hash: 954faad1e6d03abdcff87093a6285ec546f2b5056fe8646f37bc521ecd238c97
            • Instruction Fuzzy Hash: 56C1E335A00201CFCB18DF68C8956BAB7B2FF8A318B55916DD9067F652E730BD41CBA0
            APIs
            • VirtualQuery.KERNEL32(80000000,01059E57,0000001C,0105A04C,00000000,?,?,?,?,?,?,?,01059E57,00000004,0117BA58,0105A0DC), ref: 01059F23
            • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,01059E57,00000004,0117BA58,0105A0DC), ref: 01059F3E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: InfoQuerySystemVirtual
            • String ID: D
            • API String ID: 401686933-2746444292
            • Opcode ID: f1a6f8523153e8ab2c233b8a1e9a9815093820644229e2e3cd3727cfaad5d7ff
            • Instruction ID: b5dcee03514b56204a8aaa1f4670fec37376d5055c182f70f0d5b9035d7a8759
            • Opcode Fuzzy Hash: f1a6f8523153e8ab2c233b8a1e9a9815093820644229e2e3cd3727cfaad5d7ff
            • Instruction Fuzzy Hash: DA01DB72600109ABDB54DE69DC09BDE7BE9EFC4328F0DC264ED99DB245D638D901C780
            APIs
              • Part of subcall function 00E9AD10: InitializeCriticalSectionAndSpinCount.KERNEL32(0117BED0,00000000,9F3ADAE5,00E80000,Function_00204C50,000000FF,?,0105C3D2,?,?,?,00E87726), ref: 00E9AD35
              • Part of subcall function 00E9AD10: GetLastError.KERNEL32(?,0105C3D2,?,?,?,00E87726), ref: 00E9AD3F
            • IsDebuggerPresent.KERNEL32(?,?,?,00E87726), ref: 0105C3D6
            • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00E87726), ref: 0105C3E5
            Strings
            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0105C3E0
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CountCriticalDebugDebuggerErrorInitializeLastOutputPresentSectionSpinString
            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
            • API String ID: 450123788-631824599
            • Opcode ID: 968088112004e5cc0ce524b4a2876ac8ffb98ecf458bcb80872d918861e22abe
            • Instruction ID: 5422fd13634b4cf75e46aa59d14caafa5984ffb53634a9ed9eb3188aed224e00
            • Opcode Fuzzy Hash: 968088112004e5cc0ce524b4a2876ac8ffb98ecf458bcb80872d918861e22abe
            • Instruction Fuzzy Hash: DFE06D706003118FE7B4AF2AD6483477BE8AF04708F108C6CD8C5D7642EBBAE1888B91
            APIs
            • GetVersionExW.KERNEL32 ref: 01056628
            • GetVersionExW.KERNEL32(?), ref: 01056673
            • IsProcessorFeaturePresent.KERNEL32(00000011), ref: 01056687
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Version$FeaturePresentProcessor
            • String ID:
            • API String ID: 1871528217-0
            • Opcode ID: 7972eb1c0dd6e58e410c3a658d45f94d11a09a60d87ba2b0affeb8b69d55866f
            • Instruction ID: 42d0720be2662100311dd96afb6e4de07ecfeb679e057160a5d6ea75e9fa95da
            • Opcode Fuzzy Hash: 7972eb1c0dd6e58e410c3a658d45f94d11a09a60d87ba2b0affeb8b69d55866f
            • Instruction Fuzzy Hash: C5610872A102244FF398CE2D8C952ABBBD6DBC9345F04463EE9D5C7280D679C549CBA0
            APIs
            • IsWindow.USER32(00000004), ref: 00EA010E
            • GetWindowLongW.USER32(00000004,000000FC), ref: 00EA0127
            • SetWindowLongW.USER32(00000004,000000FC,?), ref: 00EA0139
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$Long
            • String ID:
            • API String ID: 847901565-0
            • Opcode ID: e658d60758f80f370f9462edb02956427b017521b18eae51c401527cff579f26
            • Instruction ID: 148c18d578a24ccf5560f8b1f5b14a7f948f70d844da7e8f0eb111d65f97b02d
            • Opcode Fuzzy Hash: e658d60758f80f370f9462edb02956427b017521b18eae51c401527cff579f26
            • Instruction Fuzzy Hash: CF419AB0A05606EFDB14DF65C908B9AFBB8FF19314F104268E5649BB80D776F914CB90
            APIs
            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 01061EEB
            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 01061EF5
            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 01061F02
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled$DebuggerPresent
            • String ID:
            • API String ID: 3906539128-0
            • Opcode ID: e80b5721ebcb29a9cdf2eece74b9800424607fa759cae39f19f80c8ebd104a7a
            • Instruction ID: 4e0f8c304716a292a2a502fdeb004cb4527642c8aa44cda419ae528925444667
            • Opcode Fuzzy Hash: e80b5721ebcb29a9cdf2eece74b9800424607fa759cae39f19f80c8ebd104a7a
            • Instruction Fuzzy Hash: 2031057090122DABCB61DF68D9887CDBBF8BF18310F1041EAE85CA7250E7709B858F44
            APIs
            • LoadResource.KERNEL32(00000000,00000000,9F3ADAE5,00000001,00000000,?,00000000,01084A00,000000FF,?,00E8A10C,9F3ADAE5,?,?,*.*,?), ref: 00E8A18B
            • LockResource.KERNEL32(00000000,?,00E8A10C,9F3ADAE5,?,?,*.*,?,00000000,010850D0,000000FF,?,00E8A2B0,?,?,*.*), ref: 00E8A196
            • SizeofResource.KERNEL32(00000000,00000000,?,00E8A10C,9F3ADAE5,?,?,*.*,?,00000000,010850D0,000000FF,?,00E8A2B0,?,?), ref: 00E8A1A4
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Resource$LoadLockSizeof
            • String ID:
            • API String ID: 2853612939-0
            • Opcode ID: 1bc9f9e9215b1f040def7fd483e40cd5c7f11ba51541137b1e2eded7991a55a8
            • Instruction ID: ea0cfc2379ea1d0ee1d8b1508ab68f23ba981be09ffeaf2358d58cdb0ee0cb50
            • Opcode Fuzzy Hash: 1bc9f9e9215b1f040def7fd483e40cd5c7f11ba51541137b1e2eded7991a55a8
            • Instruction Fuzzy Hash: 5211E776A04A549FD7349F69D848B66F7E8E788B24F04493BEC5ED3640E6359C008790
            APIs
            • GetWindowLongW.USER32(0000001B,000000FC), ref: 00E98C59
            • SetWindowLongW.USER32(0000001B,000000FC,?), ref: 00E98C67
            • DestroyWindow.USER32(0000001B), ref: 00E98C93
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$Long$Destroy
            • String ID:
            • API String ID: 3055081903-0
            • Opcode ID: 3387b0cff5320622d632dd62e00257a20549a83bbbcac51dfb4eb04d547c1d9c
            • Instruction ID: 088ad0c31ddb65c22bc9ad4f852ae6db78a514e65b8c5bfd0e2fbad00e58e96c
            • Opcode Fuzzy Hash: 3387b0cff5320622d632dd62e00257a20549a83bbbcac51dfb4eb04d547c1d9c
            • Instruction Fuzzy Hash: F9F01D30009B159BDB709F28EE04B92BBF0BB05721F144B69F5BA926E4DB31A844DB14
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: ) AND ( $Show$gfff
            • API String ID: 0-344708357
            • Opcode ID: 450ba20f34d1404d0b92fbb3bb061ae3ff21e7ece8a93289f65dc3df69905f48
            • Instruction ID: dd3076a684885fadd482bbd87d8eecfa6170d1b85caa7907011d15e92b77d4cb
            • Opcode Fuzzy Hash: 450ba20f34d1404d0b92fbb3bb061ae3ff21e7ece8a93289f65dc3df69905f48
            • Instruction Fuzzy Hash: 11D18C71901258CFEB26DF68C945BAEBBF1BF45304F1486DDD449BB281DB30AA84CB51
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6623433adaf61770b287b3ddac49c5cfca5bdbedcea1cffde8d45c5c429c772b
            • Instruction ID: b252320c4c95feab12388878b96ba4808321151bc2db17d64d7bbdf5f031d310
            • Opcode Fuzzy Hash: 6623433adaf61770b287b3ddac49c5cfca5bdbedcea1cffde8d45c5c429c772b
            • Instruction Fuzzy Hash: CEF15071E002199FDF14CFA8C980AADBBF5FF88314F158269E995AB381D7319A41CB80
            APIs
            • SendMessageW.USER32(?,0000102B,00000000,00000001), ref: 00EB0DAB
            • SendMessageW.USER32(?,0000102B,?,-00000002), ref: 00EB0F95
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend
            • String ID:
            • API String ID: 3850602802-0
            • Opcode ID: d15b48943cb57bf432be052b9f7fb2288a8763b697dde412428ce3181a45c277
            • Instruction ID: 108d9b95d0e9c111423f05c5e9a4bad4c1c01a17ceeb56a728614e1446c105c5
            • Opcode Fuzzy Hash: d15b48943cb57bf432be052b9f7fb2288a8763b697dde412428ce3181a45c277
            • Instruction Fuzzy Hash: 52B1AD71A00246AFDB28DF64C595BEBFBF5FB18304F149669E459EB281D730E940CB90
            APIs
            • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000400,?,00000000,00000000,9F3ADAE5,?,00000000), ref: 00FACA6B
            • GetLastError.KERNEL32(?,00000000), ref: 00FACA75
              • Part of subcall function 00E8A9B0: RtlAllocateHeap.NTDLL(?,00000000,?,9F3ADAE5,00000000,01084C50,000000FF,?,?,01173854,?,00FE9828,80004005,9F3ADAE5,?,?), ref: 00E8A9FA
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: AllocateErrorFormatHeapLastMessage
            • String ID:
            • API String ID: 4114510652-0
            • Opcode ID: 364dd0aff43d47ca8fd1b007f90f64ec74154f5d26f272acf44813bb987a701e
            • Instruction ID: e43e60add427e34bda134f600236152d57d7a19df2af800f335029be840b929f
            • Opcode Fuzzy Hash: 364dd0aff43d47ca8fd1b007f90f64ec74154f5d26f272acf44813bb987a701e
            • Instruction Fuzzy Hash: 6241D3B1E042099BEB14DF99C8067AEF7F4EF85724F14016EE809A7380D7B659008BD1
            APIs
            • GetWindowLongW.USER32(00000000,000000FC), ref: 00EF77CF
            • SetWindowLongW.USER32(00000000,000000FC,?), ref: 00EF77DD
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: LongWindow
            • String ID:
            • API String ID: 1378638983-0
            • Opcode ID: dbcff92cc0172409cd1098d20827035dce95d0b4b6896131a854ffbf13be9154
            • Instruction ID: a86289287180f0eb9e5984733abaa0af878f9acd22e3157d2d7c8e41b95e5b8a
            • Opcode Fuzzy Hash: dbcff92cc0172409cd1098d20827035dce95d0b4b6896131a854ffbf13be9154
            • Instruction Fuzzy Hash: 93315C7190460AEFDB20EF69CA44B9AFBB4FB04324F14436AE964A77D0D771A950CBD0
            APIs
            • GetSystemTimePreciseAsFileTime.KERNEL32(?,0105C140,?,?,?,?,00FC3751), ref: 0105C396
            • GetSystemTimeAsFileTime.KERNEL32(?,00000000,?,0105C140,?,?,?,?,00FC3751), ref: 0105C39A
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Time$FileSystem$Precise
            • String ID:
            • API String ID: 743729956-0
            • Opcode ID: 0e9f4a108e050f80b1d2ad7d167eb294efb12cb6d8303f64226694c0d9ff762a
            • Instruction ID: c3d55754af1ce89a43be74765267e59a719e1a5459fc39f7c6f5df221de4f80a
            • Opcode Fuzzy Hash: 0e9f4a108e050f80b1d2ad7d167eb294efb12cb6d8303f64226694c0d9ff762a
            • Instruction Fuzzy Hash: 2CD0223290223CE78F222F85F90489E7FACDB04F1030080A5EE864B304CBB62D008BD4
            APIs
            • __set_se_translator.LIBVCRUNTIME ref: 00EBEF35
            • SetUnhandledExceptionFilter.KERNEL32(Function_001287F0), ref: 00EBEF4B
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled__set_se_translator
            • String ID:
            • API String ID: 2480343447-0
            • Opcode ID: d0df861721635cf53bc721b17cc2b28f7b3897c2be514b6f6d487454cbfc717a
            • Instruction ID: f3fd3a8436c2f1bc743df43953245c9d50b78cabb62dfff7b8febe71d2af504d
            • Opcode Fuzzy Hash: d0df861721635cf53bc721b17cc2b28f7b3897c2be514b6f6d487454cbfc717a
            • Instruction Fuzzy Hash: AED012B0D483985AE7255310D80D7FB3BD02732748F0490A8D886153C6EBF9AD89D323
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ExceptionRaise__floor_pentium4
            • String ID: unordered_map/set too long
            • API String ID: 996205981-306623848
            • Opcode ID: b2e27ae3fefacd9cce80846074d79aa82a5ec7c51bf93b710aef1d68906dbd84
            • Instruction ID: 31b78a61ec3bbed036c264978894f166a0458db583b7d5aae584822774b78d13
            • Opcode Fuzzy Hash: b2e27ae3fefacd9cce80846074d79aa82a5ec7c51bf93b710aef1d68906dbd84
            • Instruction Fuzzy Hash: 4C12E4B1A002099FCB18DF68C990AAEF7F5FF58314F14826AE959EB351D731E941CB90
            APIs
            • GetSysColor.USER32(00000008), ref: 00E96E73
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Color
            • String ID:
            • API String ID: 2811717613-0
            • Opcode ID: 8cf73f0a64f2b89e4171884ef4b39477f30d8022b286c739bba73439ef968f0b
            • Instruction ID: 3433e8e39f18339d167a714b2c4dd021729b6ad219b0eb2b99f7c6733b4f2437
            • Opcode Fuzzy Hash: 8cf73f0a64f2b89e4171884ef4b39477f30d8022b286c739bba73439ef968f0b
            • Instruction Fuzzy Hash: 8B7107B1805B48CFE761CF78C94478ABBF0BB05324F148A5ED4A99B3D1D3B96648CB91
            APIs
            • NtdllDefWindowProc_W.NTDLL(?,-00002000,?,?,00EA7B87,?,?,?,?,?,?,?,?,00EA79F8,?,?), ref: 00EA9480
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: NtdllProc_Window
            • String ID:
            • API String ID: 4255912815-0
            • Opcode ID: eea78ad3ebcfca07ef9310fa809bfb0bd3a439c916ab1d4e1c100d5f8ab9c1b1
            • Instruction ID: 945eddb10f88bad4031e2f28c491884ded707b695617996f9324a119aa3b39ea
            • Opcode Fuzzy Hash: eea78ad3ebcfca07ef9310fa809bfb0bd3a439c916ab1d4e1c100d5f8ab9c1b1
            • Instruction Fuzzy Hash: EFF0E230004041CEE3118F58C488A69BBB6FB4F30AF4485F2E068E9463C339AD45DF10
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 788d67823a2499ab3140d19117937b67cfc6f7f6b38d51593c325a2219c2a60a
            • Instruction ID: 93c6ee3809f12fc1c6c480aaaa28f530e9f109f343669257d621598892725ba5
            • Opcode Fuzzy Hash: 788d67823a2499ab3140d19117937b67cfc6f7f6b38d51593c325a2219c2a60a
            • Instruction Fuzzy Hash: 6F322731E29F018DD7635539C822339A689AFB77D4F19C737F855B699AEB2AC1C34200
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: bebe7221f3a9ab119aee5af3f5b4f0cb9adb203f8f08392a20224e6164ba3481
            • Instruction ID: 7d7204df722b241a8b9971a1071586cc8173f26be25185ab885af604cef9fe33
            • Opcode Fuzzy Hash: bebe7221f3a9ab119aee5af3f5b4f0cb9adb203f8f08392a20224e6164ba3481
            • Instruction Fuzzy Hash: 9CE1EE30A00706CFDB64CF6CC980AAEB7F9FF45394B24469DD5D6AB690D730A942CB61
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 63235131e03926c7e742ca4a0d6e2d3dbb14ae9562d714eb5ec5ecdd35922b5a
            • Instruction ID: e0206e0e039bc195f33134cb08d0ae3e2fe37d13e664fcb1766319d103809e46
            • Opcode Fuzzy Hash: 63235131e03926c7e742ca4a0d6e2d3dbb14ae9562d714eb5ec5ecdd35922b5a
            • Instruction Fuzzy Hash: 7BC1F070A006468FDB65CF2CCC946BEBBFAAF09394F144699D5C6DB291CB31E845CB50
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c76f3da595cbaf6843c63fea0304b4b5744bf47c59e6470d6244e254e9597a86
            • Instruction ID: 5c08366b2f13e3f6f94dd28361288b439acd6783d32161c453560b3ae8abf511
            • Opcode Fuzzy Hash: c76f3da595cbaf6843c63fea0304b4b5744bf47c59e6470d6244e254e9597a86
            • Instruction Fuzzy Hash: 8F4116B0905B49EED708CF69C10878AFBF0BF19318F20825DD4589B781D3BAA658CBD5
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 23579aa50c1098b5aec73c3ee8927e1233b19ff175d4659b891b4305044ec8a1
            • Instruction ID: 10dd68f809620e8499a94bf44eb8f3cab7b6ffa7e8b8ae97d4cb534a312a2196
            • Opcode Fuzzy Hash: 23579aa50c1098b5aec73c3ee8927e1233b19ff175d4659b891b4305044ec8a1
            • Instruction Fuzzy Hash: 6E31DEB0405B84CEE721CF29C658747BFF0BB15718F108A5DD5E64BB91C3BAA648CB91
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7aff09ff712cdc78573487ecaa658e4e89f2e1578564389040c80d929f3cb731
            • Instruction ID: 4e88d60f45d78e53d16294392296567577019e646f23bc626647f76816934bfb
            • Opcode Fuzzy Hash: 7aff09ff712cdc78573487ecaa658e4e89f2e1578564389040c80d929f3cb731
            • Instruction Fuzzy Hash: 542158B0804748CFD710CF69C504B8ABBF4FB09314F1186AED495AB791E3B9AA44CB90
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8f186ba9487109d871d8be3398457457b64a966bf9170c9b1d2f9f50a3dc4759
            • Instruction ID: e43b0123d001b25e12deb7d84fcd4c644393fa47f2122872b7341ca267209943
            • Opcode Fuzzy Hash: 8f186ba9487109d871d8be3398457457b64a966bf9170c9b1d2f9f50a3dc4759
            • Instruction Fuzzy Hash: 5D2158B0804748CFD710CF69C504B8ABBF4FB09314F1186AED4959B791E3B9AA44CF90
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d95a8fb1453593a2c2d3067f9a96b96e6b51104f2014d96b2ca601776965486f
            • Instruction ID: 5291f8a1aa60cbde66cb5a83910f241de25f517a452dc3a7fd470e6c72bde77e
            • Opcode Fuzzy Hash: d95a8fb1453593a2c2d3067f9a96b96e6b51104f2014d96b2ca601776965486f
            • Instruction Fuzzy Hash: 88110CB1904608DFC744CF58D544B89BBF4FB09328F2086AEE8589B781D3769A06CF84
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2b824795f760e6a63b81d8bbc81d6a7138fc9ecb087f79e948d105da4647eab6
            • Instruction ID: caf71b71a4ce49116dbf5c4f083bf5b9b06eeb804fedfcc3cd7c5d79c983004e
            • Opcode Fuzzy Hash: 2b824795f760e6a63b81d8bbc81d6a7138fc9ecb087f79e948d105da4647eab6
            • Instruction Fuzzy Hash: 73F0A932A10720EFDB26DA4CC814B89B3F8EF04B25F1144A6E182AB240C7B0EE00CBD4
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 52a31a1b2c87d20f6f1ccd6e3f5e56cdbfee1b29986efbea090f4dac1cf3a30c
            • Instruction ID: c21bd0fbf5cc02446d691bba81552123f47afb4458210868da6a28113fcc9a9d
            • Opcode Fuzzy Hash: 52a31a1b2c87d20f6f1ccd6e3f5e56cdbfee1b29986efbea090f4dac1cf3a30c
            • Instruction Fuzzy Hash: CEE08C72D11638EBDB25DB9CC904D8AF7ECEB44B00B114996F642D3200C271DE00C7E4
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8798d3d87da054a76c0e42327399ad101a1c947b7d92e98e61ba31c4311bc826
            • Instruction ID: 1aebe4821ac87a275a50ff68130abb0e7439dd88aa0e870bbc71eca5a813d379
            • Opcode Fuzzy Hash: 8798d3d87da054a76c0e42327399ad101a1c947b7d92e98e61ba31c4311bc826
            • Instruction Fuzzy Hash: 8BC08C74000B508ADE2A8D18D2703AC3398A7927C2F8489CEC9838B662CA1EE8C2D615
            APIs
            • InitializeCriticalSection.KERNEL32(0118078C,9F3ADAE5,00000000), ref: 00FB3133
            • EnterCriticalSection.KERNEL32(0118078C,9F3ADAE5), ref: 00FB3148
            • GetCurrentProcess.KERNEL32 ref: 00FB3155
            • GetCurrentThread.KERNEL32 ref: 00FB3163
            • LoadLibraryA.KERNEL32(Dbghelp.dll,SymFromAddr,00000000), ref: 00FB31FD
            • GetProcAddress.KERNEL32(00000000), ref: 00FB3204
            • __Init_thread_footer.LIBCMT ref: 00FB3218
            • GetModuleHandleW.KERNEL32(00000000,*** Stack Trace (x86) ***,0000001F,?,?,?,00000000), ref: 00FB344E
            • LeaveCriticalSection.KERNEL32(0118078C,?,00000000), ref: 00FB358C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalSection$Current$AddressEnterHandleInit_thread_footerInitializeLeaveLibraryLoadModuleProcProcessThread
            • String ID: *** Stack Trace (x86) ***$ v$<--------------------MORE--FRAMES-------------------->$Dbghelp.dll$MODULE_BASE_ADDRESS$SymFromAddr$[0x%.8Ix]
            • API String ID: 1326996155-981128330
            • Opcode ID: 90e8d92cffe41d177dc85c64c0e20dc4544f4a4093ea2db7f821ad3ac2aee9d6
            • Instruction ID: acd5204e5d64643f76fdfdf9528365023cd85599fdd6d431500115aa82f9777c
            • Opcode Fuzzy Hash: 90e8d92cffe41d177dc85c64c0e20dc4544f4a4093ea2db7f821ad3ac2aee9d6
            • Instruction Fuzzy Hash: F2F100719002589FDB28EF64CC88BEEBBB4EF54314F1442E9E859A7280DB749B84DF50
            APIs
            • InitializeCriticalSection.KERNEL32(0118078C,9F3ADAE5,00000000), ref: 00FB3133
            • EnterCriticalSection.KERNEL32(0118078C,9F3ADAE5), ref: 00FB3148
            • GetCurrentProcess.KERNEL32 ref: 00FB3155
            • GetCurrentThread.KERNEL32 ref: 00FB3163
            • LoadLibraryA.KERNEL32(Dbghelp.dll,SymFromAddr,00000000), ref: 00FB31FD
            • GetProcAddress.KERNEL32(00000000), ref: 00FB3204
            • __Init_thread_footer.LIBCMT ref: 00FB3218
            • GetModuleHandleW.KERNEL32(00000000,*** Stack Trace (x86) ***,0000001F,?,?,?,00000000), ref: 00FB344E
            • LeaveCriticalSection.KERNEL32(0118078C,?,00000000), ref: 00FB358C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalSection$Current$AddressEnterHandleInit_thread_footerInitializeLeaveLibraryLoadModuleProcProcessThread
            • String ID: *** Stack Trace (x86) ***$ v$<--------------------MORE--FRAMES-------------------->$Dbghelp.dll$MODULE_BASE_ADDRESS$SymFromAddr$[0x%.8Ix]
            • API String ID: 1326996155-981128330
            • Opcode ID: 589c38626102dc3f2a3bea816515f5d2b4894dc30e2d83418945c5f09a85357a
            • Instruction ID: 77ffe857643f8c4aa4620ea5fc87c3c21e6c9f927cbc6c2388a7699c7caee3a2
            • Opcode Fuzzy Hash: 589c38626102dc3f2a3bea816515f5d2b4894dc30e2d83418945c5f09a85357a
            • Instruction Fuzzy Hash: 28D1CB31C406689FDB25DF64CC88BEEBBB4AF14705F0442DAE949A7281DB746B84DF50
            APIs
            • GetDlgItem.USER32(?,000001F6), ref: 00FB582E
            • GetDlgItem.USER32(?,000001F8), ref: 00FB583B
            • GetDlgItem.USER32(?,000001F7), ref: 00FB587D
            • SetWindowTextW.USER32(00000000,?), ref: 00FB588C
            • ShowWindow.USER32(?,00000005), ref: 00FB58F2
            • GetDlgItem.USER32(?,000001F7), ref: 00FB5914
            • SetWindowTextW.USER32(00000000,?), ref: 00FB5923
            • ShowWindow.USER32(?,00000000), ref: 00FB5988
            • ShowWindow.USER32(?,00000000), ref: 00FB598F
            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000616), ref: 00FB59D8
            • GetDlgItem.USER32(?,00000000), ref: 00FB5A0A
            • IsWindow.USER32(00000000), ref: 00FB5A14
            • IsRectEmpty.USER32(?), ref: 00FB5A31
            • SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000014,?,00000000,?,?,00000616), ref: 00FB5A61
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$Item$Show$Text$EmptyRect
            • String ID: Details <<$Details >>
            • API String ID: 4171068809-3763984547
            • Opcode ID: 4f8082a426435eb390c74a3160e1f5b428f95e3678a4701c52e9ea419ecfe269
            • Instruction ID: 785f3adaee1487dd476f7ad4fc60b7133f1e41341517bfebf3a4781f0c89acf2
            • Opcode Fuzzy Hash: 4f8082a426435eb390c74a3160e1f5b428f95e3678a4701c52e9ea419ecfe269
            • Instruction Fuzzy Hash: 4791DF71D00609AFDF149F69DC89BEEBBB5EF08710F108219E911B7690D778A880CF90
            APIs
            • RedrawWindow.USER32(?,00000000,00000000,00000507,9F3ADAE5), ref: 00E98D2E
            • IsWindow.USER32(?), ref: 00E98D40
            • GetParent.USER32(?), ref: 00E98D81
            • GetClassNameW.USER32(00000000,?,00000008), ref: 00E98D8E
            • lstrcmpW.KERNEL32(?,#32770), ref: 00E98DA1
            • GetSysColor.USER32(00000005), ref: 00E98DB6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$ClassColorNameParentRedrawlstrcmp
            • String ID: #32770
            • API String ID: 4237080057-463685578
            • Opcode ID: b2892b52a35a6081d1fe89d9fb9f3fcc5483eb515dbc0f685a6894abe11a6709
            • Instruction ID: 810509f1967a95bf243bcdeee92a026e119115f5b200c58083cbc0378a5b24b5
            • Opcode Fuzzy Hash: b2892b52a35a6081d1fe89d9fb9f3fcc5483eb515dbc0f685a6894abe11a6709
            • Instruction Fuzzy Hash: 35027B70A04209EFDF24CFA8C948BAEBBF5BF49314F14555CE455BB2A1DB76A940CB20
            APIs
            • EnterCriticalSection.KERNEL32(0118297C,9F3ADAE5,00000000,?,?,?,?,?,?,.c,0108826D,000000FF), ref: 00E96B3D
            • GetClassInfoExW.USER32 ref: 00E96B81
            • LoadCursorW.USER32(00000000,00007F00), ref: 00E96BB8
            • RegisterClassExW.USER32(00000030), ref: 00E96BE1
            • GetClassInfoExW.USER32(AtlAxWinLic140,00000030), ref: 00E96C2A
            • LoadCursorW.USER32(00000000,00007F00), ref: 00E96C5E
            • RegisterClassExW.USER32(00000030), ref: 00E96C7F
            • LeaveCriticalSection.KERNEL32(0118297C), ref: 00E96CB3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Class$CriticalCursorInfoLoadRegisterSection$EnterLeave
            • String ID: v$.c$0$AtlAxWin140$AtlAxWinLic140$WM_ATLGETCONTROL$WM_ATLGETHOST
            • API String ID: 927868316-455796968
            • Opcode ID: a5a3e618b1bc5dc5d24fd28e548313e03720baa1d5610eae7197839a696b84d9
            • Instruction ID: eaa271d5e5c53695233e2fc2913ad1e2b433d3e4377e92ff988ff57da2c25da7
            • Opcode Fuzzy Hash: a5a3e618b1bc5dc5d24fd28e548313e03720baa1d5610eae7197839a696b84d9
            • Instruction Fuzzy Hash: 4D5155B0C04229AFDB15DFA5D849BDEBBF8FB08714F10012AE554B7384EBB55A448FA4
            APIs
            • BeginPaint.USER32(?,?,9F3ADAE5,?), ref: 00EB7C60
            • SendMessageW.USER32(?,00000318,00000000,00000004), ref: 00EB7C77
            • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 00EB7C85
            • SendMessageW.USER32(?,00001304,00000000,00000000), ref: 00EB7C9F
            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00EB7CB7
            • SendMessageW.USER32(?,0000130A,00000000,?), ref: 00EB7CE8
            • CreateRectRgn.GDI32(?,?,?,?), ref: 00EB7D22
            • DeleteObject.GDI32(00000000), ref: 00EB7D39
            • GetClientRect.USER32(?,?), ref: 00EB7D55
            • CreateRectRgn.GDI32(00000000,00000000,?,?), ref: 00EB7D80
            • CreateRectRgn.GDI32(?,?,?,?), ref: 00EB7D9D
            • SelectClipRgn.GDI32(00000000,00000000), ref: 00EB7DB4
            • GetParent.USER32(?), ref: 00EB7DC4
            • SendMessageW.USER32(00000000,00000136,?,?), ref: 00EB7DD5
            • DeleteObject.GDI32(00000000), ref: 00EB7DEB
            • DeleteObject.GDI32(?), ref: 00EB7DF0
            • EndPaint.USER32(?,?), ref: 00EB7DFF
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageRectSend$Create$DeleteObject$Paint$BeginClientClipParentSelect
            • String ID:
            • API String ID: 3183909887-0
            • Opcode ID: f25dc4071336b79145d021e71a42e7c035e20cbb774f1d5c5e00be9eb33d790b
            • Instruction ID: af69c047398837e2aff77d1f79664415e104389e1d0df18c4333847872accf12
            • Opcode Fuzzy Hash: f25dc4071336b79145d021e71a42e7c035e20cbb774f1d5c5e00be9eb33d790b
            • Instruction Fuzzy Hash: 61613B72908218AFDB259FE4DD49FEEBBB9FF48710F100129FA15AB294D7706980CB54
            APIs
            • CreateWindowExW.USER32(00000000,tooltips_class32,00000000,80000063,80000000,80000000,80000000,80000000,?,00000000,00000000,9F3ADAE5), ref: 00EB6528
              • Part of subcall function 00E983A0: SetWindowLongW.USER32(?,000000FC,00000000), ref: 00E983D6
            • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 00EB662B
            • SendMessageW.USER32(00000000,00000439,00000000,0000002C), ref: 00EB663F
            • SendMessageW.USER32(00000000,00000421,00000003,?), ref: 00EB6654
            • SendMessageW.USER32(00000000,00000418,00000000,0000012C), ref: 00EB6669
            • GetWindowTextLengthW.USER32(?), ref: 00EB6670
            • SendMessageW.USER32(?,000000D6,-00000001,00000000), ref: 00EB6680
            • ClientToScreen.USER32(?,?), ref: 00EB66A0
            • GetWindowRect.USER32(?,?), ref: 00EB66B2
            • PtInRect.USER32(?,?,?), ref: 00EB66C2
            • SendMessageW.USER32(00000000,00000412,00000000), ref: 00EB6714
            • SendMessageW.USER32(00000000,00000411,00000001,0000002C), ref: 00EB6724
            • SetTimer.USER32(?,?,00001388,00000000), ref: 00EB673B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend$Window$Rect$ClientCreateLengthLongScreenTextTimer
            • String ID: tooltips_class32
            • API String ID: 3976673834-1918224756
            • Opcode ID: c503c823945d5e5aaa9723d0ba7a80bdb0b6eee835f3f18366285dc73ba9557d
            • Instruction ID: 69b3cfca1a06291207ec7fe6302a9f1e20afc486fd70f4933fc397de4111f503
            • Opcode Fuzzy Hash: c503c823945d5e5aaa9723d0ba7a80bdb0b6eee835f3f18366285dc73ba9557d
            • Instruction Fuzzy Hash: F89131B1A00208AFDB24CFA4CD95FEEBBF9FB08700F10452AF556EA294D774A904CB50
            APIs
              • Part of subcall function 00FACBB0: LoadLibraryW.KERNEL32(ComCtl32.dll,9F3ADAE5,?,?,00000000), ref: 00FACBEE
              • Part of subcall function 00FACBB0: GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 00FACC11
              • Part of subcall function 00FACBB0: FreeLibrary.KERNEL32(00000000), ref: 00FACC8F
            • GetDlgItem.USER32(?,000001F4), ref: 00FB5511
            • SendMessageW.USER32(00000000,00000170,00000000,00000000), ref: 00FB5522
            • GetDC.USER32(00000000), ref: 00FB552A
            • GetDeviceCaps.GDI32(00000000), ref: 00FB5531
            • MulDiv.KERNEL32(00000009,00000000), ref: 00FB553A
            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,Courier New), ref: 00FB5563
            • GetDlgItem.USER32(?,000001F6), ref: 00FB5574
            • IsWindow.USER32(00000000), ref: 00FB557D
            • SendMessageW.USER32(00000000,00000030,?,00000000), ref: 00FB5594
            • GetDlgItem.USER32(?,000001F8), ref: 00FB559E
            • GetWindowRect.USER32(?,?), ref: 00FB55AF
            • GetWindowRect.USER32(?,?), ref: 00FB55C2
            • GetWindowRect.USER32(00000000,?), ref: 00FB55D2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$ItemRect$LibraryMessageSend$AddressCapsCreateDeviceFontFreeLoadProc
            • String ID: Courier New
            • API String ID: 1731048342-2572734833
            • Opcode ID: f98aa83f6c63b7b0425b2a37427e45b79cb2aa38d48e2ec09a4219377cbde6c0
            • Instruction ID: 841038615ecf3c56137840ae0f742aabc3e3a389d497aa93c79c291eb4dfacf1
            • Opcode Fuzzy Hash: f98aa83f6c63b7b0425b2a37427e45b79cb2aa38d48e2ec09a4219377cbde6c0
            • Instruction Fuzzy Hash: C841C871BC43087BEB24AF21DD46FAE77A9AF58B04F01012DFB057A1C1DAB4A8408B59
            APIs
            • LoadLibraryW.KERNEL32(Advapi32.dll,9F3ADAE5,?,00000000), ref: 00FA51F1
            • GetLastError.KERNEL32 ref: 00FA521F
              • Part of subcall function 00E8A9B0: RtlAllocateHeap.NTDLL(?,00000000,?,9F3ADAE5,00000000,01084C50,000000FF,?,?,01173854,?,00FE9828,80004005,9F3ADAE5,?,?), ref: 00E8A9FA
            • GetProcAddress.KERNEL32(00000000,ConvertStringSidToSidW), ref: 00FA5235
            • FreeLibrary.KERNEL32(00000000), ref: 00FA524E
            • GetLastError.KERNEL32 ref: 00FA525B
            • GetLastError.KERNEL32 ref: 00FA5449
            • GetLastError.KERNEL32 ref: 00FA54AE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ErrorLast$Library$AddressAllocateFreeHeapLoadProc
            • String ID: Advapi32.dll$ConvertStringSidToSidW
            • API String ID: 3460774402-1129428314
            • Opcode ID: 0732573149c01f787e7747820f58b010fa686c2715e5fc567273b6fcac8efb64
            • Instruction ID: e0a0bd4ab679c30ee6fb42eb49a12107ac08b4937225f9962c280e7062be6cbf
            • Opcode Fuzzy Hash: 0732573149c01f787e7747820f58b010fa686c2715e5fc567273b6fcac8efb64
            • Instruction Fuzzy Hash: E9F198F1C0160AEFDB10CF90C944BEEBBB5BF19724F244219E915B7280E774AA45DBA1
            APIs
            • BeginPaint.USER32(?,?), ref: 00E96F86
            • GetClientRect.USER32(?,?), ref: 00E96F9E
            • FillRect.USER32(00000000,?,00000000), ref: 00E96FBD
            • DeleteObject.GDI32(00000000), ref: 00E96FC4
            • EndPaint.USER32(?,?), ref: 00E96FD2
            • BeginPaint.USER32(?,?), ref: 00E97007
            • GetClientRect.USER32(?,?), ref: 00E9701F
            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00E97038
            • CreateCompatibleDC.GDI32(00000000), ref: 00E97045
            • SelectObject.GDI32(00000000,00000000), ref: 00E97057
            • FillRect.USER32(00000000,?,00000000), ref: 00E97080
            • DeleteObject.GDI32(?), ref: 00E9708A
            • BitBlt.GDI32(00000000,00000000,00000000,00000008,00000008,00000000,00000000,00000000,00CC0020), ref: 00E970C7
            • SelectObject.GDI32(00000000,?), ref: 00E970D2
            • DeleteDC.GDI32(00000000), ref: 00E970D9
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ObjectRect$DeletePaint$BeginClientCompatibleCreateFillSelect$Bitmap
            • String ID:
            • API String ID: 939394624-0
            • Opcode ID: 29736b8546f3a8fdcfb168eda12b6e744446adddc9cdba032cee4490d1e26a72
            • Instruction ID: 082ca029ef41b4a1d387538137060849e9749dbcb1d47f77599cb79aacf030ae
            • Opcode Fuzzy Hash: 29736b8546f3a8fdcfb168eda12b6e744446adddc9cdba032cee4490d1e26a72
            • Instruction Fuzzy Hash: D4418F72208305AFD7259F64DC88F6BBBF8EF88705F004939F666D2290DB70E8458B25
            APIs
            • GetCurrentProcess.KERNEL32(?,9F3ADAE5), ref: 00FC7359
            • IsWow64Process.KERNEL32(00000000), ref: 00FC7360
              • Part of subcall function 00FA9180: _wcsrchr.LIBVCRUNTIME ref: 00FA91B9
            • _wcsrchr.LIBVCRUNTIME ref: 00FC73E1
            • _wcsrchr.LIBVCRUNTIME ref: 00FC7477
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: _wcsrchr$Process$CurrentWow64
            • String ID: "%s" $ /fvomus //$ /i //$ /p //$ EXE_CMD_LINE="%s "$ TRANSFORMS=":%d"$%s AI_SETUPEXEPATH="%s" SETUPEXEDIR="%s"$.x64
            • API String ID: 657290924-2074823060
            • Opcode ID: 049b33a6445ef355aa04151844f90859b01025ba118e088e89cb4458007b708e
            • Instruction ID: f29fca4b919cc0b62871c091da515fc7e2dcda705a2d0d17f73eeda26eeb5949
            • Opcode Fuzzy Hash: 049b33a6445ef355aa04151844f90859b01025ba118e088e89cb4458007b708e
            • Instruction Fuzzy Hash: B1F1D331A0070A9FDB14EFA8C945BAEB7E4BF45320F18866DE815AB2D1DB749D00DF91
            APIs
            • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,?,00000043), ref: 00EBC7B8
            • GetProcAddress.KERNEL32(00000000,InitializeEmbeddedUI), ref: 00EBC7D1
            • GetProcAddress.KERNEL32(00000043,ShutdownEmbeddedUI), ref: 00EBC7DD
            • GetProcAddress.KERNEL32(00000043,EmbeddedUIHandler), ref: 00EBC7EA
              • Part of subcall function 00E8A9B0: RtlAllocateHeap.NTDLL(?,00000000,?,9F3ADAE5,00000000,01084C50,000000FF,?,?,01173854,?,00FE9828,80004005,9F3ADAE5,?,?), ref: 00E8A9FA
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: AddressProc$HeapInit_thread_footer$AllocateLibraryLoadProcess
            • String ID: build $20.8$EmbeddedUIHandler$INAN$InitializeEmbeddedUI$SELECT `Data` FROM `Binary` WHERE `Name` = 'InstallerAnalytics.dll'$ShutdownEmbeddedUI$a905d1b0
            • API String ID: 2564778481-3114431724
            • Opcode ID: bb34cac2fd980da4eb4b5a9d5b293081edff645e52ffb9ea4ad62824d1ef2f0e
            • Instruction ID: d248f404bd0a4eab41119637521aad660b0af0e0728fba3065e084c2239b5013
            • Opcode Fuzzy Hash: bb34cac2fd980da4eb4b5a9d5b293081edff645e52ffb9ea4ad62824d1ef2f0e
            • Instruction Fuzzy Hash: 73D1A1719002099FDB04DFA4C845BEEBBF4FF08314F14462EE955BB691EB74AA44CB90
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f0766ef31ca31863d73831921484f02fa9cdc03105d3883adb7b6f5d162463ec
            • Instruction ID: e0244c42d7f3c554aaf14f31f54c318db5bec3a1c49712ea5aaa336943315317
            • Opcode Fuzzy Hash: f0766ef31ca31863d73831921484f02fa9cdc03105d3883adb7b6f5d162463ec
            • Instruction Fuzzy Hash: 09A14671A08245ABDB20EF65DC85FAEB7B8EF44320F14416AF905AB2D1DBB4D800DB70
            APIs
            • LoadLibraryW.KERNEL32(combase.dll,RoGetActivationFactory), ref: 00E8EEDE
            • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 00E8EEE4
            • LoadLibraryW.KERNEL32(combase.dll,CoIncrementMTAUsage,?,?), ref: 00E8EF17
            • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 00E8EF1D
            • LoadLibraryW.KERNEL32(?,.dll,00000004,-00000001,00000000,010F42AC,00000000,00000000,00000000), ref: 00E8F03D
            • GetProcAddress.KERNEL32(00000000,DllGetActivationFactory), ref: 00E8F086
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: .dll$CoIncrementMTAUsage$DllGetActivationFactory$RoGetActivationFactory$combase.dll
            • API String ID: 2574300362-2454113998
            • Opcode ID: 141a4d5a29c3f359a06583a8665f7a15f42152837253a1f664ac45311a611c8b
            • Instruction ID: b54bcb7adf8951945f7410eddfa8da9c24177769a2c11eae46b6b9b0f9c0aab8
            • Opcode Fuzzy Hash: 141a4d5a29c3f359a06583a8665f7a15f42152837253a1f664ac45311a611c8b
            • Instruction Fuzzy Hash: 6F91A131E00209EFDF14EFA8C895BEEB7B1EF58308F245128E559B7291EB749A44CB50
            APIs
            • InitializeCriticalSection.KERNEL32(0117D68C,9F3ADAE5,?,00000010), ref: 00FDD36C
              • Part of subcall function 00E8A2A0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,?,?,?,*.*,?,80070057,9F3ADAE5), ref: 00E8A2C3
            • EnterCriticalSection.KERNEL32(00000010,9F3ADAE5,?,00000010), ref: 00FDD379
            • WriteFile.KERNEL32(00000000,?,?,000000FF,00000000), ref: 00FDD3AB
            • FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 00FDD3B4
            • WriteFile.KERNEL32(00000000,00FD3167,D68CB9EC,010D28CD,00000000,010F427C,00000001,?,?,000000FF,00000000), ref: 00FDD436
            • FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 00FDD43F
            • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,?,000000FF,00000000), ref: 00FDD475
            • FlushFileBuffers.KERNEL32(00000000,?,?,?,00000000,?,?,000000FF,00000000), ref: 00FDD47E
            • WriteFile.KERNEL32(00000000,?,?,?,00000000,010F7104,00000002,?,?,?,00000000,?,?,000000FF,00000000), ref: 00FDD4DF
            • FlushFileBuffers.KERNEL32(00000000,?,?,?,00000000,?,?,000000FF,00000000), ref: 00FDD4E8
            • LeaveCriticalSection.KERNEL32(00000000,?,?,?,00000000,?,?,000000FF,00000000), ref: 00FDD518
              • Part of subcall function 00E8A9B0: RtlAllocateHeap.NTDLL(?,00000000,?,9F3ADAE5,00000000,01084C50,000000FF,?,?,01173854,?,00FE9828,80004005,9F3ADAE5,?,?), ref: 00E8A9FA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: File$BuffersFlushWrite$CriticalSection$AllocateEnterFindHeapInitializeLeaveResource
            • String ID: v
            • API String ID: 201293332-3261393531
            • Opcode ID: 3cbec5b6f4c215501de0d4f87c6f50a2be9cef50d192cfe3ad3acab4ef9d9648
            • Instruction ID: d1a5ede4b8bb67fcac238ce1092ded67709df8703cfbddbe785eaa9a252af846
            • Opcode Fuzzy Hash: 3cbec5b6f4c215501de0d4f87c6f50a2be9cef50d192cfe3ad3acab4ef9d9648
            • Instruction Fuzzy Hash: 2261EF31901604AFEB10DF69CC49BA9BBB5FF05324F088169F855AB3A1D775AC04DBA0
            APIs
            • GetObjectW.GDI32(00000000,0000005C,?), ref: 00EB50E4
            • SendMessageW.USER32(?,0000043A,00000000,00000074), ref: 00EB5115
            • lstrcpynW.KERNEL32(?,?,00000020), ref: 00EB518B
            • GetDC.USER32(?), ref: 00EB51AE
            • GetDeviceCaps.GDI32(00000000), ref: 00EB51B5
            • MulDiv.KERNEL32(?,00000048,00000000), ref: 00EB51C8
            • SendMessageW.USER32(?,00000444,00000000,00000074), ref: 00EB51FA
            • GetObjectW.GDI32(00000000,0000005C,?), ref: 00EB5220
            • DeleteObject.GDI32(?), ref: 00EB5236
            • CreateFontIndirectW.GDI32(?), ref: 00EB5252
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Object$MessageSend$CapsCreateDeleteDeviceFontIndirectlstrcpyn
            • String ID: ?$t
            • API String ID: 498247171-1995845436
            • Opcode ID: acbff07f388866c45f65e5ab6eba2a6b319b0f76c58e958afe3949567684446d
            • Instruction ID: 606672e6f0d5bd8ca1f946c4e487234bfb72d4394dbe990540e6fe84dcef3435
            • Opcode Fuzzy Hash: acbff07f388866c45f65e5ab6eba2a6b319b0f76c58e958afe3949567684446d
            • Instruction Fuzzy Hash: 33517DB1908740AFE731DF64D849F9BBBE8FB48704F00492EF69AD6291D774A508CB52
            APIs
            • GetWindowLongW.USER32(00000000,000000F0), ref: 00EFD247
            • GetParent.USER32(00000000), ref: 00EFD25A
            • GetWindow.USER32(00000000,00000004), ref: 00EFD26A
            • GetWindowRect.USER32(00000000,?), ref: 00EFD27B
            • GetWindowLongW.USER32(00000000,000000F0), ref: 00EFD28E
            • MonitorFromWindow.USER32(00000000,00000002), ref: 00EFD2A6
            • GetMonitorInfoW.USER32(00000000,00000000), ref: 00EFD2BC
            • GetWindowRect.USER32(00000000,?), ref: 00EFD2E2
            • SetWindowPos.USER32(?,00000000,?,?,000000FF,000000FF,00000015), ref: 00EFD39F
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$LongMonitorRect$FromInfoParent
            • String ID:
            • API String ID: 1468510684-0
            • Opcode ID: fa1d7d41633018a7a18e896323df4adf6a71beb969d5c0854f8f8c5a434cbc1c
            • Instruction ID: 18301f3f46f6d42fd43dcdc1e25c4fff20f2acec93da857cecb15828dbdbc3e0
            • Opcode Fuzzy Hash: fa1d7d41633018a7a18e896323df4adf6a71beb969d5c0854f8f8c5a434cbc1c
            • Instruction Fuzzy Hash: 58515172D081199FDB24CFA8CD49AEEBBB5FB48710F255229E915F3294DB30AD40CB94
            APIs
              • Part of subcall function 00FD4090: GetSystemDefaultLangID.KERNEL32(9F3ADAE5,0000004C,?,00000048,?), ref: 00FD40C6
            • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process2,?,?,?,?,00000000), ref: 00FB80B3
            • GetProcAddress.KERNEL32(00000000), ref: 00FB80BA
            • __Init_thread_footer.LIBCMT ref: 00FB80D1
            • GetCurrentProcess.KERNEL32(?,?,?,?,?,00000000), ref: 00FB80F0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: AddressCurrentDefaultHandleInit_thread_footerLangModuleProcProcessSystem
            • String ID: An acceptable version was found.$IsWow64Process2$Search result:$Searching for:$Undefined$Wrong OS or Os language for:$kernel32
            • API String ID: 52476621-1658165007
            • Opcode ID: 5a26469e6de0b6c3dbc00bd2f8fd237303e508ae13116d6574bc4a9ed8becae7
            • Instruction ID: 7fd50b390e6b07dae9123da9df229467519b5596c6bf7955a873bc6f1aff546a
            • Opcode Fuzzy Hash: 5a26469e6de0b6c3dbc00bd2f8fd237303e508ae13116d6574bc4a9ed8becae7
            • Instruction Fuzzy Hash: E6F1D070A00605CFDB24DFA9C884BDEB7F9BF84360F14425DE426AB291DB74A946DF40
            APIs
            • GetWindowRect.USER32(?,?), ref: 00EA1324
            • GetWindowRect.USER32(?,?), ref: 00EA1403
            • GetClientRect.USER32(?,?), ref: 00EA1415
            • GetWindowDC.USER32(?), ref: 00EA1427
            • CreateCompatibleDC.GDI32(00000000), ref: 00EA1454
            • CreateCompatibleBitmap.GDI32(00000000), ref: 00EA1496
            • SelectObject.GDI32(00000000,00000000), ref: 00EA14A5
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: RectWindow$CompatibleCreate$BitmapClientObjectSelect
            • String ID:
            • API String ID: 2032541772-0
            • Opcode ID: 1e1cab703053d4b455fb38b0bfcda259c664149b4f8fb9b5ef6e5a07b2253c59
            • Instruction ID: 82f266a7afc3b5228fe84563949c9f73328fbb1f70240b79504d4a4ab18d4821
            • Opcode Fuzzy Hash: 1e1cab703053d4b455fb38b0bfcda259c664149b4f8fb9b5ef6e5a07b2253c59
            • Instruction Fuzzy Hash: 8BE13771D04718EFDB21DFA8C948B9EBBF8EF49704F1442A9E859A7241E7706A84CF50
            APIs
            • EnterCriticalSection.KERNEL32(0118297C,9F3ADAE5,00000001,01182998), ref: 00E99C43
            • GetClassInfoExW.USER32(00000000,?,?), ref: 00E99C83
            • GetClassInfoExW.USER32(?,00000030), ref: 00E99C96
            • LeaveCriticalSection.KERNEL32(0118297C), ref: 00E99CA8
            • LoadCursorW.USER32(00E80000,?), ref: 00E99D04
            • GetClassInfoExW.USER32(?,?,?), ref: 00E99D59
            • RegisterClassExW.USER32(?), ref: 00E99D6C
            • LeaveCriticalSection.KERNEL32(0118297C), ref: 00E99D9B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Class$CriticalInfoSection$Leave$CursorEnterLoadRegister
            • String ID: v$ATL:%p
            • API String ID: 269841140-109518622
            • Opcode ID: 9caa520500b3cad562c796b04151dbc30aab5c1149615e68922e7258e1c6108a
            • Instruction ID: 1999e2752b70441f82336b781062d234fa1b2f47017d685bbf56fd9f69ab5287
            • Opcode Fuzzy Hash: 9caa520500b3cad562c796b04151dbc30aab5c1149615e68922e7258e1c6108a
            • Instruction Fuzzy Hash: 9051BA70D04B448BDB21CF69C944AAAFBF4FF18724F00961DE896A7741EB70B980CB90
            APIs
              • Part of subcall function 00FB3D40: LoadLibraryW.KERNEL32(Shlwapi.dll,?,?,?,?,00FBF141,?,9F3ADAE5,?,?), ref: 00FB3D5B
              • Part of subcall function 00FB3D40: GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 00FB3D71
              • Part of subcall function 00FB3D40: FreeLibrary.KERNEL32(00000000), ref: 00FB3DAA
            • GetEnvironmentVariableW.KERNEL32(APPDATA,?,00000104,9F3ADAE5,?,?), ref: 00FBF320
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Library$AddressEnvironmentFreeLoadProcVariable
            • String ID: AI_BOOTSTRAPPERLANGS$APPDATA$AppDataFolder$PROGRAMFILES$ProgramFiles$ProgramFilesFolder$Shell32.dll$Shlwapi.dll
            • API String ID: 788177547-1020860216
            • Opcode ID: 36f81577c8deb25ba26047c5eae2859fb2df4eb5f6e6dc929a5d6a15f4ffdf30
            • Instruction ID: 767487be09e28fe4072f7e0ebb56a49c018b5d15db45586f4b5d38e97479d80f
            • Opcode Fuzzy Hash: 36f81577c8deb25ba26047c5eae2859fb2df4eb5f6e6dc929a5d6a15f4ffdf30
            • Instruction Fuzzy Hash: 86910375A012059BDB18DF2ACC447EAB3B5FF24324F148AB9E80697284E731DD49DF80
            APIs
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00E8D4E8
            • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00E8D4F2
            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00E8D501
            • GetExitCodeProcess.KERNEL32(?,?), ref: 00E8D51E
            • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00E8D528
            • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00E8D535
            • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00E8D53F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ErrorLastProcess$Init_thread_footer$CloseCodeCreateExitHandleHeapObjectSingleWait
            • String ID: "%s" %s$D
            • API String ID: 2023784982-3971972636
            • Opcode ID: 8c461787645e833fa5722ac94c67b2186f430aa813ae9c528626e613184d515d
            • Instruction ID: 69ebec6a504bcaebda7487d68bdc3d8f4ceb6a6a2d3b7e1995860a84209f78b1
            • Opcode Fuzzy Hash: 8c461787645e833fa5722ac94c67b2186f430aa813ae9c528626e613184d515d
            • Instruction Fuzzy Hash: 7A51E271904205DFDB20EF65CC04BAAB7B5FF84728F24462AE92DBB2D0D774A941CB91
            APIs
            • BeginPaint.USER32(?,?,9F3ADAE5,?), ref: 00F89123
            • CallWindowProcW.USER32(?,?,?,?,?), ref: 00F89146
            • SelectObject.GDI32(00000000,?), ref: 00F891C4
            • SetBkMode.GDI32(00000000,00000001), ref: 00F891D2
            • SetTextColor.GDI32(00000000), ref: 00F89217
            • GetWindowLongW.USER32(00000000), ref: 00F8922C
            • SendMessageW.USER32(00000000), ref: 00F8924B
            • DrawTextW.USER32(00000000,00000010,?,?,00000010), ref: 00F892B5
            • SelectObject.GDI32(00000000,?), ref: 00F892C1
            • EndPaint.USER32(?,?), ref: 00F892D2
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ObjectPaintSelectTextWindow$BeginCallColorDrawLongMessageModeProcSend
            • String ID:
            • API String ID: 1755490345-0
            • Opcode ID: 0da2fb7a4a4890eaec2c8a4ea053c34ccbac81cf6ef4d71bde919b67376afcc1
            • Instruction ID: f01591cf49427c247e69ddb560060ffda9bbfb96440ea4108fdbb16623e83f2a
            • Opcode Fuzzy Hash: 0da2fb7a4a4890eaec2c8a4ea053c34ccbac81cf6ef4d71bde919b67376afcc1
            • Instruction Fuzzy Hash: 6E818C71A04609AFDB14DFE4CC48FADBBB5FF48310F108269F925AB2A5C7719851DB50
            APIs
            • GetWindowLongW.USER32(?,000000EB), ref: 00FB5321
            • DeleteObject.GDI32(?), ref: 00FB5379
            • EndDialog.USER32(?,00000000), ref: 00FB53F9
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: DeleteDialogLongObjectWindow
            • String ID:
            • API String ID: 1328495006-0
            • Opcode ID: 69c0b1b0d9d6240a2c26fbaf2a92693956dc506faa7e57f84ab8317310b8899c
            • Instruction ID: 6c949a655ae4fdcd595fbfd26c19ef728e150898ee83375846bb097d1d5279da
            • Opcode Fuzzy Hash: 69c0b1b0d9d6240a2c26fbaf2a92693956dc506faa7e57f84ab8317310b8899c
            • Instruction Fuzzy Hash: 54413B36B0461857C7349D3EAC58BBB37A8D785B31F00472AFD21C33D0C7A99891AAA1
            APIs
            • IsWindowVisible.USER32(?), ref: 00F3E29A
            • GetWindowRect.USER32(?,?), ref: 00F3E2B2
            • GetWindowRect.USER32(?,?), ref: 00F3E2CA
            • IntersectRect.USER32(?,?,?), ref: 00F3E2E7
            • EqualRect.USER32(?,?), ref: 00F3E2F7
            • GetSysColorBrush.USER32(0000000F), ref: 00F3E30D
            • GetWindowRect.USER32(?,?), ref: 00F3E336
            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 00F3E34B
            • GetWindowLongW.USER32(?,000000EC), ref: 00F3E35A
            • SetBrushOrgEx.GDI32(?,?,?,00000000), ref: 00F3E378
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$Rect$Brush$ColorEqualIntersectLongPointsVisible
            • String ID:
            • API String ID: 2158939716-0
            • Opcode ID: 0f2af6f55c9255302d82cf1e1c25d9c054a8d0e6e396cff74779e2f92d13c171
            • Instruction ID: 656997c4e72f8700b667eb99393ca8008d8b568087cb78d87c3e354e90e377ba
            • Opcode Fuzzy Hash: 0f2af6f55c9255302d82cf1e1c25d9c054a8d0e6e396cff74779e2f92d13c171
            • Instruction Fuzzy Hash: DE414C32A083059FC720DF25D984A6BB7F8FF99714F05462EF99997240E730EA858B52
            APIs
            • GetDC.USER32(?), ref: 00E9A831
            • GetClientRect.USER32(?,?), ref: 00E9A858
            • CreateCompatibleDC.GDI32(?), ref: 00E9A868
            • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00E9A889
            • DeleteDC.GDI32(00000000), ref: 00E9A896
            • FillRect.USER32(?,?,00000006), ref: 00E9A8DA
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CompatibleCreateRect$BitmapClientDeleteFill
            • String ID:
            • API String ID: 1262984673-0
            • Opcode ID: 3bd52a7e31459bf475eae2bf6d6d97279e305e051d8b8b96c95b6b2f983c7e07
            • Instruction ID: 78bf13f48978295976155e69ad1781f7671e75cad5089c69b5bb300de29bba93
            • Opcode Fuzzy Hash: 3bd52a7e31459bf475eae2bf6d6d97279e305e051d8b8b96c95b6b2f983c7e07
            • Instruction Fuzzy Hash: 66318F715082059FD729AF28D84CA2BBBF8BF98344F14087DF88696255D7319885CBA6
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: __aulldiv
            • String ID: :$f$f$f$p$p$p
            • API String ID: 3732870572-1434680307
            • Opcode ID: d8ac13847552a6fc48fd0957eec8a7d6b604565085de0e232cf7ebe8523fce5e
            • Instruction ID: 94b938246b0f9ee0951e9af3170948fb323816c787b96547ca7667e1d8789fd7
            • Opcode Fuzzy Hash: d8ac13847552a6fc48fd0957eec8a7d6b604565085de0e232cf7ebe8523fce5e
            • Instruction Fuzzy Hash: 6302B33A900108DADF24DFA8D8446EEBBBEFF50B2CFA84545D6957B281D3308E84CB55
            APIs
            • GetSystemDefaultLangID.KERNEL32 ref: 00FD321C
            • GetUserDefaultLangID.KERNEL32 ref: 00FD3229
            • LoadLibraryW.KERNEL32(kernel32.dll), ref: 00FD323B
            • GetProcAddress.KERNEL32(00000000,GetSystemDefaultUILanguage), ref: 00FD324F
            • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 00FD3264
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: AddressDefaultLangProc$LibraryLoadSystemUser
            • String ID: GetSystemDefaultUILanguage$GetUserDefaultUILanguage$kernel32.dll
            • API String ID: 667524283-3528650308
            • Opcode ID: 2b1efadd0c18d352a741fd5c2eff11af0d6282708a04d6eed00c2fe9c3248473
            • Instruction ID: 09931c3f584d39cc9302e2eccabf0e9f083c5b75784c34e9aa77037a356fe02a
            • Opcode Fuzzy Hash: 2b1efadd0c18d352a741fd5c2eff11af0d6282708a04d6eed00c2fe9c3248473
            • Instruction Fuzzy Hash: 8741F070A043019FCB54EF29D9506BAB3E2AFE8351F94092EE989C3340EB35DA44DB52
            APIs
            • _ValidateLocalCookies.LIBCMT ref: 01060917
            • ___except_validate_context_record.LIBVCRUNTIME ref: 0106091F
            • _ValidateLocalCookies.LIBCMT ref: 010609A8
            • __IsNonwritableInCurrentImage.LIBCMT ref: 010609D3
            • _ValidateLocalCookies.LIBCMT ref: 01060A28
            • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 01060A3E
            • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 01060A53
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record___vcrt_initialize_locks___vcrt_uninitialize_locks
            • String ID: csm
            • API String ID: 1385549066-1018135373
            • Opcode ID: 35c0774ec80f5cb2dd8ee09a702a5f48d4f0b74a5592e6ca3ec11e94b14e53b9
            • Instruction ID: 06f348e93e134316c0473e3ee2bfb34cc83969af6881daf0e6f9331ca534b0d9
            • Opcode Fuzzy Hash: 35c0774ec80f5cb2dd8ee09a702a5f48d4f0b74a5592e6ca3ec11e94b14e53b9
            • Instruction Fuzzy Hash: F141E534A4020A9FDF10DF68C884AEEBBFAEF85364F048195E9D49B356D7719901CBA1
            APIs
            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000), ref: 00F9056F
            • CloseHandle.KERNEL32(00000000), ref: 00F90597
            • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,?), ref: 00F905D9
            • CloseHandle.KERNEL32(?), ref: 00F9062E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CloseFileHandle$CreateWrite
            • String ID: .bat$EXE$open
            • API String ID: 3602564925-2898749727
            • Opcode ID: b0b626807e7ea2ef8ce5b6009c6d871ea4e69c8781d35d1478b570e910b8b716
            • Instruction ID: 8d2cec615a72086453453867af367afe7d228c5ba4555be16ad2aff5c4b157ff
            • Opcode Fuzzy Hash: b0b626807e7ea2ef8ce5b6009c6d871ea4e69c8781d35d1478b570e910b8b716
            • Instruction Fuzzy Hash: DCA16970D01648DFEB10CFA8C948B9EBBF4EF45324F288299E815AB291DB749D44CF51
            APIs
            • __Init_thread_footer.LIBCMT ref: 00E9E26F
              • Part of subcall function 0105D034: EnterCriticalSection.KERNEL32(0117BF4C,?,?,00E8AE07,0117CB7C,010E6B00), ref: 0105D03E
              • Part of subcall function 0105D034: LeaveCriticalSection.KERNEL32(0117BF4C,?,00E8AE07,0117CB7C,010E6B00), ref: 0105D071
              • Part of subcall function 0105D034: RtlWakeAllConditionVariable.NTDLL ref: 0105D0E8
            • CreateFileW.KERNEL32(00000000,40000000,00000001,00000000,00000002,00000080,00000000,?,9F3ADAE7), ref: 00E9E2C3
            • CloseHandle.KERNEL32(00000000), ref: 00E9E320
              • Part of subcall function 0105D07E: EnterCriticalSection.KERNEL32(0117BF4C,?,?,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5,?,?), ref: 0105D089
              • Part of subcall function 0105D07E: LeaveCriticalSection.KERNEL32(0117BF4C,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5,?,?), ref: 0105D0C6
            • WriteFile.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 00E9E387
            • CloseHandle.KERNEL32(00000000,01059D7B), ref: 00E9E3AD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalSection$CloseEnterFileHandleLeave$ConditionCreateInit_thread_footerVariableWakeWrite
            • String ID: aix$html
            • API String ID: 2030708724-2369804267
            • Opcode ID: 4ab6c1456349ec255843c117f0c2eacffcfe0b3d26e77928a8b1ba1eb75cd569
            • Instruction ID: 757ccb338bc1fb93be28786f1039fb76b8cef917f0de59eacc3d1d7bf003c018
            • Opcode Fuzzy Hash: 4ab6c1456349ec255843c117f0c2eacffcfe0b3d26e77928a8b1ba1eb75cd569
            • Instruction Fuzzy Hash: FB61ABB0D01244DFDB29DFA4D949B9EBBF4FB04708F10815DE551AB380E7B56948CB91
            APIs
            • InitializeCriticalSectionAndSpinCount.KERNEL32(0117D648,00000000,9F3ADAE5,00000000,010C45F3,000000FF,?,9F3ADAE5), ref: 00E829A3
            • GetLastError.KERNEL32(?,9F3ADAE5), ref: 00E829AD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CountCriticalErrorInitializeLastSectionSpin
            • String ID: VolumeCostAvailable$VolumeCostDifference$VolumeCostRequired$VolumeCostSize$VolumeCostVolume
            • API String ID: 439134102-34576578
            • Opcode ID: 3e5017f5e5d6e2a31868ab4812fc5c06cc32ac07693b1eed52f45b62e5a87d62
            • Instruction ID: c46691f9c32ab28fb0da594159bd627dcb2c3d5e233f612cc1973f66d716e575
            • Opcode Fuzzy Hash: 3e5017f5e5d6e2a31868ab4812fc5c06cc32ac07693b1eed52f45b62e5a87d62
            • Instruction Fuzzy Hash: 0F51D2B1D002099BDB19DFA4E9047DEBBF8EB48714F10422DE96CB7380E775A544CB91
            APIs
            • SHGetSpecialFolderLocation.SHELL32(00000000,00000023,?,?,?,?,0117D68C), ref: 00FF10E0
            • LoadLibraryW.KERNEL32(Shell32.dll,?,?,0117D68C), ref: 00FF10F3
            • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00FF1103
            • SHGetPathFromIDListW.SHELL32(?,00000000), ref: 00FF118C
            • SHGetMalloc.SHELL32(?), ref: 00FF11CE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: AddressFolderFromLibraryListLoadLocationMallocPathProcSpecial
            • String ID: SHGetSpecialFolderPathW$Shell32.dll
            • API String ID: 2352187698-2988203397
            • Opcode ID: 2dcd79f2b3d9a7aeba1b9e81277a4d4c56bd55c04ecb57a3d629920144145e42
            • Instruction ID: 2f2905b0f003cb8b0ae2df679a44bd7b3e4947f1697cf4c018729db171535527
            • Opcode Fuzzy Hash: 2dcd79f2b3d9a7aeba1b9e81277a4d4c56bd55c04ecb57a3d629920144145e42
            • Instruction Fuzzy Hash: 28312831A00705DFEB249F24DC45B7777F9BF90B20F54842CEA86872A0EB75D8859B91
            APIs
            • __Init_thread_footer.LIBCMT ref: 00F87F90
              • Part of subcall function 0105D034: EnterCriticalSection.KERNEL32(0117BF4C,?,?,00E8AE07,0117CB7C,010E6B00), ref: 0105D03E
              • Part of subcall function 0105D034: LeaveCriticalSection.KERNEL32(0117BF4C,?,00E8AE07,0117CB7C,010E6B00), ref: 0105D071
              • Part of subcall function 0105D034: RtlWakeAllConditionVariable.NTDLL ref: 0105D0E8
            • GetProcAddress.KERNEL32(SetWindowTheme), ref: 00F87FCD
            • __Init_thread_footer.LIBCMT ref: 00F87FE4
            • SendMessageW.USER32(000000EF,00001036,00010000,00010000), ref: 00F8800F
              • Part of subcall function 0105D07E: EnterCriticalSection.KERNEL32(0117BF4C,?,?,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5,?,?), ref: 0105D089
              • Part of subcall function 0105D07E: LeaveCriticalSection.KERNEL32(0117BF4C,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5,?,?), ref: 0105D0C6
              • Part of subcall function 00F664F0: GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00F66531
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalSection$EnterInit_thread_footerLeave$AddressConditionDirectoryMessageProcSendSystemVariableWake
            • String ID: SetWindowTheme$UxTheme.dll$explorer
            • API String ID: 3410024541-3123591815
            • Opcode ID: 72dfd3b62e2d6fac8897cd3208ed12649d9c009f8538f26b2664b1d0a8b288b8
            • Instruction ID: 6b82c5d16fd34afdaed9cb3b4a3cf73794a8eaa1e58d8cceba2d27d13d2253eb
            • Opcode Fuzzy Hash: 72dfd3b62e2d6fac8897cd3208ed12649d9c009f8538f26b2664b1d0a8b288b8
            • Instruction Fuzzy Hash: 3021A771944702AFC739EF99D845B9D77A4E704B70F108225FA60973C4CBB06940DB91
            APIs
            • GetWindowRect.USER32(?,?), ref: 00EA115A
            • GetWindow.USER32(?,00000005), ref: 00EA1167
            • GetWindow.USER32(00000000,00000002), ref: 00EA12A2
              • Part of subcall function 00EA0FB0: GetWindowRect.USER32(?,?), ref: 00EA0FDC
              • Part of subcall function 00EA0FB0: GetWindowRect.USER32(?,?), ref: 00EA0FEC
            • GetWindowRect.USER32(?,?), ref: 00EA11FB
            • GetWindowRect.USER32(00000000,?), ref: 00EA120B
            • GetWindowRect.USER32(00000000,?), ref: 00EA1225
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$Rect
            • String ID:
            • API String ID: 3200805268-0
            • Opcode ID: 6bccf396306a27f9627c8177061a6e40001176a89ec350f7715c795ebec76d24
            • Instruction ID: e113afa66156a49f003d46ce138b5938314554d9622f462ef24f454d00474e7c
            • Opcode Fuzzy Hash: 6bccf396306a27f9627c8177061a6e40001176a89ec350f7715c795ebec76d24
            • Instruction Fuzzy Hash: 23418F315047019FC321DB29C980A6BF7F9BFAA744F50595DF085AB561EB30F984CB52
            APIs
            • GetWindowDC.USER32(?,9F3ADAE5,?,00000000,?,?,?,?,?,00000000,0108B4B5,000000FF,?,00EA9082,?,?), ref: 00EA9302
            • GetWindowRect.USER32(?,?), ref: 00EA9321
            • IsWindowEnabled.USER32(?), ref: 00EA9330
            • SelectObject.GDI32(00000000,00000000), ref: 00EA938E
            • ExcludeClipRect.GDI32(?,?,?,?,00000000), ref: 00EA93B8
            • SelectObject.GDI32(?,?), ref: 00EA93D2
            • DeleteObject.GDI32(00000000), ref: 00EA93E1
            • DeleteDC.GDI32(?), ref: 00EA9404
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ObjectWindow$DeleteRectSelect$ClipEnabledExclude
            • String ID:
            • API String ID: 3871716574-0
            • Opcode ID: 84488f76f8520e566b081b8cb06a9c2871feb3c9770ec5f42c1a91b319a3ddad
            • Instruction ID: dbaebc75fe711b020aaadb844b4be56b44554ed7d6fab9d5f5962fee040fe248
            • Opcode Fuzzy Hash: 84488f76f8520e566b081b8cb06a9c2871feb3c9770ec5f42c1a91b319a3ddad
            • Instruction Fuzzy Hash: C4418171A04218AFDB14CFA5C988BAEBBB9FF8C310F104229F915A7384C7346945CB64
            APIs
            • GetProcessHeap.KERNEL32(00000008,0000000D,00000000,?,0105C76A,?,?,?), ref: 0105C5E4
            • HeapAlloc.KERNEL32(00000000,?,0105C76A,?,?,?), ref: 0105C5EB
              • Part of subcall function 0105C6B6: IsProcessorFeaturePresent.KERNEL32(0000000C,0105C5D2,00000000,?,0105C76A,?,?,?), ref: 0105C6B8
            • InterlockedPopEntrySList.KERNEL32(00000000,00000000,?,0105C76A,?,?,?), ref: 0105C5FB
            • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,0105C76A,?,?,?), ref: 0105C622
            • RaiseException.KERNEL32(C0000017,00000000,00000000,00000000,?,0105C76A,?,?,?), ref: 0105C636
            • InterlockedPopEntrySList.KERNEL32(00000000,?,0105C76A,?,?,?), ref: 0105C649
            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,0105C76A,?,?,?), ref: 0105C65C
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: AllocEntryHeapInterlockedListVirtual$ExceptionFeatureFreePresentProcessProcessorRaise
            • String ID:
            • API String ID: 2460949444-0
            • Opcode ID: 33f415a1d5c740229b14aadff57ec2870e6ba98ee496b6660ecb20e0eac7df1b
            • Instruction ID: 9ff78f7943c8fac5d4e2e5583851f57c11761c19d26dbd48e9d327ffdb8f46d3
            • Opcode Fuzzy Hash: 33f415a1d5c740229b14aadff57ec2870e6ba98ee496b6660ecb20e0eac7df1b
            • Instruction Fuzzy Hash: C111BC71640321ABF7B116699E44F5776EDEB48B45F011430FEC1DA244CA65DD4087B4
            APIs
            • CreateThread.KERNEL32(00000000,00000000,00EC72B0,010F9158,00000000,?), ref: 00EC722A
            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00EC7243
            • CloseHandle.KERNEL32(00000000), ref: 00EC7259
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CloseCreateHandleObjectSingleThreadWait
            • String ID:
            • API String ID: 51348343-0
            • Opcode ID: 186e86c71eec586bc1bbcbf3aaf9ba82d9cd8887e2b41f12063a705a6087b444
            • Instruction ID: 853bc378d46ac4bec349da9d4eb9f0792fb3289c26605e5e6e4e348e80af273f
            • Opcode Fuzzy Hash: 186e86c71eec586bc1bbcbf3aaf9ba82d9cd8887e2b41f12063a705a6087b444
            • Instruction Fuzzy Hash: 97027BB0D04249DFDB14CFA8C945BAEBBB8FF04318F20825DE859AB291D7759A45CF60
            APIs
            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,9F3ADAE5), ref: 00FAD039
            • ReadFile.KERNEL32(00000000,00000000,00001000,?,00000000,00001000), ref: 00FAD0AB
            • ReadFile.KERNEL32(?,00000000,00001000,00000000,00000000,?,?,00000000), ref: 00FAD34C
            • CloseHandle.KERNEL32(?), ref: 00FAD3AA
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: File$Read$CloseCreateHandle
            • String ID:
            • API String ID: 1724936099-0
            • Opcode ID: 2d7f7ea63785579f7da3ff1b6a219465891bb4d11451176a87fcb8fb476ecbe7
            • Instruction ID: ed8b348541701578e26bd681bbd5d562548cfbc42e9f68db8624b69789e38701
            • Opcode Fuzzy Hash: 2d7f7ea63785579f7da3ff1b6a219465891bb4d11451176a87fcb8fb476ecbe7
            • Instruction Fuzzy Hash: 55D1B2B1D003089BDF20CFA4C948BEEBBB5BF46714F20821DE855BB681D774AA45DB91
            APIs
            • __Init_thread_footer.LIBCMT ref: 00F5A595
            • SystemParametersInfoW.USER32(00000030,00000000,01182B5C,00000000), ref: 00F5A5CC
            • __Init_thread_footer.LIBCMT ref: 00F5A661
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Init_thread_footer$InfoParametersSystem
            • String ID: AI_FRAME_NO_CAPTION_$Dialog$`Dialog` = '
            • API String ID: 3910108132-2270296660
            • Opcode ID: 6cdb52480e98a2d74aff508a43869104c38eeb3e521031e5e460aa2b2fcf686c
            • Instruction ID: d07efd44a5ee487eb10a3ecc4acfda0f65f6679c1c0cbd206259b43c8d63ae89
            • Opcode Fuzzy Hash: 6cdb52480e98a2d74aff508a43869104c38eeb3e521031e5e460aa2b2fcf686c
            • Instruction Fuzzy Hash: 30D1EF71E01208CFCB29CFB8C985B9EB7B1EF58310F14832DE925AB291DB70A945CB51
            APIs
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            • DeleteFileW.KERNEL32(?,?,?,?,00000000,?,?,?), ref: 00FDEEFA
              • Part of subcall function 00E8A2A0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,?,?,?,*.*,?,80070057,9F3ADAE5), ref: 00E8A2C3
              • Part of subcall function 00E8A9B0: RtlAllocateHeap.NTDLL(?,00000000,?,9F3ADAE5,00000000,01084C50,000000FF,?,?,01173854,?,00FE9828,80004005,9F3ADAE5,?,?), ref: 00E8A9FA
            • ResetEvent.KERNEL32(00000000,9F3ADAE5,?,?,00000000,010D2DFD,000000FF,?,80004005), ref: 00FDEF8F
            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,010D2DFD,000000FF,?,80004005), ref: 00FDEFAF
            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,00000000,010D2DFD,000000FF,?,80004005), ref: 00FDEFBA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: HeapInit_thread_footerObjectSingleWait$AllocateDeleteEventFileFindProcessResetResource
            • String ID: TEST$tin9999.tmp
            • API String ID: 3248508590-3424081289
            • Opcode ID: 132a05bff454a815cb212e921db7f731673727710e7b9e7df7f80e54b5bc8f4e
            • Instruction ID: 394ea68a1fdcd5295d27243d47f508414cf615b17882b0dc2ad1b2f44144a6d5
            • Opcode Fuzzy Hash: 132a05bff454a815cb212e921db7f731673727710e7b9e7df7f80e54b5bc8f4e
            • Instruction Fuzzy Hash: 19C1E671904649DFDB14EF68CD04BAEB7B5FF04320F1842AAE819AB381DB749E04DB50
            APIs
            • CreateEventW.KERNEL32(00000000,00000000,00000000,Caphyon.AI.ExtUI.IEClickSoundRemover,9F3ADAE5), ref: 00E9E491
            • GetLastError.KERNEL32 ref: 00E9E4BA
            • RegCloseKey.ADVAPI32(?,010F42AC,00000000,010F42AC,00000000,?,80000001,00000001,00000000,AppEvents\Schemes\Apps\Explorer\Navigating\.Current,00000033), ref: 00E9E72E
            • CloseHandle.KERNEL32(?,9F3ADAE5,?,?,00000000,010897FD,000000FF,?,010F42AC,00000000,010F42AC,00000000,?,80000001,00000001,00000000), ref: 00E9E7BE
            Strings
            • AppEvents\Schemes\Apps\Explorer\Navigating\.Current, xrefs: 00E9E4F2
            • Caphyon.AI.ExtUI.IEClickSoundRemover, xrefs: 00E9E486
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Close$CreateErrorEventHandleLast
            • String ID: AppEvents\Schemes\Apps\Explorer\Navigating\.Current$Caphyon.AI.ExtUI.IEClickSoundRemover
            • API String ID: 1253123496-2079760225
            • Opcode ID: e3f57eef6cfb96fb7b46d27ca3cb96ad7777fb498a2ae3f242e8a813e28c4a36
            • Instruction ID: 98e8589b7c447ea7fd8cfae04aa6c345af5853fcdf68eb804c7e3e3f0b576a0b
            • Opcode Fuzzy Hash: e3f57eef6cfb96fb7b46d27ca3cb96ad7777fb498a2ae3f242e8a813e28c4a36
            • Instruction Fuzzy Hash: 65C1ED70D00348DFDB14CF68C988BAEBBB4EF54704F14829DE899A7781DB746A84CB91
            APIs
            • SysAllocStringLen.OLEAUT32(00000000,?), ref: 00E9654A
            • SysFreeString.OLEAUT32(00000000), ref: 00E96596
            • SysFreeString.OLEAUT32(00000000), ref: 00E965B8
            • SysFreeString.OLEAUT32(00000000), ref: 00E96713
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: String$Free$Alloc
            • String ID: .c$.c
            • API String ID: 986138563-2435476076
            • Opcode ID: e1bc7a136795113765a95ebf684a052cc424ae84966ef04761a669701a2bfafc
            • Instruction ID: f7738efdeb9af800c240105873cecd3943136bf8659f7e4cfee561c7baeda4de
            • Opcode Fuzzy Hash: e1bc7a136795113765a95ebf684a052cc424ae84966ef04761a669701a2bfafc
            • Instruction Fuzzy Hash: 12A19371A00209DFDF15DFA8C948FAEBBB8EF44714F10465AE915E7281E7749A01CBA1
            APIs
            • EnterCriticalSection.KERNEL32(0117D628,9F3ADAE5,?,?,?,?,?,?,?,?,?,?,?,?,00000000,010890F5), ref: 00E9C5DA
            • GetModuleFileNameW.KERNEL32(0000FFFF,00000104,?,?,?,?,?,?,?,?,?,?,?,?,00000000,010890F5), ref: 00E9C65A
            • EnterCriticalSection.KERNEL32(0117D644,?,?,?,?,?,?,?,?,?,?,?,00000000,010890F5,000000FF), ref: 00E9C813
            • LeaveCriticalSection.KERNEL32(0117D644,?,?,?,?,?,?,?,?,?,?,00000000,010890F5,000000FF), ref: 00E9C834
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalSection$Enter$FileLeaveModuleName
            • String ID: v
            • API String ID: 1807155316-3261393531
            • Opcode ID: 2e5b22aaa8fac49bebc4877a1aa196d46da5845074e040a1f97929cc91d1c8ab
            • Instruction ID: a507922558cd0a6609a7780044519fe222115dbf4b5799215aadf47fab85c715
            • Opcode Fuzzy Hash: 2e5b22aaa8fac49bebc4877a1aa196d46da5845074e040a1f97929cc91d1c8ab
            • Instruction Fuzzy Hash: ABB19070900249DFDF24DFA4C888BAEBBB4BF09718F244069E855BB341DB75A944CBA1
            APIs
            • GetModuleHandleW.KERNEL32(Advapi32.dll,00000000,9F3ADAE5), ref: 00FA7296
            • GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 00FA72A6
            • RegCloseKey.ADVAPI32(00000000), ref: 00FA72F8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: AddressCloseHandleModuleProc
            • String ID: Advapi32.dll$RegOpenKeyTransactedW
            • API String ID: 4190037839-3913318428
            • Opcode ID: 66f94e46b29f79898a5c0ac9e061b679cdbc0d708a253b28083d737808261458
            • Instruction ID: 24faca308f0b0fe03e732a5e30b91914242ef96412ac91650cb6bdc86323f39e
            • Opcode Fuzzy Hash: 66f94e46b29f79898a5c0ac9e061b679cdbc0d708a253b28083d737808261458
            • Instruction Fuzzy Hash: E0A15BB0D04308DFDB24DFA8C954B9EBBF4BF49314F208159E859AB291DB74AA44DF90
            APIs
            • SysFreeString.OLEAUT32(?), ref: 00E910F4
            • SysFreeString.OLEAUT32(00000000), ref: 00E91169
            • GetProcessHeap.KERNEL32(?,?), ref: 00E911D9
            • HeapFree.KERNEL32(00000000,?,?), ref: 00E911DF
            • GetProcessHeap.KERNEL32(?,00000000,?,00000000,00000000,00000000,9F3ADAE5), ref: 00E9120C
            • HeapFree.KERNEL32(00000000,?,00000000,?,00000000,00000000,00000000,9F3ADAE5), ref: 00E91212
            • SysFreeString.OLEAUT32(00000000), ref: 00E9122A
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Free$Heap$String$Process
            • String ID:
            • API String ID: 2680101141-0
            • Opcode ID: 5a341dd9c61b4fc2edfd36b2f9b95c3e522bb9a9e26935c8d07d5ec2ebc39183
            • Instruction ID: 99cf4020d1290dc75b5f30b781ebd3b215e32b2c1b63335277ec10a81546b123
            • Opcode Fuzzy Hash: 5a341dd9c61b4fc2edfd36b2f9b95c3e522bb9a9e26935c8d07d5ec2ebc39183
            • Instruction Fuzzy Hash: 58816970D0124ADFDF10EFA8C944BEEBBB8AF15318F144599E814BB291D7799E04CBA1
            APIs
            • RemoveDirectoryW.KERNEL32(?,00000000,?,\\?\,00000004,?,?,?,010C4EAD,000000FF,?,00FA9776,?), ref: 00FA9503
              • Part of subcall function 00E8A2A0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,?,?,?,*.*,?,80070057,9F3ADAE5), ref: 00E8A2C3
            • RemoveDirectoryW.KERNEL32(?,9F3ADAE5,?,?,?,?,010C4EAD,000000FF,?,00FA9776,?,00000000), ref: 00FA9532
            • GetLastError.KERNEL32(?,9F3ADAE5,?,?,?,?,010C4EAD,000000FF,?,00FA9776,?,00000000), ref: 00FA9542
            • DeleteFileW.KERNEL32(?,00000000,?,\\?\,00000004,?,?,?,00000000,010C4EAD,000000FF,?,80004005,9F3ADAE5,?), ref: 00FA9613
            • GetLastError.KERNEL32(?,?,?,00000000,010C4EAD,000000FF,?,80004005,9F3ADAE5,?,?,?,?,010C4EAD,000000FF), ref: 00FA9652
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: DirectoryErrorInit_thread_footerLastRemove$DeleteFileFindHeapProcessResource
            • String ID: \\?\
            • API String ID: 34920479-4282027825
            • Opcode ID: 9e26e57c05d25f070aaa1471a011d2da14561968342bf371ff718a9942d9e8a8
            • Instruction ID: 8dc9270f1cbc895476e45a4bd6ed1ae4b02a5f711b701fe83fbac8e6acc71dce
            • Opcode Fuzzy Hash: 9e26e57c05d25f070aaa1471a011d2da14561968342bf371ff718a9942d9e8a8
            • Instruction Fuzzy Hash: D951D0B19086049FDB10DFA8C819BAAB7F4FF06320F14466EF9A5D7290DBB99904DB50
            APIs
            • GetLastError.KERNEL32 ref: 00FAB077
            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00FAB093
            • GetExitCodeProcess.KERNEL32(00000000,010C89E7), ref: 00FAB0A4
            • CloseHandle.KERNEL32(00000000), ref: 00FAB0B2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CloseCodeErrorExitHandleLastObjectProcessSingleWait
            • String ID: <$open
            • API String ID: 2321548817-1930408713
            • Opcode ID: c07be31a784d35e5e3dd1dfb3077e4df649cf5fc95b91743d490fd7f758f856f
            • Instruction ID: 6be04cc844a5bbef12941c3b749afd4456bcf17807cdd62a7a773a3dbc20a6ef
            • Opcode Fuzzy Hash: c07be31a784d35e5e3dd1dfb3077e4df649cf5fc95b91743d490fd7f758f856f
            • Instruction Fuzzy Hash: E4618BB1D006499FDB10CF69C84879EBBB4FF46324F188259E825AB391D7799D04DB80
            APIs
            • Wow64DisableWow64FsRedirection.KERNEL32(00000000,9F3ADAE5,00000010), ref: 00FAADE7
            • CreateProcessW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,9F3ADAE5,010C895D), ref: 00FAAE5F
            • GetLastError.KERNEL32 ref: 00FAAE70
            • WaitForSingleObject.KERNEL32(010C895D,000000FF), ref: 00FAAE8C
            • GetExitCodeProcess.KERNEL32(010C895D,00000000), ref: 00FAAE9D
            • CloseHandle.KERNEL32(010C895D), ref: 00FAAEA7
            • Wow64RevertWow64FsRedirection.KERNEL32(00000000), ref: 00FAAEC2
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Wow64$ProcessRedirection$CloseCodeCreateDisableErrorExitHandleLastObjectRevertSingleWait
            • String ID:
            • API String ID: 1153077990-0
            • Opcode ID: ceff8d96b06c660bc40a8e1bf565ee490d1d7c9a7f99e8c0ffa1ca93e37fdaed
            • Instruction ID: 7c5a72a7ea9f1a5873129eb660263b75f2f0f945fd8ccc8844370f25c7a42ce6
            • Opcode Fuzzy Hash: ceff8d96b06c660bc40a8e1bf565ee490d1d7c9a7f99e8c0ffa1ca93e37fdaed
            • Instruction Fuzzy Hash: 64419F71E003899FDB20CFA5C9447EEBBF8AF4A714F104659F864A7284E7758E44CB51
            APIs
            • LoadLibraryW.KERNEL32(Shlwapi.dll,?,?,?,?,00FBF141,?,9F3ADAE5,?,?), ref: 00FB3D5B
            • GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 00FB3D71
            • FreeLibrary.KERNEL32(00000000), ref: 00FB3DAA
            • FreeLibrary.KERNEL32(00000000,?,?,?,?,00FBF141,?,9F3ADAE5,?,?), ref: 00FB3DC6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Library$Free$AddressLoadProc
            • String ID: DllGetVersion$Shlwapi.dll
            • API String ID: 1386263645-2240825258
            • Opcode ID: ad025f1bae67dbb731511aab5699c6096710037534239d790a1b091d847a9be0
            • Instruction ID: ae51f8c33305aa35c20e51aa38e9d6a548f08041b8dc7c7f1a7619e734008d01
            • Opcode Fuzzy Hash: ad025f1bae67dbb731511aab5699c6096710037534239d790a1b091d847a9be0
            • Instruction Fuzzy Hash: A421F9726043055BD714EF2AE8816AFB7E4FFDD611F80052EF889C3240EB35D9089BA2
            APIs
            • FreeLibrary.KERNEL32(00000000,?,0107686F,?,?,?,00000000,00000000,?,01076AD9,00000021,FlsSetValue,010EDE8C,010EDE94,?), ref: 01076823
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: FreeLibrary
            • String ID: api-ms-$ext-ms-
            • API String ID: 3664257935-537541572
            • Opcode ID: 67ae3c5d95c52830bb23d1b8269a5706083fc620ae2732345e0d649282309326
            • Instruction ID: a9a0d8a5eb612ace958bb56467c1d7a4235eaa3d2bbf92176ed769dfb751523a
            • Opcode Fuzzy Hash: 67ae3c5d95c52830bb23d1b8269a5706083fc620ae2732345e0d649282309326
            • Instruction Fuzzy Hash: A2215E71E00615ABE7B19725DC40A5A7BE8FB017B0B1006A4F993B73C0E632ED00C7D4
            APIs
            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,01059ED8,01059E3B,0105A0DC), ref: 01059E74
            • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 01059E8A
            • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 01059E9F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: AddressProc$HandleModule
            • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
            • API String ID: 667068680-1718035505
            • Opcode ID: af2f5a5bdd104c3062919345d57ce69c2da238e4bccf91b7235377f4941b9db8
            • Instruction ID: 2131d38a551155feb32720c377e0855160668c9d566bf39a514ea51523197744
            • Opcode Fuzzy Hash: af2f5a5bdd104c3062919345d57ce69c2da238e4bccf91b7235377f4941b9db8
            • Instruction Fuzzy Hash: 0CF0C232244322DF1BF26DAE58895AB2BD99B0571E305007DEDC1D6600EB25CC80EBD0
            APIs
            • BeginPaint.USER32(?,?), ref: 00EA0CE8
            • GetClientRect.USER32(?,00000000), ref: 00EA0D09
            • GetParent.USER32(?), ref: 00EA0D29
            • SendMessageW.USER32(00000000,00000135,?,?), ref: 00EA0D39
            • FillRect.USER32(?,00000000,00000000), ref: 00EA0D47
            • EndPaint.USER32(?,?), ref: 00EA0EEE
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: PaintRect$BeginClientFillMessageParentSend
            • String ID:
            • API String ID: 732421049-0
            • Opcode ID: a826b244de20700350de909092e2888c8d55fba9d51867b080991187721eb1e0
            • Instruction ID: 7d3d74bbb0ca3f3b7d1b2b9be01fe29e9441fcc383b4d9e5ba033fd80c9b9aeb
            • Opcode Fuzzy Hash: a826b244de20700350de909092e2888c8d55fba9d51867b080991187721eb1e0
            • Instruction Fuzzy Hash: 2C812970904219EFEF25DF64C948BAABBF4FF09304F1481A9E509A7291DB70AE94CF54
            APIs
            • std::_Lockit::_Lockit.LIBCPMT ref: 00EBF37A
            • std::_Lockit::_Lockit.LIBCPMT ref: 00EBF39C
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00EBF3C4
            • __Getctype.LIBCPMT ref: 00EBF4A5
            • std::_Facet_Register.LIBCPMT ref: 00EBF507
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00EBF531
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
            • String ID:
            • API String ID: 1102183713-0
            • Opcode ID: 0b1e2e5e13fc8f5d062d188d6da8d8082066e6ae784769eaa6b8d6155c9242fa
            • Instruction ID: 4482b2ebaf3eadaa50b17d028afe2148fcde351ff174eca787d19d22de9453e8
            • Opcode Fuzzy Hash: 0b1e2e5e13fc8f5d062d188d6da8d8082066e6ae784769eaa6b8d6155c9242fa
            • Instruction Fuzzy Hash: 54619DB1D04249CFDB20DF68C944BAFBBF4FB14314F148269D895AB381E735AA84CB91
            APIs
            • std::_Lockit::_Lockit.LIBCPMT ref: 00EBF16D
            • std::_Lockit::_Lockit.LIBCPMT ref: 00EBF18F
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00EBF1B7
            • __Getcoll.LIBCPMT ref: 00EBF281
            • std::_Facet_Register.LIBCPMT ref: 00EBF2C6
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00EBF2FE
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetcollRegister
            • String ID:
            • API String ID: 1184649410-0
            • Opcode ID: 029a0c8c8a65cd6cd072805798285592ebce8ceca687ca435b1bcea1ff1e3866
            • Instruction ID: a8073197f4fb334d9cda5c10252be5fa692c0e82e99b7696aa894e0c3e40a3b9
            • Opcode Fuzzy Hash: 029a0c8c8a65cd6cd072805798285592ebce8ceca687ca435b1bcea1ff1e3866
            • Instruction Fuzzy Hash: 7D5197B1901209EFDB15DFA8D984BDEFBB0FF50314F204169E855AB281DB70AA05CB81
            APIs
            • GetObjectW.GDI32(00000000,0000005C,?), ref: 00E9CD7D
            • GetDC.USER32(?), ref: 00E9CDCC
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E9CDDB
            • ReleaseDC.USER32(00000000), ref: 00E9CE22
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CapsDeviceObjectRelease
            • String ID:
            • API String ID: 2638590286-0
            • Opcode ID: 3b08b57f4a64ff70e57966633af0e224be880d5f13ec0394a67fedeb02e8f77d
            • Instruction ID: 371110d0d35b76684e1ebc368c5a00e7e26291dcf8e398e29545686f125260bd
            • Opcode Fuzzy Hash: 3b08b57f4a64ff70e57966633af0e224be880d5f13ec0394a67fedeb02e8f77d
            • Instruction Fuzzy Hash: 84510975A04349DFDF24DFA5C848BAA7BF8EF08714F104129F966A7280E7349944CB64
            APIs
            • SendMessageW.USER32(?,000000C5,?,00000000), ref: 00EB4F5B
            • GetClientRect.USER32(?,?), ref: 00EB4F8D
            • GetDC.USER32(?), ref: 00EB4FA0
            • GetDeviceCaps.GDI32(00000000), ref: 00EB4FA7
            • GetObjectW.GDI32(00000000,0000005C,?), ref: 00EB4FDC
            • SendMessageA.USER32(?,00000447,00000000,000000BC), ref: 00EB507D
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend$CapsClientDeviceObjectRect
            • String ID:
            • API String ID: 565975350-0
            • Opcode ID: 6352a58179d27e6d95917c8ed31a256217ec58d28671b83270992a4c331c532c
            • Instruction ID: bde4b11dce5b6285f70e54ad7d0f8a0f087f4691ebacd366e0d063aaf591d8c3
            • Opcode Fuzzy Hash: 6352a58179d27e6d95917c8ed31a256217ec58d28671b83270992a4c331c532c
            • Instruction Fuzzy Hash: 9541A3316183059FE721DF35CC05F9BB7E8BF88300F004A29F599A72A0DB71A944CB91
            APIs
            • GetLastError.KERNEL32(?,?,0105E7DA,0105E7A6,?,?,00EBC5ED,00FA81D0,?,00000008), ref: 0105E7F1
            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0105E7FF
            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0105E818
            • SetLastError.KERNEL32(00000000,0105E7DA,0105E7A6,?,?,00EBC5ED,00FA81D0,?,00000008), ref: 0105E86A
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ErrorLastValue___vcrt_
            • String ID:
            • API String ID: 3852720340-0
            • Opcode ID: 2c2dde00ec991dd39ae21b45a0b4b9048e72e50d044c47f0ff32d130487d67c1
            • Instruction ID: 72c25b04a52d6716920e6753bfba17867a1ebd20daa85d0469f18b909eb7340f
            • Opcode Fuzzy Hash: 2c2dde00ec991dd39ae21b45a0b4b9048e72e50d044c47f0ff32d130487d67c1
            • Instruction Fuzzy Hash: 1401F1325482136EA7FA25B9FC886AB6AD8FB526393200239E9F8551D0EF2618405280
            APIs
            • __Init_thread_footer.LIBCMT ref: 00E898C5
            • __Init_thread_footer.LIBCMT ref: 00E89910
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Init_thread_footer
            • String ID: </a>$<a href="$<a>
            • API String ID: 1385522511-4210067781
            • Opcode ID: bf29adb6ecec56026b3f5f26e80fa1b598761175e25cd3fe4d15b4da9fab600b
            • Instruction ID: abe43416be6f5ee28cbb8583806d3f93b4970002d3b5fe1caf8a47e8b8e9f6ce
            • Opcode Fuzzy Hash: bf29adb6ecec56026b3f5f26e80fa1b598761175e25cd3fe4d15b4da9fab600b
            • Instruction Fuzzy Hash: DBA19C70E00605DFCB19EFA4C945BADB7B1FF85314F14526DE429BB291EB70A981CB60
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID:
            • String ID: :${
            • API String ID: 0-3766677574
            • Opcode ID: 5c56242d71520f10dd5b7c18651deead4cf9f4ea6e0c458b394ab34647555eb0
            • Instruction ID: abbf6a2097600931ccfea36280c473add0028028fdf1095e3cbf3bb8ae62c6ab
            • Opcode Fuzzy Hash: 5c56242d71520f10dd5b7c18651deead4cf9f4ea6e0c458b394ab34647555eb0
            • Instruction Fuzzy Hash: CA61B170A002169BCF248F64C945BBD77B4AF0A718F14542DE962FB2A5EB75DD80CB60
            APIs
            • CreateWindowExW.USER32(?,SysTabControl32,?,46010000,?,?,?,?,00000000,00000309,00000000), ref: 00EB7AFD
            • SendMessageW.USER32(00000000,00000031,00000000,00000000), ref: 00EB7B12
            • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 00EB7B1A
              • Part of subcall function 00E8A9B0: RtlAllocateHeap.NTDLL(?,00000000,?,9F3ADAE5,00000000,01084C50,000000FF,?,?,01173854,?,00FE9828,80004005,9F3ADAE5,?,?), ref: 00E8A9FA
              • Part of subcall function 00EB9710: SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00EB975F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend$AllocateCreateHeapWindow
            • String ID: SysTabControl32$TabHost
            • API String ID: 2359350451-2872506973
            • Opcode ID: 605b32d0fcfd203feba9b1c7307f6044934fb111e810ba14a85307d6d5f8c0e4
            • Instruction ID: 6fd3d228a19db432a4db0cd56c15fae338d5fe644058d690add5ce1756249607
            • Opcode Fuzzy Hash: 605b32d0fcfd203feba9b1c7307f6044934fb111e810ba14a85307d6d5f8c0e4
            • Instruction Fuzzy Hash: 8B51B071A002059FDB14DF68C884BAEF7F5FF89710F10426DE915AB391DB35A900CBA0
            APIs
            • LoadLibraryW.KERNEL32(?,?,?,?,?,.dll,?,00000000), ref: 00E8F96B
            • GetProcAddress.KERNEL32(00000000,DllGetActivationFactory), ref: 00E8F9B4
            • FreeLibrary.KERNEL32(00000000,00000000,DllGetActivationFactory,00000002,00000000,?,?,?,?,?,.dll,?,00000000), ref: 00E8FA02
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Library$AddressFreeLoadProc
            • String ID: .dll$DllGetActivationFactory
            • API String ID: 145871493-1250754257
            • Opcode ID: 400a79e2cca9f00735d4b16ba308b6b2155217f7729064b0eb88623c757129b3
            • Instruction ID: 199053bd8ae04e4b31497667f3bf5f4250b0f539ac3f49847a510aba2c96ed63
            • Opcode Fuzzy Hash: 400a79e2cca9f00735d4b16ba308b6b2155217f7729064b0eb88623c757129b3
            • Instruction Fuzzy Hash: 50518A30D0020AEEDF14EFA8C894BEDFBB1BF54314F249269D419B7290EB749A44CB50
            APIs
            • GetModuleHandleW.KERNEL32(Advapi32.dll,9F3ADAE5,00000000,?,?,?,00000000,010850D0,000000FF), ref: 00F94593
            • GetProcAddress.KERNEL32(00000000,RegCreateKeyTransactedW), ref: 00F945BC
            • RegCloseKey.ADVAPI32(00000000,?,?,?,00000000,010850D0,000000FF), ref: 00F9461C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: AddressCloseHandleModuleProc
            • String ID: Advapi32.dll$RegCreateKeyTransactedW
            • API String ID: 4190037839-2994018265
            • Opcode ID: 9c9e40fb611c09f30e1f1ddb06159027be1c019104be60d5f685af24439e9b8a
            • Instruction ID: fa1a6e405b2859e994455c3be42905c25d79cb9eec0bcd2d056b43880dc972ea
            • Opcode Fuzzy Hash: 9c9e40fb611c09f30e1f1ddb06159027be1c019104be60d5f685af24439e9b8a
            • Instruction Fuzzy Hash: AA318272A04205AFEF25CF85DC45FABBBA8FB14760F14412AF915D6280D771A841DB94
            APIs
            • SendMessageW.USER32(?,00001304,00000000,00000000), ref: 00EB8128
            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00EB813E
            • SendMessageW.USER32(?,0000130C,8w,00000000), ref: 00EB8182
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: 8w$8w
            • API String ID: 3850602802-3388467100
            • Opcode ID: 8454857df256b713991fab872fdd622ea2d50057ad2e5b3cab47bfeb7972bd23
            • Instruction ID: 7fedc4c773519e3cd62b82fdeba0e58b103fa3ec0b84fc26a6d212216010c9cd
            • Opcode Fuzzy Hash: 8454857df256b713991fab872fdd622ea2d50057ad2e5b3cab47bfeb7972bd23
            • Instruction Fuzzy Hash: 5421A170A45204ABDB25DFACCE55BEBBBF8FB48B10F204229F515A73C1DA705901CA54
            APIs
            • InitializeCriticalSection.KERNEL32(?,9F3ADAE5), ref: 00EA45DA
            • EnterCriticalSection.KERNEL32(?,9F3ADAE5), ref: 00EA45E7
            • SetTimer.USER32(00000000,00000001,0000000A,00000000), ref: 00EA4617
            • LeaveCriticalSection.KERNEL32(?), ref: 00EA462E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalSection$EnterInitializeLeaveTimer
            • String ID: v
            • API String ID: 3379552715-3261393531
            • Opcode ID: fb8eca40f2fcf0d88927f5e54c559096e8ccabcbcab962c5c6188133272c5bfd
            • Instruction ID: 2e92aab21808a19c26ed8b48add54528001160f09fab55f380884306d1961bbf
            • Opcode Fuzzy Hash: fb8eca40f2fcf0d88927f5e54c559096e8ccabcbcab962c5c6188133272c5bfd
            • Instruction Fuzzy Hash: 6C210376900240DFDF11DF64D844BD9BBB4FF5A728F1006A9EC96AB386D732A905CB90
            APIs
            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,9F3ADAE5,?,?,00000000,010E68E9,000000FF,?,0106830C,?,?,010682E0,?), ref: 010683B1
            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 010683C3
            • FreeLibrary.KERNEL32(00000000,?,?,00000000,010E68E9,000000FF,?,0106830C,?,?,010682E0,?), ref: 010683E5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: AddressFreeHandleLibraryModuleProc
            • String ID: CorExitProcess$mscoree.dll
            • API String ID: 4061214504-1276376045
            • Opcode ID: 41915b94da616f392a5f8913de9cf247830a621e3f5c9bbdeab196ff188e907c
            • Instruction ID: 1177063a23b44a241e1cdde88f91fc34cf8125e93dad508728fc64c9365a88d7
            • Opcode Fuzzy Hash: 41915b94da616f392a5f8913de9cf247830a621e3f5c9bbdeab196ff188e907c
            • Instruction Fuzzy Hash: 7D01A731944629AFDB229B46DC09BAE7BF8FB04B15F00452AF951A6290DBB59400CB40
            APIs
              • Part of subcall function 0105D07E: EnterCriticalSection.KERNEL32(0117BF4C,?,?,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5,?,?), ref: 0105D089
              • Part of subcall function 0105D07E: LeaveCriticalSection.KERNEL32(0117BF4C,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5,?,?), ref: 0105D0C6
            • LoadLibraryA.KERNEL32(Dbghelp.dll,SymFromAddr), ref: 00FB246E
            • GetProcAddress.KERNEL32(00000000), ref: 00FB2475
            • __Init_thread_footer.LIBCMT ref: 00FB248C
              • Part of subcall function 0105D034: EnterCriticalSection.KERNEL32(0117BF4C,?,?,00E8AE07,0117CB7C,010E6B00), ref: 0105D03E
              • Part of subcall function 0105D034: LeaveCriticalSection.KERNEL32(0117BF4C,?,00E8AE07,0117CB7C,010E6B00), ref: 0105D071
              • Part of subcall function 0105D034: RtlWakeAllConditionVariable.NTDLL ref: 0105D0E8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave$AddressConditionInit_thread_footerLibraryLoadProcVariableWake
            • String ID: Dbghelp.dll$SymFromAddr
            • API String ID: 3268644551-642441706
            • Opcode ID: 059de496fe237b11d20634369036d4558338063e4cc9b0f39e5fa4273c73e31e
            • Instruction ID: 56afc8d887fbee08a914f8c512f11e4a2c2776ae73cf3e628d48d25ca2b6f535
            • Opcode Fuzzy Hash: 059de496fe237b11d20634369036d4558338063e4cc9b0f39e5fa4273c73e31e
            • Instruction Fuzzy Hash: C501BCB1940640FFC728CF99E985B89B3B4F708F20F1046ADE93587780DB75A8408F04
            APIs
            • SleepConditionVariableCS.KERNELBASE(?,0105D0A3,00000064), ref: 0105D129
            • LeaveCriticalSection.KERNEL32(0117BF4C,?,?,0105D0A3,00000064,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5), ref: 0105D133
            • WaitForSingleObjectEx.KERNEL32(?,00000000,?,0105D0A3,00000064,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5), ref: 0105D144
            • EnterCriticalSection.KERNEL32(0117BF4C,?,0105D0A3,00000064,?,00E8AD96,0117CB7C,9F3ADAE5,?,?,010851CD,000000FF,?,00FE97CC,9F3ADAE5), ref: 0105D14B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
            • String ID: v
            • API String ID: 3269011525-3261393531
            • Opcode ID: 73fa473c4b97e69de4b920ac511f9384749a15c3aa2aeb072ec8873b15704f16
            • Instruction ID: d7d5ea07963337a9e1d1be421bb19e40820676a43bf689ff9b75f46e542c2f96
            • Opcode Fuzzy Hash: 73fa473c4b97e69de4b920ac511f9384749a15c3aa2aeb072ec8873b15704f16
            • Instruction Fuzzy Hash: ADE01231649524BBCB263F92FC09ACE3E79DB08F65B000095FD496A314CB6B58508FDA
            APIs
            • GetDC.USER32(00000001), ref: 00EA4172
            • GetParent.USER32(00000001), ref: 00EA419D
            • SendMessageW.USER32(00000000,00000138,?,00000001), ref: 00EA41AD
            • FillRect.USER32(?,?,00000000), ref: 00EA41BB
            • ReleaseDC.USER32(00000001,00000000), ref: 00EA4391
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: FillMessageParentRectReleaseSend
            • String ID:
            • API String ID: 2215362955-0
            • Opcode ID: 8c4e422b54469d23d872260fbcbc6ad1b58aa01446c26047e3ba341d84d4cb07
            • Instruction ID: b0c6d06e1d5e3d156b46acc74b0ff27ac1ac91114382d1ee476ed584e0af9fb7
            • Opcode Fuzzy Hash: 8c4e422b54469d23d872260fbcbc6ad1b58aa01446c26047e3ba341d84d4cb07
            • Instruction Fuzzy Hash: 819145B1A00609EFDF15CFA5C904BAEBBB9FF49300F144129E911EB294EB71B955CB90
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Init_thread_footer$HeapProcess
            • String ID:
            • API String ID: 275895251-0
            • Opcode ID: 61e79ebd9597dd144e5911897612936b0c232dfe8ac63d7f173b052514ba7cf2
            • Instruction ID: b5688f10cd067ead448766cc5d6a45dcf7992de26a20f026799f6a4b5c7ced10
            • Opcode Fuzzy Hash: 61e79ebd9597dd144e5911897612936b0c232dfe8ac63d7f173b052514ba7cf2
            • Instruction Fuzzy Hash: D081AE70900249DFDF14CFA9C98878EBBF5FF09324F1882A9E918AB395D7748940DB91
            APIs
            • GetFileAttributesW.KERNEL32(?,?), ref: 00FA9384
            • SetFileAttributesW.KERNEL32(?,00000000), ref: 00FA9391
            • GetFileAttributesW.KERNEL32(?,?,?,01109EB8,00000001,9F3ADAE5,?,0000000A,00000000,00000000,010C8545,000000FF), ref: 00FA93A0
            • SetFileAttributesW.KERNEL32(?,00000000), ref: 00FA93AD
            • FindNextFileW.KERNEL32(?,?), ref: 00FA93EB
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: File$Attributes$FindNext
            • String ID:
            • API String ID: 3019667586-0
            • Opcode ID: 55096307018dc5a0dfab21c487a85fba29f8be3f76391254e7de9cafbf5586ea
            • Instruction ID: f87f5bbf4aa9afcb847f09e223f3d1e4b6944f0801a2d75432c8f7a2a7012d33
            • Opcode Fuzzy Hash: 55096307018dc5a0dfab21c487a85fba29f8be3f76391254e7de9cafbf5586ea
            • Instruction Fuzzy Hash: 4C519D709042499BDF24EFA8CC54BED73B8EF45320F148269A825AB2D0DBB5AE04DB50
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ErrorLast
            • String ID: FTP Server$GET$HTTP/1.0$Local Network Server
            • API String ID: 1452528299-797884378
            • Opcode ID: 24e7cc0ac7f63d23693376a7171cd988a2547a94970684572c19eb279c0c3156
            • Instruction ID: 3b3b1add0178a898d6d1493c16ca5d96d6c032ae900db8b26152abe62665e535
            • Opcode Fuzzy Hash: 24e7cc0ac7f63d23693376a7171cd988a2547a94970684572c19eb279c0c3156
            • Instruction Fuzzy Hash: DE41D671D00245DBEB10DFAACC45BAFB7FCFF55320F14452AE915AB280DB7499008BA1
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ItemMessageSendWindow
            • String ID:
            • API String ID: 799199299-0
            • Opcode ID: c70c3f7bbdb3da7ad5fbcad412e12d3d5171847286ece212955f861702890976
            • Instruction ID: 2b46e89bc942c03358875339ecca9ce38aafee73d8f0881fc1b38c87b657670e
            • Opcode Fuzzy Hash: c70c3f7bbdb3da7ad5fbcad412e12d3d5171847286ece212955f861702890976
            • Instruction Fuzzy Hash: 5541B432328201DFCB28CF55D894AAAB7E9FB44311F04946AE9C5D6251D731EC58EB60
            APIs
            • GetClientRect.USER32(?,?), ref: 00F88F9E
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
              • Part of subcall function 00EA1FD0: GetWindowTextLengthW.USER32(?), ref: 00EA1FD7
              • Part of subcall function 00EA1FD0: GetWindowTextW.USER32(?,?,00000001), ref: 00EA2008
            • IsWindowEnabled.USER32(?), ref: 00F88FD4
            • GetFocus.USER32 ref: 00F88FE4
            • GetDC.USER32(?), ref: 00F89014
              • Part of subcall function 00FAF230: SelectObject.GDI32(?,?), ref: 00FAF293
              • Part of subcall function 00FAF230: SetTextColor.GDI32(?,?), ref: 00FAF2DF
              • Part of subcall function 00FAF230: DrawTextW.USER32(?,?,?,?,00000024), ref: 00FAF2FD
              • Part of subcall function 00FAF230: SelectObject.GDI32(?,?), ref: 00FAF309
            • CallWindowProcW.USER32(?,?,?,?,?), ref: 00F89043
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: TextWindow$Init_thread_footerObjectSelect$CallClientColorDrawEnabledFocusHeapLengthProcProcessRect
            • String ID:
            • API String ID: 1398943273-0
            • Opcode ID: daa77938809695c5c06ffdaf1dad0e94e962817177320fc8a4d4b3a2dd8f53ef
            • Instruction ID: 172c0644b13ae98b526810876e768217d6c1553a9fbf6a2f9d9b202fc73d99ff
            • Opcode Fuzzy Hash: daa77938809695c5c06ffdaf1dad0e94e962817177320fc8a4d4b3a2dd8f53ef
            • Instruction Fuzzy Hash: DF414C71904209DFDF15EF64C984BE9BBF8FF08320F188169E815AB291DB75A944DF60
            APIs
            • std::_Lockit::_Lockit.LIBCPMT ref: 00FA2B04
            • std::_Lockit::_Lockit.LIBCPMT ref: 00FA2B26
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00FA2B4E
            • std::_Facet_Register.LIBCPMT ref: 00FA2C37
            • std::_Lockit::~_Lockit.LIBCPMT ref: 00FA2C61
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
            • String ID:
            • API String ID: 459529453-0
            • Opcode ID: a5ada55c194f69e15aac4d35616c1947c6178affd54c5c52e6d8a61b3e61b99c
            • Instruction ID: 364ff520fa9f14ac207abd33f1492b0a6b17bf0bd577f3f0cf8cfea0c92418ca
            • Opcode Fuzzy Hash: a5ada55c194f69e15aac4d35616c1947c6178affd54c5c52e6d8a61b3e61b99c
            • Instruction Fuzzy Hash: 4D51EDB0A00219DFDB65CF98C584BAEBBF4FB01364F24815DD891AB380D775AA45DBA0
            APIs
            • SetFocus.USER32(00000000,?,?), ref: 00EB04C8
            • SendMessageW.USER32(?,00001012,00000000,?), ref: 00EB0510
            • SendMessageW.USER32(?,0000102C,000000FF,0000F000), ref: 00EB052C
            • SendMessageW.USER32(?,0000102B,000000FF,?), ref: 00EB055E
            • SetFocus.USER32(00000000,?,?), ref: 00EB0571
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend$Focus
            • String ID:
            • API String ID: 3982298024-0
            • Opcode ID: ab316b8a58040fa853342177f795c582beeb8dc9235307d11a2ed2407efba486
            • Instruction ID: 155800a82af5f18a7178281cd390117ddef0a612f70fa7970837ffd27500630b
            • Opcode Fuzzy Hash: ab316b8a58040fa853342177f795c582beeb8dc9235307d11a2ed2407efba486
            • Instruction Fuzzy Hash: 96415D74904709DFDB24DF68C985AAABBF4FF48710F10822AE965A7791DB70B950CF40
            APIs
            • SetWindowLongW.USER32(?,000000FC,00000000), ref: 00EA0249
            • GetClientRect.USER32(?,?), ref: 00EA026F
            • GetParent.USER32(?), ref: 00EA027D
              • Part of subcall function 0105C722: GetProcessHeap.KERNEL32(00000008,00000008,00000000,00FD3A1E,?,?), ref: 0105C727
              • Part of subcall function 0105C722: HeapAlloc.KERNEL32(00000000,?,?), ref: 0105C72E
            • SetWindowLongW.USER32(?,000000EB), ref: 00EA02B0
            • ShowWindow.USER32(?,00000000), ref: 00EA02C6
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$HeapLong$AllocClientParentProcessRectShow
            • String ID:
            • API String ID: 3563161840-0
            • Opcode ID: 32e4fc6accc4d90d800c0ce3488c2b3cf0d2cf50b4cc93366569ad4fe13b3c43
            • Instruction ID: 562c6eb9d16ee2355bcefc3a0855ea9d6c0975aeff7eb6204dd14f9af26103ec
            • Opcode Fuzzy Hash: 32e4fc6accc4d90d800c0ce3488c2b3cf0d2cf50b4cc93366569ad4fe13b3c43
            • Instruction Fuzzy Hash: 2C218E746047019FD724EF25D948A6BBBF8FF9A714B004A2DF896D2661EB30F844CB61
            APIs
            • ClientToScreen.USER32(?,?), ref: 00E9A629
            • ClientToScreen.USER32(?,?), ref: 00E9A637
            • GetParent.USER32(?), ref: 00E9A63C
            • ScreenToClient.USER32(00000000,?), ref: 00E9A64E
            • ScreenToClient.USER32(00000000,?), ref: 00E9A65E
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ClientScreen$Parent
            • String ID:
            • API String ID: 3677003336-0
            • Opcode ID: 734138f8472d2110479ed212cdaa4c8d9fbc1285583410a06b36b0e75852094a
            • Instruction ID: e1f8808c9a1929f754b9e0dbbe544947691ad0b8d159e81f82db658514d84677
            • Opcode Fuzzy Hash: 734138f8472d2110479ed212cdaa4c8d9fbc1285583410a06b36b0e75852094a
            • Instruction Fuzzy Hash: CD214F72108202AFE715DF28C844D6BB7F8FFD8610F44482DF995D3210DB30D9898BA2
            APIs
            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E90B6A
            • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 00E90B70
            • FormatMessageW.KERNEL32(00001300,00000000,?,00000400,00000000,00000000,00000000), ref: 00E90B93
            • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,01086A76,000000FF), ref: 00E90BBB
            • HeapFree.KERNEL32(00000000,00000000,00000000,?,?,?,01086A76,000000FF), ref: 00E90BC1
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Heap$FreeProcess$FormatMessage
            • String ID:
            • API String ID: 1606019998-0
            • Opcode ID: 635668fc5dd28a5548e0443525961572de576659f140586f47b61d035eb31246
            • Instruction ID: aad0b762552c7c3af986a55212edb3cc752a595604227386d4ec5c952a71db6a
            • Opcode Fuzzy Hash: 635668fc5dd28a5548e0443525961572de576659f140586f47b61d035eb31246
            • Instruction Fuzzy Hash: 381100B1A44219ABEB10EF95CD05FAFBBB8EB04B08F104519E915AB2C0D7B59A048795
            APIs
            • GetWindowLongW.USER32(?,000000F0), ref: 00EA8BBB
            • SendMessageW.USER32(?,?,?,0000102B), ref: 00EA8C18
            • SendMessageW.USER32(?,?,?,0000102B), ref: 00EA8C67
            • SendMessageW.USER32(?,00001043,00000000,00000000), ref: 00EA8C78
            • SendMessageW.USER32(?,00001013,00000000,00000000), ref: 00EA8C85
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend$LongWindow
            • String ID:
            • API String ID: 312131281-0
            • Opcode ID: 21ab7602634c2b142fd5e84710e7aec9a75a895e3d9c8984c0a948952b47ce45
            • Instruction ID: b7a590764b3192ca2a47cbcde2f17df98a0b9bc49deefde748458e68a6d8cc6f
            • Opcode Fuzzy Hash: 21ab7602634c2b142fd5e84710e7aec9a75a895e3d9c8984c0a948952b47ce45
            • Instruction Fuzzy Hash: 63218171918346A6E220DF11CD40B1ABBF1BFEE758F202B0EF1D021194E7F191848F86
            APIs
            • CreateWindowExW.USER32(?,RichEdit20W,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00EB4E3C
            • SendMessageW.USER32(00000000,00000031,00000000,00000000), ref: 00EB4E51
            • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 00EB4E59
              • Part of subcall function 00E8A9B0: RtlAllocateHeap.NTDLL(?,00000000,?,9F3ADAE5,00000000,01084C50,000000FF,?,?,01173854,?,00FE9828,80004005,9F3ADAE5,?,?), ref: 00E8A9FA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend$AllocateCreateHeapWindow
            • String ID: RichEdit20W
            • API String ID: 2359350451-4173859555
            • Opcode ID: e2cf30b2a04db7f4eb150eab7ceaef80ae18c0787a7b891f101c06a293f85a54
            • Instruction ID: 89b6f386f04f84b587b293385923fb420f8826d7d0eb4202cb12bfc5ea07b33d
            • Opcode Fuzzy Hash: e2cf30b2a04db7f4eb150eab7ceaef80ae18c0787a7b891f101c06a293f85a54
            • Instruction Fuzzy Hash: E4B17BB1A002099FDB25CFA8C884BEEBBF4FF48714F144569E955AB391DB71AD40CB60
            APIs
              • Part of subcall function 00FF10D0: SHGetSpecialFolderLocation.SHELL32(00000000,00000023,?,?,?,?,0117D68C), ref: 00FF10E0
              • Part of subcall function 00FF10D0: LoadLibraryW.KERNEL32(Shell32.dll,?,?,0117D68C), ref: 00FF10F3
              • Part of subcall function 00FF10D0: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00FF1103
            • PathFileExistsW.SHLWAPI(?,ADVINST_LOGS,0000000C,0117D68C), ref: 00FDE118
              • Part of subcall function 00E8A9B0: RtlAllocateHeap.NTDLL(?,00000000,?,9F3ADAE5,00000000,01084C50,000000FF,?,?,01173854,?,00FE9828,80004005,9F3ADAE5,?,?), ref: 00E8A9FA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: AddressAllocateExistsFileFolderHeapLibraryLoadLocationPathProcSpecial
            • String ID: ADVINST_LOGS$Everyone
            • API String ID: 3321256476-3921853867
            • Opcode ID: ef41339accdd5252251f2dddb547623aac512e735c341e368099dc0d448dfdf4
            • Instruction ID: c7f25020af08df5b14eccae85baab64ecc2589b60c99296a6f50192479226fce
            • Opcode Fuzzy Hash: ef41339accdd5252251f2dddb547623aac512e735c341e368099dc0d448dfdf4
            • Instruction Fuzzy Hash: EB91E071D01209CFEB00EFA8C949BAEBBB5EF14324F284159E815BB391DB755E04DBA1
            APIs
              • Part of subcall function 00E8A9B0: RtlAllocateHeap.NTDLL(?,00000000,?,9F3ADAE5,00000000,01084C50,000000FF,?,?,01173854,?,00FE9828,80004005,9F3ADAE5,?,?), ref: 00E8A9FA
              • Part of subcall function 00F87AE0: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000037,?,?,?,000000EF,?,00EA8188,00000000,80004005), ref: 00F87B48
              • Part of subcall function 00F87AE0: RedrawWindow.USER32(?,00000000,00000000,00000541,?,?,?,000000EF,?,00EA8188,00000000,80004005), ref: 00F87B59
              • Part of subcall function 00F87AE0: SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00F87B78
            • SendMessageW.USER32(?,00001036,00000004,00000004), ref: 00EAF37D
            • SendMessageW.USER32(?,00001036,00000400,00000400), ref: 00EAF394
            • SendMessageW.USER32(?,00001061,00000000,?), ref: 00EAF3F0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend$Window$AllocateHeapRedraw
            • String ID: QuickSelectionList
            • API String ID: 884508843-3633591268
            • Opcode ID: 3582abf856ad0e1415794478117edb0cfe91963cf8e724dd5be8b1a1d17fd8e1
            • Instruction ID: ab8342febd342c54566a5b038b2312878ec3cd88d06c0d74b8ce7b30256f3d62
            • Opcode Fuzzy Hash: 3582abf856ad0e1415794478117edb0cfe91963cf8e724dd5be8b1a1d17fd8e1
            • Instruction Fuzzy Hash: 9A71AD71A002059FDB14DF68C884BEAB7F4FF88324F14466DE965A7290DB74AD04CB60
            APIs
            • GetModuleFileNameW.KERNEL32(00000000,?,00000104,9F3ADAE5), ref: 00FDE532
            • CloseHandle.KERNEL32(?,9F3ADAE5,?,?,00000000,010D2C43,000000FF,?,80004005), ref: 00FDE6B0
            • CloseHandle.KERNEL32(00000000,9F3ADAE5,?,?,00000000,010D2C43,000000FF,?,80004005), ref: 00FDE6DF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CloseHandle$FileModuleName
            • String ID: LOG
            • API String ID: 3884789274-429402703
            • Opcode ID: 37ba81ae2cd320791fbe2c4ed27ac4266e5b4dfa4e336752df1c0e93e97be7d8
            • Instruction ID: 876fc3eb8a341c5c4179a223be473d3f7d2631166bcb1c9ec4f90454d4fcc7b7
            • Opcode Fuzzy Hash: 37ba81ae2cd320791fbe2c4ed27ac4266e5b4dfa4e336752df1c0e93e97be7d8
            • Instruction Fuzzy Hash: 9951E271A003449FDB25EF28D8047AAB7F5EF44714F188A6EE81ADF780E7749A04C780
            APIs
            • DeleteFileW.KERNEL32(?,00000000,?,\\?\,00000004,?,?,?,00000000,010C4EAD,000000FF,?,80004005,9F3ADAE5,?), ref: 00FA9613
              • Part of subcall function 00E8A2A0: FindResourceW.KERNEL32(00000000,?,00000006,?,?,*.*,?,?,?,*.*,?,80070057,9F3ADAE5), ref: 00E8A2C3
            • DeleteFileW.KERNEL32(?,9F3ADAE5,?,75923340,?,00000000,010C4EAD,000000FF,?,00FA93B7), ref: 00FA9642
            • GetLastError.KERNEL32(?,?,?,00000000,010C4EAD,000000FF,?,80004005,9F3ADAE5,?,?,?,?,010C4EAD,000000FF), ref: 00FA9652
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: DeleteFileInit_thread_footer$ErrorFindHeapLastProcessResource
            • String ID: \\?\
            • API String ID: 1908169709-4282027825
            • Opcode ID: af0f7625e3caef6d1601b2fe9081c64e155243d2c2d4aa8cb02c7651ad8d0ec5
            • Instruction ID: 6e681c53d2d5fa50a75b6ffd2cfbe1e21822d3a506c908ec2f319d543dbe2fe3
            • Opcode Fuzzy Hash: af0f7625e3caef6d1601b2fe9081c64e155243d2c2d4aa8cb02c7651ad8d0ec5
            • Instruction Fuzzy Hash: 9721D171908614DFDB10DFA8C908BA9B7E4FF05320F144669E865D7290DB759900DF50
            APIs
            • LoadLibraryW.KERNEL32(combase.dll,RoOriginateLanguageException), ref: 00E90F32
            • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 00E90F38
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: RoOriginateLanguageException$combase.dll
            • API String ID: 2574300362-3996158991
            • Opcode ID: 8904b1e93b03fe07e4363e67497b9e691a68911b85351d47dc00571a59c1b136
            • Instruction ID: 971ead45940b13150eb3b8a762fbfefd9d04212305a3ace12818f73709a318c3
            • Opcode Fuzzy Hash: 8904b1e93b03fe07e4363e67497b9e691a68911b85351d47dc00571a59c1b136
            • Instruction Fuzzy Hash: 1631697190420A9FDF60EFA8C845BEEBBF4EB14314F100629E865B72C0E7B55A44CB91
            APIs
            • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,00FDF37A,?,9F3ADAE5,?,?,?,?,010D2F55,000000FF), ref: 00FE13BD
            • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,00FDF37A,?,9F3ADAE5,?,?,?,?,010D2F55,000000FF), ref: 00FE13DE
            • GetLastError.KERNEL32(00FDF37A,?,9F3ADAE5,?,?,?,?,010D2F55,000000FF,?,00FDECAD,?,?,00000000), ref: 00FE143E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CreateEvent$ErrorLast
            • String ID: AdvancedInstaller
            • API String ID: 1131763895-1372594473
            • Opcode ID: f842da84b0d0a264546760a650cae5f63c0e9e948f93b2e86b4596a6529b3a9f
            • Instruction ID: 0baf0ebfa5c7f519065eca633bd5cda8bafb7a01b2e2d9b5a4e50c0b65fa1789
            • Opcode Fuzzy Hash: f842da84b0d0a264546760a650cae5f63c0e9e948f93b2e86b4596a6529b3a9f
            • Instruction Fuzzy Hash: 4D115B71740642BFE724DB23CC89F5ABBA4FB48719F204029F5159B684DBB1E851DBA0
            APIs
              • Part of subcall function 00F87F00: __Init_thread_footer.LIBCMT ref: 00F87F90
              • Part of subcall function 00F87F00: GetProcAddress.KERNEL32(SetWindowTheme), ref: 00F87FCD
              • Part of subcall function 00F87F00: __Init_thread_footer.LIBCMT ref: 00F87FE4
              • Part of subcall function 00F87F00: SendMessageW.USER32(000000EF,00001036,00010000,00010000), ref: 00F8800F
            • CreateWindowExW.USER32(80000000,SysListView32,?,00000000,00000000,80000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00F87A42
            • SendMessageW.USER32(00000000,00000031,00000000,00000000), ref: 00F87A60
            • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 00F87A68
              • Part of subcall function 00E983A0: SetWindowLongW.USER32(?,000000FC,00000000), ref: 00E983D6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend$Init_thread_footerWindow$AddressCreateLongProc
            • String ID: SysListView32
            • API String ID: 605634508-78025650
            • Opcode ID: 1f455a92c233afaef00cc780657bb8aba5261f01e969eaced9c4eb3c0682cdfa
            • Instruction ID: ac3ef00fa4189090582791bb5a400ce8691061c736e5659908c0aff82dab31a4
            • Opcode Fuzzy Hash: 1f455a92c233afaef00cc780657bb8aba5261f01e969eaced9c4eb3c0682cdfa
            • Instruction Fuzzy Hash: 02117971344310BBD625AA268C05F6BFBA9FFC9B50F114619FA04AB390C7B1E900CBA4
            APIs
            • EnterCriticalSection.KERNEL32(0118297C), ref: 00E99E0C
            • GetCurrentThreadId.KERNEL32 ref: 00E99E20
            • LeaveCriticalSection.KERNEL32(0118297C), ref: 00E99E5F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalSection$CurrentEnterLeaveThread
            • String ID: v
            • API String ID: 2351996187-3261393531
            • Opcode ID: d3eb06d79229389844976119781e587770cf17e4b8584677b327e616c5627a9d
            • Instruction ID: e6c059cabd9baeed107fc0a6de75f9bf496a41315dc79061da0dc21a610e7794
            • Opcode Fuzzy Hash: d3eb06d79229389844976119781e587770cf17e4b8584677b327e616c5627a9d
            • Instruction Fuzzy Hash: 0811E231E04215CFCB25CF59D80476EBBF4EB54B24F10926EE866A7340D7716800CB90
            APIs
            • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,010618BD,?,?,00000000,?,?,?,010619E7,00000002,FlsGetValue,010EAF18,FlsGetValue), ref: 01061919
            • GetLastError.KERNEL32(?,010618BD,?,?,00000000,?,?,?,010619E7,00000002,FlsGetValue,010EAF18,FlsGetValue,?,?,0105E804), ref: 01061923
            • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 0106194B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: LibraryLoad$ErrorLast
            • String ID: api-ms-
            • API String ID: 3177248105-2084034818
            • Opcode ID: f84b2dc79b0cfb308edfe5acdec6892e0021a8353fd2dbbc412b368118c2fe99
            • Instruction ID: ca47e58c61a2f59f65989003c90c2da0cd76de271299e82e890dcd1377eb3074
            • Opcode Fuzzy Hash: f84b2dc79b0cfb308edfe5acdec6892e0021a8353fd2dbbc412b368118c2fe99
            • Instruction Fuzzy Hash: 75E04F30380305BBEF625A62EC06B593FDDAB40F58F5084A0FB8CBC1D1D7B796509654
            APIs
            • SendMessageW.USER32(?,00001037,00000000,00000000), ref: 00EA8138
            • SendMessageW.USER32(?,00001036,00000000,00000000), ref: 00EA814D
              • Part of subcall function 00E8A9B0: RtlAllocateHeap.NTDLL(?,00000000,?,9F3ADAE5,00000000,01084C50,000000FF,?,?,01173854,?,00FE9828,80004005,9F3ADAE5,?,?), ref: 00E8A9FA
              • Part of subcall function 00F87AE0: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000037,?,?,?,000000EF,?,00EA8188,00000000,80004005), ref: 00F87B48
              • Part of subcall function 00F87AE0: RedrawWindow.USER32(?,00000000,00000000,00000541,?,?,?,000000EF,?,00EA8188,00000000,80004005), ref: 00F87B59
              • Part of subcall function 00F87AE0: SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00F87B78
            • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00EA8283
            • SendMessageW.USER32(?,00001061,00000000,00000005), ref: 00EA837F
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend$Window$AllocateHeapRedraw
            • String ID:
            • API String ID: 884508843-0
            • Opcode ID: 2ef76dfb40c0cf4603d39d73659d7e356ca1be443ff3898781e3bb2e8f7e8f82
            • Instruction ID: afeb834e9df1864df887d80a274fbdc43aea9591b7d1489509b342215d0b09f4
            • Opcode Fuzzy Hash: 2ef76dfb40c0cf4603d39d73659d7e356ca1be443ff3898781e3bb2e8f7e8f82
            • Instruction Fuzzy Hash: A2C19071A00209DFDB18DFA8C985BEEFBB5FF49314F144229E515BB290DB74A944CBA0
            APIs
            • SendMessageW.USER32(00000001,0000110A,00000004,?), ref: 00EB18D5
            • SendMessageW.USER32(00000001,0000110A,00000001,00000000), ref: 00EB1907
            • SendMessageW.USER32(?,0000110A,00000004,?), ref: 00EB1A7E
            • SendMessageW.USER32(?,0000110A,00000001,00000000), ref: 00EB1AA6
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend
            • String ID:
            • API String ID: 3850602802-0
            • Opcode ID: da048d263a4e8119a97426d176a596321c4df7faa5a079b42a392e992608998b
            • Instruction ID: 2724408f8d08e79348e4b380b4624b07fe0dfe4d9907b58deb8b1685fabe105c
            • Opcode Fuzzy Hash: da048d263a4e8119a97426d176a596321c4df7faa5a079b42a392e992608998b
            • Instruction Fuzzy Hash: EF917B71A01205EFCB25DF68D8A4AEEB7F5FF48320F4451A9E546B7291D730A944CBA0
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: EnabledWindow$CopyRect
            • String ID:
            • API String ID: 2919275910-0
            • Opcode ID: fd82dc82b49480ecffc2d1e164cb962fe9c1dcb000f7ac9031720ce066a7a447
            • Instruction ID: d913b1052b18a69c356a223252b542a685b107f9f1276f62789dcd13cec56116
            • Opcode Fuzzy Hash: fd82dc82b49480ecffc2d1e164cb962fe9c1dcb000f7ac9031720ce066a7a447
            • Instruction Fuzzy Hash: FC61C331A006159FDB14CF68C985BAAB7F5EF8A700F108269ED56EB394CB74AC05CB60
            APIs
            • GetClientRect.USER32(?,?), ref: 00EA17B9
            • GetLastError.KERNEL32 ref: 00EA17ED
            • SendMessageW.USER32(?,00000317,00000000,00000006), ref: 00EA1819
            • SendMessageW.USER32(?,00000318,?,00000006), ref: 00EA1877
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend$ClientErrorLastRect
            • String ID:
            • API String ID: 2591167063-0
            • Opcode ID: d58cc699734acc11db7bd2cb072d731065576948074357a4acd028054f61eed8
            • Instruction ID: 2699e3fe39ac1cfba1816e9c604bd10171cba6b92336284b55b51fbf3743aaa5
            • Opcode Fuzzy Hash: d58cc699734acc11db7bd2cb072d731065576948074357a4acd028054f61eed8
            • Instruction Fuzzy Hash: D031C571A44708AFE725CF24C849BAABBF8FB09714F100269F562EA6D0DB79A940C750
            APIs
              • Part of subcall function 00EA1E40: CreateCompatibleDC.GDI32(?), ref: 00EA1E9B
              • Part of subcall function 00EA1E40: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00EA1EB4
              • Part of subcall function 00EA1E40: SelectObject.GDI32(?,00000000), ref: 00EA1EC0
              • Part of subcall function 00EA1E40: SetViewportOrgEx.GDI32(?,?,?,00000000), ref: 00EA1ED9
            • SelectObject.GDI32(?,?), ref: 00FAF293
            • SetTextColor.GDI32(?,?), ref: 00FAF2DF
            • DrawTextW.USER32(?,?,?,?,00000024), ref: 00FAF2FD
            • SelectObject.GDI32(?,?), ref: 00FAF309
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ObjectSelect$CompatibleCreateText$BitmapColorDrawViewport
            • String ID:
            • API String ID: 1496946490-0
            • Opcode ID: f25a45c117e4d3dfabeb24d334894f207c97762c4d52d2ca69d6bf1243deb847
            • Instruction ID: f5f75887558995d08fdd0a588c5c8e93bd9cc6398ade66991a3db1b10bc5c7af
            • Opcode Fuzzy Hash: f25a45c117e4d3dfabeb24d334894f207c97762c4d52d2ca69d6bf1243deb847
            • Instruction Fuzzy Hash: DA316B71805208FFDB11DF94DD45B9DBFB6FF08720F204225F925A6290D7316A64DB94
            APIs
            • FindResourceW.KERNEL32(00000000,?,00000017,9F3ADAE5,?,0117D4C0,?,?,?,?,00000000,Function_00233CFD,000000FF,?,?,0117D4C0), ref: 00F38899
            • LoadResource.KERNEL32(00000000,00000000,?,0117D4C0,?,?,?,?,00000000,Function_00233CFD,000000FF,?,?,0117D4C0,?), ref: 00F388A8
            • LockResource.KERNEL32(00000000,?,0117D4C0,?,?,?,?,00000000,Function_00233CFD,000000FF,?,?,0117D4C0,?), ref: 00F388B3
            • SizeofResource.KERNEL32(00000000,?,?,0117D4C0,?,?,?,?,00000000,Function_00233CFD,000000FF,?,?,0117D4C0,?), ref: 00F388C4
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Resource$FindLoadLockSizeof
            • String ID:
            • API String ID: 3473537107-0
            • Opcode ID: 12ed5dee9dda1fff970a8bc33ad452172b34e7dcdb58d971bd1d937931fd7e94
            • Instruction ID: 5255228adde1119e9113dc965bf9bd6c403bbda57deb250b0d143c48bbc1ce09
            • Opcode Fuzzy Hash: 12ed5dee9dda1fff970a8bc33ad452172b34e7dcdb58d971bd1d937931fd7e94
            • Instruction Fuzzy Hash: C131DF72D05705ABD7209F25D804BABBBF8EB48B60F004229FC55A7280EF349A0497A1
            APIs
            • GetDC.USER32(00000000), ref: 00FF4ADA
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FF4AED
            • GetDC.USER32(00000000), ref: 00FF4B47
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FF4B5A
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CapsDevice
            • String ID:
            • API String ID: 328075279-0
            • Opcode ID: 74334c6a8d0c24ded3f0346bf384818873638dfaff7f66cc5f2fbd2a3196698a
            • Instruction ID: d6b67402d3e0778ee367d242aeee1036426d6230b01c8725c35e80cc15f96b5c
            • Opcode Fuzzy Hash: 74334c6a8d0c24ded3f0346bf384818873638dfaff7f66cc5f2fbd2a3196698a
            • Instruction Fuzzy Hash: D631A1B1914A18EFD722CF74D845B6AF7B8FF093A5F108326E525E3285E7706941CB50
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Focus$ChildWindow
            • String ID:
            • API String ID: 501040988-0
            • Opcode ID: cdee3cf66b9cecc35a8eb855aedb5a94a880341c327184f0f658f87becc0d0eb
            • Instruction ID: f6e90a1af8ea4373d81211fa660fd33ae577685cd82c91b7fcf254a1705e0838
            • Opcode Fuzzy Hash: cdee3cf66b9cecc35a8eb855aedb5a94a880341c327184f0f658f87becc0d0eb
            • Instruction Fuzzy Hash: AD31BD70608606EFDB14CF65CD49FAABBB8FF48314F108229E965D7390DB75A814CB90
            APIs
            • GetWindowRect.USER32(00000000,?), ref: 00EA108C
            • ScreenToClient.USER32(?,?), ref: 00EA109B
            • ScreenToClient.USER32(?,?), ref: 00EA10AB
            • SetWindowPos.USER32(00000000,00000000,?,?,00000000,00000000,00000015,?,00EA0B11,?,?,?), ref: 00EA110E
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ClientScreenWindow$Rect
            • String ID:
            • API String ID: 3998357320-0
            • Opcode ID: ff89982b2e0f825afc53ebaaa5403873a82359205de98c45ad103a2beada5d17
            • Instruction ID: bb4f6a4da52d1e870dd0839e47b32f020f01b5d3bcec9995be6eeffd69b8f427
            • Opcode Fuzzy Hash: ff89982b2e0f825afc53ebaaa5403873a82359205de98c45ad103a2beada5d17
            • Instruction Fuzzy Hash: 9E218976608306AFD324CF28CD85E6BB7F9EBD9710F01852DF95497284D730E8448BA6
            APIs
            • ResetEvent.KERNEL32(?,?,?,00FE22F2,?,?,?,?,?,00000003,00000000,9F3ADAE5,00000000), ref: 00FE2ED2
            • GetLastError.KERNEL32(?,?,?,00FE22F2,?,?,?,?,?,00000003,00000000,9F3ADAE5,00000000), ref: 00FE2EFF
            • WaitForSingleObject.KERNEL32(?,0000000A,?,?,?,00FE22F2,?,?,?,?,?,00000003,00000000,9F3ADAE5,00000000), ref: 00FE2F35
            • SetEvent.KERNEL32(?,?,?,?,00FE22F2,?,?,?,?,?,00000003,00000000,9F3ADAE5,00000000), ref: 00FE2F58
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Event$ErrorLastObjectResetSingleWait
            • String ID:
            • API String ID: 708712559-0
            • Opcode ID: 58bc0d3b5f2c5aa263008fa1ebf4bf139af020c951e3bdbe1abbe2bfa23ffb3e
            • Instruction ID: 53684a438bc4a1da0cc994f1f14a62715caa22683e948214f93cf655b277b707
            • Opcode Fuzzy Hash: 58bc0d3b5f2c5aa263008fa1ebf4bf139af020c951e3bdbe1abbe2bfa23ffb3e
            • Instruction Fuzzy Hash: DC119131B047C08EEBB09A27E448B577BF9BF60734F40486EE08686665D375EC86E750
            APIs
            • InitializeCriticalSection.KERNEL32(?,9F3ADAE5,?), ref: 00EA441D
            • EnterCriticalSection.KERNEL32(?,9F3ADAE5,?), ref: 00EA442A
            • LeaveCriticalSection.KERNEL32(?), ref: 00EA4452
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CriticalSection$EnterInitializeLeave
            • String ID: v
            • API String ID: 3991485460-3261393531
            • Opcode ID: 864fa914f1726f0efa733f801865fc8806557125a0591107f4bd45c51fd03af0
            • Instruction ID: 615cc55821f61171f48c08a358385ca237b3c6f866cd39ed2885d712ae1706b5
            • Opcode Fuzzy Hash: 864fa914f1726f0efa733f801865fc8806557125a0591107f4bd45c51fd03af0
            • Instruction Fuzzy Hash: 5521EC76904244DFCF11DF64D8407E9BFB4EB5A338F5002A9E865AB385D7326909CB50
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: DeleteObject$Select
            • String ID:
            • API String ID: 207189511-0
            • Opcode ID: a96ac3200cfa94fac812878bdb0ca09f72eeb78ca16ff23f9fa915ff83d1beca
            • Instruction ID: 5a1d907788c3663d6d58b3c66f148fdadf9dd4928d44020d89e35b373428082b
            • Opcode Fuzzy Hash: a96ac3200cfa94fac812878bdb0ca09f72eeb78ca16ff23f9fa915ff83d1beca
            • Instruction Fuzzy Hash: A21119B1604606FFD724CF59D908B6AFBB9FB49720F108269F825D7680D771A960CBA0
            APIs
            • CreateCompatibleDC.GDI32(?), ref: 00EA1E9B
            • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00EA1EB4
            • SelectObject.GDI32(?,00000000), ref: 00EA1EC0
            • SetViewportOrgEx.GDI32(?,?,?,00000000), ref: 00EA1ED9
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CompatibleCreate$BitmapObjectSelectViewport
            • String ID:
            • API String ID: 1881423421-0
            • Opcode ID: a6418889f9be482210b96ba16ec0df3d34583aa6092ec6c5b85bf02cdcb6efca
            • Instruction ID: 10ca97c33d3e50dff03cfc801306fde1cb2f3656285ee13b983a4796bd975191
            • Opcode Fuzzy Hash: a6418889f9be482210b96ba16ec0df3d34583aa6092ec6c5b85bf02cdcb6efca
            • Instruction Fuzzy Hash: 84210875504B05EFD734CF58C944B6ABBF8FB08710F108A6EE8A697B90D771A984CB90
            APIs
            • GetClientRect.USER32(?,?), ref: 00E9A93B
            • BitBlt.GDI32(00000000,?,?,?,00000000,?,00000000,00000000,00CC0020), ref: 00E9A966
            • DeleteDC.GDI32(?), ref: 00E9A96D
            • ReleaseDC.USER32(?,?), ref: 00E9A97A
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ClientDeleteRectRelease
            • String ID:
            • API String ID: 2015589292-0
            • Opcode ID: 6ed7a2bc55fd79d25b11d2ce812ef420a5b9e6f113048cedc0039cab8c1e203d
            • Instruction ID: eb743eacda8ca6c068e97c8a377faba97b062a08ecc33b1d1c10b91be1f5c5dd
            • Opcode Fuzzy Hash: 6ed7a2bc55fd79d25b11d2ce812ef420a5b9e6f113048cedc0039cab8c1e203d
            • Instruction Fuzzy Hash: 8A011772208205AFD318DF68DC89F2BBBF9FB8C310F448628F55582654D770E854CBA2
            APIs
            • __EH_prolog3.LIBCMT ref: 0105A970
            • std::_Lockit::_Lockit.LIBCPMT ref: 0105A97B
            • std::_Lockit::~_Lockit.LIBCPMT ref: 0105A9E9
              • Part of subcall function 0105AACB: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0105AAE3
            • std::locale::_Setgloballocale.LIBCPMT ref: 0105A996
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
            • String ID:
            • API String ID: 677527491-0
            • Opcode ID: a38fed5dff6eddef270c069418ae1f3a28255060bd2c10becf8b0cc5f8c36865
            • Instruction ID: 19669929957471530ff745bc6ed69e0ab70bcd9a8b2bfcc25165fea63bb25794
            • Opcode Fuzzy Hash: a38fed5dff6eddef270c069418ae1f3a28255060bd2c10becf8b0cc5f8c36865
            • Instruction Fuzzy Hash: 50012F79A00122CBCB4AEB60C9845BE7BB1BF84200B148009DC915B384CF386E42CBD5
            APIs
            • CreateWindowExW.USER32(00000000,AtlAxWin140,?,?,?,80000000,00000000,00000000,?,00000000,00000000), ref: 00E94C16
            • SendMessageW.USER32(?,00000000,00000000), ref: 00E94D12
              • Part of subcall function 00E96670: SysFreeString.OLEAUT32(00000000), ref: 00E96713
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CreateFreeMessageSendStringWindow
            • String ID: AtlAxWin140
            • API String ID: 4045344427-3842940177
            • Opcode ID: b7485e96e69cbd9cf34e6ca719e4d9004df7fc4ab945ca302bf869f644c2a56a
            • Instruction ID: 457fde325594985315776b012b0a2fd16cc53dc1dc15810966472df09efc7f0a
            • Opcode Fuzzy Hash: b7485e96e69cbd9cf34e6ca719e4d9004df7fc4ab945ca302bf869f644c2a56a
            • Instruction Fuzzy Hash: 799116B4600208EFDB14DF64C888F6ABBB9FF49714F108599F969AB391C771E905CB90
            APIs
            • __startOneArgErrorHandling.LIBCMT ref: 01070D0D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ErrorHandling__start
            • String ID: pow
            • API String ID: 3213639722-2276729525
            • Opcode ID: 8673fe906837e3a3ece0cefa9a514014af026a949c1baf5ce658ae7c32c57880
            • Instruction ID: d3bde2dd1a6c2403ad78502d930d8867fe27e2d5f841a2028e6d0982470b6ab5
            • Opcode Fuzzy Hash: 8673fe906837e3a3ece0cefa9a514014af026a949c1baf5ce658ae7c32c57880
            • Instruction Fuzzy Hash: E7513861F0420EDADB567B1CC9403BE2BD09B41B40F288EE9F5D64729DEA3598918B4E
            APIs
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            • CloseHandle.KERNEL32(?,9F3ADAE5,000000C9,00000000), ref: 00FDD0E3
            • DeleteCriticalSection.KERNEL32(?,9F3ADAE5,000000C9,00000000), ref: 00FDD171
            Strings
            • << Advanced Installer (x86) Log >>, xrefs: 00FDD04F
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Init_thread_footer$CloseCriticalDeleteHandleHeapProcessSection
            • String ID: << Advanced Installer (x86) Log >>
            • API String ID: 3699736680-396061572
            • Opcode ID: f1f314a2e4b8ebfb3a43ccbfb29887cc44396c07986404cd74cc07734f6b03c8
            • Instruction ID: 0d8d101c8166eca7d29e075785feae7b45b6832b9759382bb8998a8cb4d0c2e1
            • Opcode Fuzzy Hash: f1f314a2e4b8ebfb3a43ccbfb29887cc44396c07986404cd74cc07734f6b03c8
            • Instruction Fuzzy Hash: DE610370901649DFDB14DFA8D90874ABBF4FF45314F14826DE808AB381D7759A44CB91
            APIs
            • PathIsUNCW.SHLWAPI(?,9F3ADAE5), ref: 00F9AD61
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Path
            • String ID: \\?\$\\?\UNC\
            • API String ID: 2875597873-3019864461
            • Opcode ID: d94861f0af0d862539e8ae0a61b04cf4e01c4c4aec53ea7d8dd8c2676cfa5f98
            • Instruction ID: 3214a4c7bed773339686dbb252e7ef26bb884468ea938848aeb1f527aaea7c30
            • Opcode Fuzzy Hash: d94861f0af0d862539e8ae0a61b04cf4e01c4c4aec53ea7d8dd8c2676cfa5f98
            • Instruction Fuzzy Hash: 3651CE70D002049BEB14DF68D889BAEB7F5FF94304F20861EE8556B681EB756948CBE1
            APIs
            • OpenEventW.KERNEL32(00000000,00000000,9F3ADAE5,_pbl_evt,00000008,?,?,0110CB88,00000001,9F3ADAE5,00000000), ref: 00FFF66E
            • CreateEventW.KERNEL32(00000000,00000001,00000001,?), ref: 00FFF68B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Event$CreateOpen
            • String ID: _pbl_evt
            • API String ID: 2335040897-4023232351
            • Opcode ID: 45aa3d3cdd930018f539da323403faa41944c6047b1a31bcc6d4f2eb0a44dbc2
            • Instruction ID: 6d1045e3703c46356ce6820ce7e4af7c7529afd5afea74ac080a624473958735
            • Opcode Fuzzy Hash: 45aa3d3cdd930018f539da323403faa41944c6047b1a31bcc6d4f2eb0a44dbc2
            • Instruction Fuzzy Hash: 8D51C171D00608AFDB10DF68CD85BEEB7B8EF14720F508229E955B7290EB746A05CBA1
            APIs
              • Part of subcall function 00E8ACF0: GetProcessHeap.KERNEL32 ref: 00E8AD45
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AD77
              • Part of subcall function 00E8ACF0: __Init_thread_footer.LIBCMT ref: 00E8AE02
            • GetLastError.KERNEL32(?,00000000,FTP Server,0000000A), ref: 00FE3064
            • WaitForSingleObject.KERNEL32(?,0000000A,?,00000000,FTP Server,0000000A), ref: 00FE309D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Init_thread_footer$ErrorHeapLastObjectProcessSingleWait
            • String ID: REST %u
            • API String ID: 1670056567-3183379045
            • Opcode ID: 0d0b621b8b3d20f8d5ed3d6938ba91e3226f91126810de76c1c30b388aeeec2d
            • Instruction ID: 3a46b1d76d8c20e94a786b6dfcb8bfa751f47cfaac0926387e4224adb4222fdd
            • Opcode Fuzzy Hash: 0d0b621b8b3d20f8d5ed3d6938ba91e3226f91126810de76c1c30b388aeeec2d
            • Instruction Fuzzy Hash: F751EE31A006849FD720CF6ACC8CB6AB7E4FF41324F14862DE5569B6A1D779EE44DB40
            APIs
            • GetTempPathW.KERNEL32(00000104,?,9F3ADAE5,?,?,0117D68C), ref: 00FDE35F
            • CreateDirectoryW.KERNEL32(?,00000000,?,0117D68C), ref: 00FDE3C0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: CreateDirectoryPathTemp
            • String ID: ADVINST_LOGS
            • API String ID: 2885754953-2492584244
            • Opcode ID: 10c8fe260a3ef0dfd5a88e8a786872dc4601ac56cb04e3e5c14f5996f46dbe3f
            • Instruction ID: 9aba05e54fad6d5307c4d46c7b1dad4089dde3f163ac86f3f63d648b702feae0
            • Opcode Fuzzy Hash: 10c8fe260a3ef0dfd5a88e8a786872dc4601ac56cb04e3e5c14f5996f46dbe3f
            • Instruction Fuzzy Hash: 7551B079D00215CACB30EF28C8447BAB7F5FF11724F2846AED8999B290EB355981DB90
            APIs
            • FormatMessageW.KERNEL32(000013FF,00000000,?,00000000,00000000,00000000,00000000,9F3ADAE5,0110BF88), ref: 00FB1E7C
            • LocalFree.KERNEL32(00000000,00000000,-00000002), ref: 00FB1F73
              • Part of subcall function 00F9DFB0: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00F9E085
            Strings
            • Failed to get Windows error message [win32 error 0x, xrefs: 00FB1E9A
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: FormatFreeIos_base_dtorLocalMessagestd::ios_base::_
            • String ID: Failed to get Windows error message [win32 error 0x
            • API String ID: 201254970-3373098694
            • Opcode ID: c809ca1d324bba6e72514164c72954b8b91a65eece4d52a43595fad862b093ad
            • Instruction ID: 7cb19448b04d3399e8808d413bdd49ef63cb92747aa0a536c309f9b6cceb3c0c
            • Opcode Fuzzy Hash: c809ca1d324bba6e72514164c72954b8b91a65eece4d52a43595fad862b093ad
            • Instruction Fuzzy Hash: 2941A371E003089BDB10DF59CD09BAEBBF8FF45714F108259E945AB2D0DBB89A48DB91
            APIs
            • std::_Lockit::_Lockit.LIBCPMT ref: 00EC6C6B
            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00EC6CCE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
            • String ID: bad locale name
            • API String ID: 3988782225-1405518554
            • Opcode ID: 224fca24a41c1275c0134decad7a20a396a2a11809098475732623e2cbc281c5
            • Instruction ID: 9298eba86dc19249192cad90fab211b252f4e6e7bc826be68e6a0fe823f61cb3
            • Opcode Fuzzy Hash: 224fca24a41c1275c0134decad7a20a396a2a11809098475732623e2cbc281c5
            • Instruction Fuzzy Hash: 9021BD70A05784DED720CF68C904B4BBFF4AF15714F14869DE4859BB81D7B6AA04CBA1
            APIs
            • GetParent.USER32(0000000F), ref: 00EA9262
            Strings
            • Unknown exception, xrefs: 00EA9237
            • C:\ReleaseAI\stubs\setup\controls\generic\VisualStyleBorder.h, xrefs: 00EA9247
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: Parent
            • String ID: C:\ReleaseAI\stubs\setup\controls\generic\VisualStyleBorder.h$Unknown exception
            • API String ID: 975332729-9186675
            • Opcode ID: 39996ce72662a9eeda7c24a7d90b23fa9ea81da478317ac5a454ac1c2f59a6c9
            • Instruction ID: 521cddcbb7a2fb30cfa37a131659a08b894a14f16a236e8de46a4880bf9d9825
            • Opcode Fuzzy Hash: 39996ce72662a9eeda7c24a7d90b23fa9ea81da478317ac5a454ac1c2f59a6c9
            • Instruction Fuzzy Hash: 65016D30D05288EFCB04EBE4CA55ADDBBB0AF59304F54809CE445BF386DBB55A08DB92
            APIs
            Strings
            • Unknown exception, xrefs: 00E947DA
            • C:\ReleaseAI\platform\ui\controls\mshtml\GenericAxControl.cpp, xrefs: 00E947ED
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ActiveWindow
            • String ID: C:\ReleaseAI\platform\ui\controls\mshtml\GenericAxControl.cpp$Unknown exception
            • API String ID: 2558294473-2631306498
            • Opcode ID: 65d322fcec6cc2c3ea86eeebcdd18196fc50936468c9c17be8c5b4b16f1e9193
            • Instruction ID: c93670a3f5e7943c90d76062ad4cc734b07165b10ce1ee5e04a99b85dc738092
            • Opcode Fuzzy Hash: 65d322fcec6cc2c3ea86eeebcdd18196fc50936468c9c17be8c5b4b16f1e9193
            • Instruction Fuzzy Hash: C1018C30D05288EECF09EBE4CA55ADDBBB0AF55300F54809CE045BB386DBB45A08D792
            APIs
            Strings
            • Unknown exception, xrefs: 00E94466
            • C:\ReleaseAI\platform\ui\controls\mshtml\GenericAxControl.cpp, xrefs: 00E94476
            Memory Dump Source
            • Source File: 00000000.00000002.3318740243.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
            • Associated: 00000000.00000002.3318725534.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318885400.00000000010E9000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318935584.0000000001178000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318952526.000000000117A000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318967679.000000000117B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3318984611.0000000001186000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_e80000_SecuriteInfo.jbxd
            Similarity
            • API ID: ActiveWindow
            • String ID: C:\ReleaseAI\platform\ui\controls\mshtml\GenericAxControl.cpp$Unknown exception
            • API String ID: 2558294473-2631306498
            • Opcode ID: cf0851a7b31f0688d5a2457ce01076509c6a2230d7b369b5a19fc361d316f2d2
            • Instruction ID: 2c014f8c17345440406bb4fd40b39132c2bab94cb9cdff803e48432528cb9279
            • Opcode Fuzzy Hash: cf0851a7b31f0688d5a2457ce01076509c6a2230d7b369b5a19fc361d316f2d2
            • Instruction Fuzzy Hash: EB018C30D05288EECB09EBE4CA556DDBFB0AF55304F54809CE045BB286DBB45A08D792